summaryrefslogtreecommitdiff
path: root/clientloop.c
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2021-05-03 00:16:45 +0000
committerDamien Miller <djm@mindrot.org>2021-05-03 11:05:31 +1000
commitac31aa3c6341905935e75f0539cf4a61bbe99779 (patch)
treeb1b8b2c49574808e9c109c9097c23a503b28c370 /clientloop.c
parent8e32e97e788e0676ce83018a742203614df6a2b3 (diff)
downloadopenssh-git-ac31aa3c6341905935e75f0539cf4a61bbe99779.tar.gz
upstream: more debugging for UpdateHostKeys signature failures
OpenBSD-Commit-ID: 1ee95f03875e1725df15d5e4bea3e73493d57d36
Diffstat (limited to 'clientloop.c')
-rw-r--r--clientloop.c7
1 files changed, 5 insertions, 2 deletions
diff --git a/clientloop.c b/clientloop.c
index 7c91104f..cbfe098b 100644
--- a/clientloop.c
+++ b/clientloop.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: clientloop.c,v 1.360 2021/04/30 04:29:53 djm Exp $ */
+/* $OpenBSD: clientloop.c,v 1.361 2021/05/03 00:16:45 djm Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -2154,11 +2154,14 @@ client_global_hostkeys_private_confirm(struct ssh *ssh, int type,
*/
use_kexsigtype = kexsigtype == KEY_RSA &&
sshkey_type_plain(ctx->keys[i]->type) == KEY_RSA;
+ debug3_f("verify %s key %zu using %s sigalg",
+ sshkey_type(ctx->keys[i]), i,
+ use_kexsigtype ? ssh->kex->hostkey_alg : NULL);
if ((r = sshkey_verify(ctx->keys[i], sig, siglen,
sshbuf_ptr(signdata), sshbuf_len(signdata),
use_kexsigtype ? ssh->kex->hostkey_alg : NULL, 0,
NULL)) != 0) {
- error_f("server gave bad signature for %s key %zu",
+ error_fr(r, "server gave bad signature for %s key %zu",
sshkey_type(ctx->keys[i]), i);
goto out;
}