diff options
author | dtucker <dtucker> | 2014-07-22 23:40:46 +0000 |
---|---|---|
committer | dtucker <dtucker> | 2014-07-22 23:40:46 +0000 |
commit | e04933a8f5a3608afd3e66d9b4fe1eabee8fe4a9 (patch) | |
tree | 61ba16b0fc072a3a1ae4dfcfb3906fb7bffd2a68 | |
parent | 4961152e292c5ca7b57c96dd5cb1112705e3b9ef (diff) | |
download | openssh-e04933a8f5a3608afd3e66d9b4fe1eabee8fe4a9.tar.gz |
- dtucker@cvs.openbsd.org 2014/07/22 01:18:50
[key.c]
Prevent spam from key_load_private_pem during hostbased auth. ok djm@
-rw-r--r-- | ChangeLog | 4 | ||||
-rw-r--r-- | key.c | 7 |
2 files changed, 9 insertions, 2 deletions
@@ -6,6 +6,10 @@ error messages. - (dtucker) [regress/unittests/sshkey/test_{file,fuzz,sshkey}.c] Wrap ecdsa- specific tests inside OPENSSL_HAS_ECC. + - (dtucker) OpenBSD CVS Sync + - dtucker@cvs.openbsd.org 2014/07/22 01:18:50 + [key.c] + Prevent spam from key_load_private_pem during hostbased auth. ok djm@ 20140721 - OpenBSD CVS Sync @@ -1,4 +1,4 @@ -/* $OpenBSD: key.c,v 1.121 2014/07/17 00:12:03 djm Exp $ */ +/* $OpenBSD: key.c,v 1.122 2014/07/22 01:18:50 dtucker Exp $ */ /* * placed in the public domain */ @@ -447,7 +447,10 @@ key_load_private_pem(int fd, int type, const char *passphrase, if ((r = sshkey_load_private_pem(fd, type, passphrase, &ret, commentp)) != 0) { fatal_on_fatal_errors(r, __func__, SSH_ERR_LIBCRYPTO_ERROR); - error("%s: %s", __func__, ssh_err(r)); + if (r == SSH_ERR_KEY_WRONG_PASSPHRASE) + debug("%s: %s", __func__, ssh_err(r)); + else + error("%s: %s", __func__, ssh_err(r)); return NULL; } return ret; |