diff options
author | markus@openbsd.org <markus@openbsd.org> | 2018-07-11 18:53:29 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2018-07-12 13:18:25 +1000 |
commit | 5467fbcb09528ecdcb914f4f2452216c24796790 (patch) | |
tree | 8fcef797ece697250f4c67d57a5063d6316fd203 /sshconnect2.c | |
parent | 5dc4c59d5441a19c99e7945779f7ec9051126c25 (diff) |
upstream: remove legacy key emulation layer; ok djm@
OpenBSD-Commit-ID: 2b1f9619259e222bbd4fe9a8d3a0973eafb9dd8d
Diffstat (limited to 'sshconnect2.c')
-rw-r--r-- | sshconnect2.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/sshconnect2.c b/sshconnect2.c index 2194e3a8d..9874b4485 100644 --- a/sshconnect2.c +++ b/sshconnect2.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: sshconnect2.c,v 1.278 2018/07/09 21:03:30 markus Exp $ */ | 1 | /* $OpenBSD: sshconnect2.c,v 1.279 2018/07/11 18:53:29 markus Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. |
4 | * Copyright (c) 2008 Damien Miller. All rights reserved. | 4 | * Copyright (c) 2008 Damien Miller. All rights reserved. |
@@ -1061,7 +1061,7 @@ key_sig_algorithm(struct ssh *ssh, const struct sshkey *key) | |||
1061 | if (ssh == NULL || ssh->kex->server_sig_algs == NULL || | 1061 | if (ssh == NULL || ssh->kex->server_sig_algs == NULL || |
1062 | (key->type != KEY_RSA && key->type != KEY_RSA_CERT)) { | 1062 | (key->type != KEY_RSA && key->type != KEY_RSA_CERT)) { |
1063 | /* Filter base key signature alg against our configuration */ | 1063 | /* Filter base key signature alg against our configuration */ |
1064 | return match_list(key_ssh_name(key), | 1064 | return match_list(sshkey_ssh_name(key), |
1065 | options.pubkey_key_types, NULL); | 1065 | options.pubkey_key_types, NULL); |
1066 | } | 1066 | } |
1067 | 1067 | ||
@@ -1610,10 +1610,10 @@ try_identity(Identity *id) | |||
1610 | { | 1610 | { |
1611 | if (!id->key) | 1611 | if (!id->key) |
1612 | return (0); | 1612 | return (0); |
1613 | if (key_type_plain(id->key->type) == KEY_RSA && | 1613 | if (sshkey_type_plain(id->key->type) == KEY_RSA && |
1614 | (datafellows & SSH_BUG_RSASIGMD5) != 0) { | 1614 | (datafellows & SSH_BUG_RSASIGMD5) != 0) { |
1615 | debug("Skipped %s key %s for RSA/MD5 server", | 1615 | debug("Skipped %s key %s for RSA/MD5 server", |
1616 | key_type(id->key), id->filename); | 1616 | sshkey_type(id->key), id->filename); |
1617 | return (0); | 1617 | return (0); |
1618 | } | 1618 | } |
1619 | return 1; | 1619 | return 1; |
@@ -1979,7 +1979,7 @@ userauth_hostbased(Authctxt *authctxt) | |||
1979 | (r = sshbuf_put_cstring(b, authctxt->server_user)) != 0 || | 1979 | (r = sshbuf_put_cstring(b, authctxt->server_user)) != 0 || |
1980 | (r = sshbuf_put_cstring(b, authctxt->service)) != 0 || | 1980 | (r = sshbuf_put_cstring(b, authctxt->service)) != 0 || |
1981 | (r = sshbuf_put_cstring(b, authctxt->method->name)) != 0 || | 1981 | (r = sshbuf_put_cstring(b, authctxt->method->name)) != 0 || |
1982 | (r = sshbuf_put_cstring(b, key_ssh_name(private))) != 0 || | 1982 | (r = sshbuf_put_cstring(b, sshkey_ssh_name(private))) != 0 || |
1983 | (r = sshbuf_put_string(b, keyblob, keylen)) != 0 || | 1983 | (r = sshbuf_put_string(b, keyblob, keylen)) != 0 || |
1984 | (r = sshbuf_put_cstring(b, chost)) != 0 || | 1984 | (r = sshbuf_put_cstring(b, chost)) != 0 || |
1985 | (r = sshbuf_put_cstring(b, authctxt->local_user)) != 0) { | 1985 | (r = sshbuf_put_cstring(b, authctxt->local_user)) != 0) { |
@@ -2005,7 +2005,7 @@ userauth_hostbased(Authctxt *authctxt) | |||
2005 | (r = sshpkt_put_cstring(ssh, authctxt->server_user)) != 0 || | 2005 | (r = sshpkt_put_cstring(ssh, authctxt->server_user)) != 0 || |
2006 | (r = sshpkt_put_cstring(ssh, authctxt->service)) != 0 || | 2006 | (r = sshpkt_put_cstring(ssh, authctxt->service)) != 0 || |
2007 | (r = sshpkt_put_cstring(ssh, authctxt->method->name)) != 0 || | 2007 | (r = sshpkt_put_cstring(ssh, authctxt->method->name)) != 0 || |
2008 | (r = sshpkt_put_cstring(ssh, key_ssh_name(private))) != 0 || | 2008 | (r = sshpkt_put_cstring(ssh, sshkey_ssh_name(private))) != 0 || |
2009 | (r = sshpkt_put_string(ssh, keyblob, keylen)) != 0 || | 2009 | (r = sshpkt_put_string(ssh, keyblob, keylen)) != 0 || |
2010 | (r = sshpkt_put_cstring(ssh, chost)) != 0 || | 2010 | (r = sshpkt_put_cstring(ssh, chost)) != 0 || |
2011 | (r = sshpkt_put_cstring(ssh, authctxt->local_user)) != 0 || | 2011 | (r = sshpkt_put_cstring(ssh, authctxt->local_user)) != 0 || |