diff options
author | Darren Tucker <dtucker@zip.com.au> | 2006-05-06 17:41:51 +1000 |
---|---|---|
committer | Darren Tucker <dtucker@zip.com.au> | 2006-05-06 17:41:51 +1000 |
commit | 232b76f9f8b883db9ff7e7a3a9942ad7a28119e0 (patch) | |
tree | d7570bab5a189d98e81a837116c32197eae94774 /authfile.h | |
parent | d8093e49bf06813a8c97cbc90810f4863388af77 (diff) | |
download | openssh-git-232b76f9f8b883db9ff7e7a3a9942ad7a28119e0.tar.gz |
- dtucker@cvs.openbsd.org 2006/04/25 08:02:27
[authfile.c authfile.h sshconnect2.c ssh.c sshconnect1.c]
Prevent ssh from trying to open private keys with bad permissions more than
once or prompting for their passphrases (which it subsequently ignores
anyway), similar to a previous change in ssh-add. bz #1186, ok djm@
Diffstat (limited to 'authfile.h')
-rw-r--r-- | authfile.h | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -1,4 +1,4 @@ -/* $OpenBSD: authfile.h,v 1.12 2006/03/25 22:22:42 djm Exp $ */ +/* $OpenBSD: authfile.h,v 1.13 2006/04/25 08:02:27 dtucker Exp $ */ /* * Author: Tatu Ylonen <ylo@cs.hut.fi> @@ -19,7 +19,7 @@ int key_save_private(Key *, const char *, const char *, const char *); Key *key_load_public(const char *, char **); Key *key_load_public_type(int, const char *, char **); Key *key_load_private(const char *, const char *, char **); -Key *key_load_private_type(int, const char *, const char *, char **); +Key *key_load_private_type(int, const char *, const char *, char **, int *); Key *key_load_private_pem(int, int, const char *, char **); int key_perm_ok(int, const char *); |