diff options
author | damien <damien> | 2000-04-30 00:00:53 +0000 |
---|---|---|
committer | damien <damien> | 2000-04-30 00:00:53 +0000 |
commit | 7f25b15736e76fd76aa72ea25a594aaa813cc398 (patch) | |
tree | 8c9a5ced5a8daed1fdddb775c0a2273d79477701 /auth1.c | |
parent | d83900e3773087640de1d6f033817cbf3a994668 (diff) | |
download | openssh-7f25b15736e76fd76aa72ea25a594aaa813cc398.tar.gz |
- More OpenBSD updates:
[session.c]
- don't call chan_write_failed() if we are not writing
[auth-rsa.c auth1.c authfd.c hostfile.c ssh-agent.c]
- keysize warnings error() -> log()
Diffstat (limited to 'auth1.c')
-rw-r--r-- | auth1.c | 6 |
1 files changed, 3 insertions, 3 deletions
@@ -4,7 +4,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth1.c,v 1.1 2000/04/26 21:28:32 markus Exp $"); +RCSID("$OpenBSD: auth1.c,v 1.2 2000/04/29 18:11:52 markus Exp $"); #include "xmalloc.h" #include "rsa.h" @@ -262,8 +262,8 @@ do_authloop(struct passwd * pw) packet_get_bignum(client_host_key->n, &nlen); if (bits != BN_num_bits(client_host_key->n)) - error("Warning: keysize mismatch for client_host_key: " - "actual %d, announced %d", BN_num_bits(client_host_key->n), bits); + log("Warning: keysize mismatch for client_host_key: " + "actual %d, announced %d", BN_num_bits(client_host_key->n), bits); packet_integrity_check(plen, (4 + ulen) + 4 + elen + nlen, type); authenticated = auth_rhosts_rsa(pw, client_user, client_host_key); |