diff options
Diffstat (limited to 'sshd.c')
-rw-r--r-- | sshd.c | 10 |
1 files changed, 8 insertions, 2 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: sshd.c,v 1.535 2019/06/06 05:13:13 otto Exp $ */ | 1 | /* $OpenBSD: sshd.c,v 1.536 2019/06/21 04:21:05 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -1375,7 +1375,7 @@ set_process_rdomain(struct ssh *ssh, const char *name) | |||
1375 | 1375 | ||
1376 | static void | 1376 | static void |
1377 | accumulate_host_timing_secret(struct sshbuf *server_cfg, | 1377 | accumulate_host_timing_secret(struct sshbuf *server_cfg, |
1378 | const struct sshkey *key) | 1378 | struct sshkey *key) |
1379 | { | 1379 | { |
1380 | static struct ssh_digest_ctx *ctx; | 1380 | static struct ssh_digest_ctx *ctx; |
1381 | u_char *hash; | 1381 | u_char *hash; |
@@ -1723,6 +1723,12 @@ main(int ac, char **av) | |||
1723 | &key, NULL)) != 0 && r != SSH_ERR_SYSTEM_ERROR) | 1723 | &key, NULL)) != 0 && r != SSH_ERR_SYSTEM_ERROR) |
1724 | do_log2(ll, "Unable to load host key \"%s\": %s", | 1724 | do_log2(ll, "Unable to load host key \"%s\": %s", |
1725 | options.host_key_files[i], ssh_err(r)); | 1725 | options.host_key_files[i], ssh_err(r)); |
1726 | if (r == 0 && (r = sshkey_shield_private(key)) != 0) { | ||
1727 | do_log2(ll, "Unable to shield host key \"%s\": %s", | ||
1728 | options.host_key_files[i], ssh_err(r)); | ||
1729 | sshkey_free(key); | ||
1730 | key = NULL; | ||
1731 | } | ||
1726 | if ((r = sshkey_load_public(options.host_key_files[i], | 1732 | if ((r = sshkey_load_public(options.host_key_files[i], |
1727 | &pubkey, NULL)) != 0 && r != SSH_ERR_SYSTEM_ERROR) | 1733 | &pubkey, NULL)) != 0 && r != SSH_ERR_SYSTEM_ERROR) |
1728 | do_log2(ll, "Unable to load host key \"%s\": %s", | 1734 | do_log2(ll, "Unable to load host key \"%s\": %s", |