View | Details | Raw Unified | Return to bug 2939 | Differences between
and this patch

Collapse All | Expand All

(-)a/auth2-pubkey.c (+11 lines)
Lines 122-127 userauth_pubkey(struct ssh *ssh) Link Here
122
                   "(received %d, expected %d)", __func__, key->type, pktype);
122
                   "(received %d, expected %d)", __func__, key->type, pktype);
123
               goto done;
123
               goto done;
124
       }
124
       }
125
       if (log_level_get() >= SYSLOG_LEVEL_DEBUG1) {
126
               if ((b = sshbuf_new()) == NULL)
127
                       fatal("%s: sshbuf_new failed", __func__);
128
               if ((r = sshkey_format_text(key, b)) != 0)
129
                       fatal("%s: sshkey_format_text failed: %s", __func__,
130
                               ssh_err(r));
131
               debug("%s: public key of %s: %s", __func__, authctxt->user,
132
                       sshbuf_ptr(b));
133
               sshbuf_free(b);
134
               b = NULL;
135
       }
125
       if (sshkey_type_plain(key->type) == KEY_RSA &&
136
       if (sshkey_type_plain(key->type) == KEY_RSA &&
126
           (ssh->compat & SSH_BUG_RSASIGMD5) != 0) {
137
           (ssh->compat & SSH_BUG_RSASIGMD5) != 0) {
127
               logit("Refusing RSA key because client uses unsafe "
138
               logit("Refusing RSA key because client uses unsafe "

Return to bug 2939