source:
trunk/server/common/patches/openssh-no-spurious-correct-key-incorrect-host-messages.patch
@
2136
Last change on this file since 2136 was 1739, checked in by mitchb, 14 years ago | |
---|---|
File size: 1.1 KB |
-
openssh/auth2-pubkey.c
old new 233 233 continue; 234 234 } 235 235 } 236 if (auth_parse_options(pw, key_options, file, linenum) != 1)237 continue;238 236 if (key->type == KEY_RSA_CERT || key->type == KEY_DSA_CERT) { 239 if (!key_is_cert_authority)240 continue;241 237 if (!key_equal(found, key->cert->signature_key)) 242 238 continue; 239 if (auth_parse_options(pw, key_options, file, 240 linenum) != 1) 241 continue; 242 if (!key_is_cert_authority) 243 continue; 243 244 debug("matching CA found: file %s, line %lu", 244 245 file, linenum); 245 246 fp = key_fingerprint(found, SSH_FP_MD5, … … 258 259 continue; 259 260 found_key = 1; 260 261 break; 261 } else if (!key_is_cert_authority && key_equal(found, key)) { 262 } else if (key_equal(found, key)) { 263 if (auth_parse_options(pw, key_options, file, 264 linenum) != 1) 265 continue; 266 if (key_is_cert_authority) 267 continue; 262 268 found_key = 1; 263 269 debug("matching key found: file %s, line %lu", 264 270 file, linenum);
Note: See TracBrowser
for help on using the repository browser.