diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2002-03-27 19:00:59 +0100 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2002-03-27 19:00:59 +0100 |
commit | b57a4bf93f02d4012ca28f170938fb7a66e0219b (patch) | |
tree | 5bd8e7fe935d46cac8c21fcc4bc64a2735045cf6 /monitor.c | |
parent | - markus@cvs.openbsd.org 2002/03/26 23:14:51 (diff) | |
download | openssh-b57a4bf93f02d4012ca28f170938fb7a66e0219b.tar.xz openssh-b57a4bf93f02d4012ca28f170938fb7a66e0219b.zip |
- mouring@cvs.openbsd.org 2002/03/27 11:45:42
[monitor.c]
monitor_allowed_key() returns int instead of pointer. ok markus@
Diffstat (limited to 'monitor.c')
-rw-r--r-- | monitor.c | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -25,7 +25,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: monitor.c,v 1.7 2002/03/24 23:20:00 stevesk Exp $"); +RCSID("$OpenBSD: monitor.c,v 1.8 2002/03/27 17:45:42 mouring Exp $"); #include <openssl/dh.h> @@ -866,7 +866,7 @@ mm_answer_keyverify(int socket, Buffer *m) data = buffer_get_string(m, &datalen); if (hostbased_cuser == NULL || hostbased_chost == NULL || - monitor_allowed_key(blob, bloblen) == NULL) + !monitor_allowed_key(blob, bloblen)) fatal("%s: bad key, not previously allowed", __FUNCTION__); key = key_from_blob(blob, bloblen); |