diff options
-rw-r--r-- | ChangeLog | 5 | ||||
-rw-r--r-- | dns.c | 9 |
2 files changed, 6 insertions, 8 deletions
@@ -15,6 +15,9 @@ | |||
15 | - jakob@cvs.openbsd.org 2003/06/11 10:16:16 | 15 | - jakob@cvs.openbsd.org 2003/06/11 10:16:16 |
16 | [sshconnect.c] | 16 | [sshconnect.c] |
17 | clean up check_host_key() and improve SSHFP feedback. ok markus@ | 17 | clean up check_host_key() and improve SSHFP feedback. ok markus@ |
18 | - jakob@cvs.openbsd.org 2003/06/11 10:18:47 | ||
19 | [dns.c] | ||
20 | sync with check_host_key() change | ||
18 | 21 | ||
19 | 22 | ||
20 | 20030609 | 23 | 20030609 |
@@ -499,4 +502,4 @@ | |||
499 | - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo. | 502 | - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo. |
500 | Report from murple@murple.net, diagnosis from dtucker@zip.com.au | 503 | Report from murple@murple.net, diagnosis from dtucker@zip.com.au |
501 | 504 | ||
502 | $Id: ChangeLog,v 1.2795 2003/06/11 12:05:25 djm Exp $ | 505 | $Id: ChangeLog,v 1.2796 2003/06/11 12:05:45 djm Exp $ |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: dns.c,v 1.5 2003/05/15 02:27:15 jakob Exp $ */ | 1 | /* $OpenBSD: dns.c,v 1.6 2003/06/11 10:18:47 jakob Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright (c) 2003 Wesley Griffin. All rights reserved. | 4 | * Copyright (c) 2003 Wesley Griffin. All rights reserved. |
@@ -44,7 +44,7 @@ | |||
44 | #include "uuencode.h" | 44 | #include "uuencode.h" |
45 | 45 | ||
46 | extern char *__progname; | 46 | extern char *__progname; |
47 | RCSID("$OpenBSD: dns.c,v 1.5 2003/05/15 02:27:15 jakob Exp $"); | 47 | RCSID("$OpenBSD: dns.c,v 1.6 2003/06/11 10:18:47 jakob Exp $"); |
48 | 48 | ||
49 | #ifndef LWRES | 49 | #ifndef LWRES |
50 | static const char *errset_text[] = { | 50 | static const char *errset_text[] = { |
@@ -221,13 +221,8 @@ verify_host_key_dns(const char *hostname, struct sockaddr *address, | |||
221 | 221 | ||
222 | /* Matching algoritm and digest. */ | 222 | /* Matching algoritm and digest. */ |
223 | freerrset(fingerprints); | 223 | freerrset(fingerprints); |
224 | #ifdef DNSSEC | ||
225 | debug("matching host key fingerprint found in DNS"); | 224 | debug("matching host key fingerprint found in DNS"); |
226 | return DNS_VERIFY_OK; | 225 | return DNS_VERIFY_OK; |
227 | #else | ||
228 | logit("Matching host key fingerprint found in DNS."); | ||
229 | return DNS_VERIFY_ERROR; | ||
230 | #endif | ||
231 | } else { | 226 | } else { |
232 | /* Correct algorithm but bad digest */ | 227 | /* Correct algorithm but bad digest */ |
233 | debug("verify_hostkey_dns: failed"); | 228 | debug("verify_hostkey_dns: failed"); |