diff options
Diffstat (limited to 'authfd.c')
-rw-r--r-- | authfd.c | 10 |
1 files changed, 5 insertions, 5 deletions
@@ -332,7 +332,7 @@ ssh_get_next_identity(AuthenticationConnection *auth, char **comment, int versio | |||
332 | buffer_get_bignum(&auth->identities, key->rsa->n); | 332 | buffer_get_bignum(&auth->identities, key->rsa->n); |
333 | *comment = buffer_get_string(&auth->identities, NULL); | 333 | *comment = buffer_get_string(&auth->identities, NULL); |
334 | if (bits != BN_num_bits(key->rsa->n)) | 334 | if (bits != BN_num_bits(key->rsa->n)) |
335 | logit("Warning: identity keysize mismatch: actual %d, announced %u", | 335 | log("Warning: identity keysize mismatch: actual %d, announced %u", |
336 | BN_num_bits(key->rsa->n), bits); | 336 | BN_num_bits(key->rsa->n), bits); |
337 | break; | 337 | break; |
338 | case 2: | 338 | case 2: |
@@ -373,7 +373,7 @@ ssh_decrypt_challenge(AuthenticationConnection *auth, | |||
373 | if (key->type != KEY_RSA1) | 373 | if (key->type != KEY_RSA1) |
374 | return 0; | 374 | return 0; |
375 | if (response_type == 0) { | 375 | if (response_type == 0) { |
376 | logit("Compatibility with ssh protocol version 1.0 no longer supported."); | 376 | log("Compatibility with ssh protocol version 1.0 no longer supported."); |
377 | return 0; | 377 | return 0; |
378 | } | 378 | } |
379 | buffer_init(&buffer); | 379 | buffer_init(&buffer); |
@@ -392,7 +392,7 @@ ssh_decrypt_challenge(AuthenticationConnection *auth, | |||
392 | type = buffer_get_char(&buffer); | 392 | type = buffer_get_char(&buffer); |
393 | 393 | ||
394 | if (agent_failed(type)) { | 394 | if (agent_failed(type)) { |
395 | logit("Agent admitted failure to authenticate using the key."); | 395 | log("Agent admitted failure to authenticate using the key."); |
396 | } else if (type != SSH_AGENT_RSA_RESPONSE) { | 396 | } else if (type != SSH_AGENT_RSA_RESPONSE) { |
397 | fatal("Bad authentication response: %d", type); | 397 | fatal("Bad authentication response: %d", type); |
398 | } else { | 398 | } else { |
@@ -441,7 +441,7 @@ ssh_agent_sign(AuthenticationConnection *auth, | |||
441 | } | 441 | } |
442 | type = buffer_get_char(&msg); | 442 | type = buffer_get_char(&msg); |
443 | if (agent_failed(type)) { | 443 | if (agent_failed(type)) { |
444 | logit("Agent admitted failure to sign using the key."); | 444 | log("Agent admitted failure to sign using the key."); |
445 | } else if (type != SSH2_AGENT_SIGN_RESPONSE) { | 445 | } else if (type != SSH2_AGENT_SIGN_RESPONSE) { |
446 | fatal("Bad authentication response: %d", type); | 446 | fatal("Bad authentication response: %d", type); |
447 | } else { | 447 | } else { |
@@ -641,7 +641,7 @@ decode_reply(int type) | |||
641 | case SSH_AGENT_FAILURE: | 641 | case SSH_AGENT_FAILURE: |
642 | case SSH_COM_AGENT2_FAILURE: | 642 | case SSH_COM_AGENT2_FAILURE: |
643 | case SSH2_AGENT_FAILURE: | 643 | case SSH2_AGENT_FAILURE: |
644 | logit("SSH_AGENT_FAILURE"); | 644 | log("SSH_AGENT_FAILURE"); |
645 | return 0; | 645 | return 0; |
646 | case SSH_AGENT_SUCCESS: | 646 | case SSH_AGENT_SUCCESS: |
647 | return 1; | 647 | return 1; |