From 73473230c5231c6680172d4009fceb3081824d2f Mon Sep 17 00:00:00 2001 From: mouring Date: Mon, 25 Jun 2001 04:40:49 +0000 Subject: [PATCH] - markus@cvs.openbsd.org 2001/06/23 03:04:42 [auth2.c auth-rh-rsa.c] restore correct ignore_user_known_hosts logic. --- ChangeLog | 3 +++ auth-rh-rsa.c | 4 ++-- auth2.c | 8 ++++---- 3 files changed, 9 insertions(+), 6 deletions(-) diff --git a/ChangeLog b/ChangeLog index 0d38c8be..2ae6b1ba 100644 --- a/ChangeLog +++ b/ChangeLog @@ -54,6 +54,9 @@ - markus@cvs.openbsd.org 2001/06/23 03:03:59 [sshd.8] draft-ietf-secsh-dh-group-exchange-01.txt + - markus@cvs.openbsd.org 2001/06/23 03:04:42 + [auth2.c auth-rh-rsa.c] + restore correct ignore_user_known_hosts logic. 20010622 - (stevesk) handle systems without pw_expire and pw_change. diff --git a/auth-rh-rsa.c b/auth-rh-rsa.c index 870436b5..5bca5a97 100644 --- a/auth-rh-rsa.c +++ b/auth-rh-rsa.c @@ -13,7 +13,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth-rh-rsa.c,v 1.24 2001/06/23 00:20:57 markus Exp $"); +RCSID("$OpenBSD: auth-rh-rsa.c,v 1.25 2001/06/23 03:04:42 markus Exp $"); #include "packet.h" #include "xmalloc.h" @@ -61,7 +61,7 @@ auth_rhosts_rsa(struct passwd *pw, const char *client_user, RSA *client_host_key host_status = check_key_in_hostfiles(pw, client_key, canonical_hostname, _PATH_SSH_SYSTEM_HOSTFILE, - options.ignore_user_known_hosts ? _PATH_SSH_USER_HOSTFILE : NULL); + options.ignore_user_known_hosts ? NULL : _PATH_SSH_USER_HOSTFILE); key_free(client_key); diff --git a/auth2.c b/auth2.c index 3d2dcdc6..272683bb 100644 --- a/auth2.c +++ b/auth2.c @@ -23,7 +23,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth2.c,v 1.64 2001/06/23 00:20:58 markus Exp $"); +RCSID("$OpenBSD: auth2.c,v 1.65 2001/06/23 03:04:43 markus Exp $"); #include @@ -791,14 +791,14 @@ hostbased_key_allowed(struct passwd *pw, const char *cuser, char *chost, host_status = check_key_in_hostfiles(pw, key, lookup, _PATH_SSH_SYSTEM_HOSTFILE, - options.ignore_user_known_hosts ? _PATH_SSH_USER_HOSTFILE : NULL); + options.ignore_user_known_hosts ? NULL : _PATH_SSH_USER_HOSTFILE); /* backward compat if no key has been found. */ if (host_status == HOST_NEW) host_status = check_key_in_hostfiles(pw, key, lookup, _PATH_SSH_SYSTEM_HOSTFILE2, - options.ignore_user_known_hosts ? _PATH_SSH_USER_HOSTFILE2 : - NULL); + options.ignore_user_known_hosts ? NULL : + _PATH_SSH_USER_HOSTFILE2); return (host_status == HOST_OK); } -- 2.45.2