- markus@cvs.openbsd.org 2001/06/23 03:03:59
[sshd.8]
draft-ietf-secsh-dh-group-exchange-01.txt
+ - markus@cvs.openbsd.org 2001/06/23 03:04:42
+ [auth2.c auth-rh-rsa.c]
+ restore correct ignore_user_known_hosts logic.
20010622
- (stevesk) handle systems without pw_expire and pw_change.
*/
#include "includes.h"
-RCSID("$OpenBSD: auth-rh-rsa.c,v 1.24 2001/06/23 00:20:57 markus Exp $");
+RCSID("$OpenBSD: auth-rh-rsa.c,v 1.25 2001/06/23 03:04:42 markus Exp $");
#include "packet.h"
#include "xmalloc.h"
host_status = check_key_in_hostfiles(pw, client_key, canonical_hostname,
_PATH_SSH_SYSTEM_HOSTFILE,
- options.ignore_user_known_hosts ? _PATH_SSH_USER_HOSTFILE : NULL);
+ options.ignore_user_known_hosts ? NULL : _PATH_SSH_USER_HOSTFILE);
key_free(client_key);
*/
#include "includes.h"
-RCSID("$OpenBSD: auth2.c,v 1.64 2001/06/23 00:20:58 markus Exp $");
+RCSID("$OpenBSD: auth2.c,v 1.65 2001/06/23 03:04:43 markus Exp $");
#include <openssl/evp.h>
host_status = check_key_in_hostfiles(pw, key, lookup,
_PATH_SSH_SYSTEM_HOSTFILE,
- options.ignore_user_known_hosts ? _PATH_SSH_USER_HOSTFILE : NULL);
+ options.ignore_user_known_hosts ? NULL : _PATH_SSH_USER_HOSTFILE);
/* backward compat if no key has been found. */
if (host_status == HOST_NEW)
host_status = check_key_in_hostfiles(pw, key, lookup,
_PATH_SSH_SYSTEM_HOSTFILE2,
- options.ignore_user_known_hosts ? _PATH_SSH_USER_HOSTFILE2 :
- NULL);
+ options.ignore_user_known_hosts ? NULL :
+ _PATH_SSH_USER_HOSTFILE2);
return (host_status == HOST_OK);
}