]> andersk Git - openssh.git/commitdiff
- mouring@cvs.openbsd.org 2002/03/27 11:45:42
authormouring <mouring>
Wed, 27 Mar 2002 18:00:59 +0000 (18:00 +0000)
committermouring <mouring>
Wed, 27 Mar 2002 18:00:59 +0000 (18:00 +0000)
     [monitor.c]
     monitor_allowed_key() returns int instead of pointer.  ok markus@

ChangeLog
monitor.c

index e08bba778a1c926e831d7d5136d28986a2c4b6b2..5795dd485e6ea1ed8c354dac0900878315e7aa31 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
    - markus@cvs.openbsd.org 2002/03/26 23:14:51
      [kex.c]
      generate a new cookie for each SSH2_MSG_KEXINIT message we send out
-
+   - mouring@cvs.openbsd.org 2002/03/27 11:45:42
+     [monitor.c]
+     monitor_allowed_key() returns int instead of pointer.  ok markus@
+  
 20020325
  - (stevesk) import OpenBSD <sys/tree.h> as "openbsd-compat/tree.h"
  - (bal) OpenBSD CVS Sync
index 8f682e5bc0391232998a9a73d78b0de4ea403960..008010795fa17b5fa15c8cee785fe1c4a5683f80 100644 (file)
--- a/monitor.c
+++ b/monitor.c
@@ -25,7 +25,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: monitor.c,v 1.7 2002/03/24 23:20:00 stevesk Exp $");
+RCSID("$OpenBSD: monitor.c,v 1.8 2002/03/27 17:45:42 mouring Exp $");
 
 #include <openssl/dh.h>
 
@@ -866,7 +866,7 @@ mm_answer_keyverify(int socket, Buffer *m)
        data = buffer_get_string(m, &datalen);
 
        if (hostbased_cuser == NULL || hostbased_chost == NULL ||
-          monitor_allowed_key(blob, bloblen) == NULL)
+         !monitor_allowed_key(blob, bloblen))
                fatal("%s: bad key, not previously allowed", __FUNCTION__);
 
        key = key_from_blob(blob, bloblen);
This page took 0.05707 seconds and 5 git commands to generate.