diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-03-13 04:57:58 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-03-13 04:57:58 +0000 |
commit | cfccef96a35cb954023a31f9bc10cf3b8f9f8ed3 (patch) | |
tree | 4b4137478ea523bc49c8b53aace863e9a80e0031 /sshconnect2.c | |
parent | 9ae2bb6790ab8d00b5cd29309889b2db50a9bef9 (diff) |
- OpenBSD CVS Sync
- markus@cvs.openbsd.org 2001/03/12 22:02:02
[key.c key.h ssh-add.c ssh-keygen.c sshconnect.c sshconnect2.c]
remove old key_fingerprint interface, s/_ex//
Diffstat (limited to 'sshconnect2.c')
-rw-r--r-- | sshconnect2.c | 9 |
1 files changed, 5 insertions, 4 deletions
diff --git a/sshconnect2.c b/sshconnect2.c index 19d079bd3..046d746a4 100644 --- a/sshconnect2.c +++ b/sshconnect2.c | |||
@@ -23,7 +23,7 @@ | |||
23 | */ | 23 | */ |
24 | 24 | ||
25 | #include "includes.h" | 25 | #include "includes.h" |
26 | RCSID("$OpenBSD: sshconnect2.c,v 1.53 2001/03/10 17:51:04 markus Exp $"); | 26 | RCSID("$OpenBSD: sshconnect2.c,v 1.54 2001/03/12 22:02:02 markus Exp $"); |
27 | 27 | ||
28 | #include <openssl/bn.h> | 28 | #include <openssl/bn.h> |
29 | #include <openssl/md5.h> | 29 | #include <openssl/md5.h> |
@@ -660,7 +660,7 @@ input_userauth_pk_ok(int type, int plen, void *ctxt) | |||
660 | Key *key = NULL; | 660 | Key *key = NULL; |
661 | Buffer b; | 661 | Buffer b; |
662 | int alen, blen, pktype, sent = 0; | 662 | int alen, blen, pktype, sent = 0; |
663 | char *pkalg, *pkblob; | 663 | char *pkalg, *pkblob, *fp; |
664 | 664 | ||
665 | if (authctxt == NULL) | 665 | if (authctxt == NULL) |
666 | fatal("input_userauth_pk_ok: no authentication context"); | 666 | fatal("input_userauth_pk_ok: no authentication context"); |
@@ -687,7 +687,6 @@ input_userauth_pk_ok(int type, int plen, void *ctxt) | |||
687 | debug("no last key or no sign cb"); | 687 | debug("no last key or no sign cb"); |
688 | break; | 688 | break; |
689 | } | 689 | } |
690 | debug2("last_key %s", key_fingerprint(authctxt->last_key)); | ||
691 | if ((pktype = key_type_from_name(pkalg)) == KEY_UNSPEC) { | 690 | if ((pktype = key_type_from_name(pkalg)) == KEY_UNSPEC) { |
692 | debug("unknown pkalg %s", pkalg); | 691 | debug("unknown pkalg %s", pkalg); |
693 | break; | 692 | break; |
@@ -696,7 +695,9 @@ input_userauth_pk_ok(int type, int plen, void *ctxt) | |||
696 | debug("no key from blob. pkalg %s", pkalg); | 695 | debug("no key from blob. pkalg %s", pkalg); |
697 | break; | 696 | break; |
698 | } | 697 | } |
699 | debug2("input_userauth_pk_ok: fp %s", key_fingerprint(key)); | 698 | fp = key_fingerprint(key, SSH_FP_MD5, SSH_FP_HEX); |
699 | debug2("input_userauth_pk_ok: fp %s", fp); | ||
700 | xfree(fp); | ||
700 | if (!key_equal(key, authctxt->last_key)) { | 701 | if (!key_equal(key, authctxt->last_key)) { |
701 | debug("key != last_key"); | 702 | debug("key != last_key"); |
702 | break; | 703 | break; |