comparison cli-kex.c @ 340:454a34b2dfd1

Fixes from Erik Hovland: cli-authpubkey.c: fix leak of keybuf cli-kex.c: fix leak of fingerprint fp cli-service.c: remove commented out code dropbearkey.c: don't attepmt to free NULL key on failure common-kex.c: only free key if it is initialised keyimport.c: remove dead encrypted-key code don't leak a FILE* loading OpenSSH keys rsa.c, dss.c: check return values for some libtommath functions svr-kex.c: check return value retrieving DH kex mpint svr-tcpfwd.c: fix null-dereference if remote tcp forward request fails tcp-accept.c: don't incorrectly free the tcpinfo var
author Matt Johnston <matt@ucc.asn.au>
date Fri, 07 Jul 2006 09:17:18 +0000
parents 84aa4e60bd3c
children ab57ba0cb667
comparison
equal deleted inserted replaced
339:31743c9bdf78 340:454a34b2dfd1
120 120
121 fp = sign_key_fingerprint(keyblob, keybloblen); 121 fp = sign_key_fingerprint(keyblob, keybloblen);
122 fprintf(stderr, "\nHost '%s' is not in the trusted hosts file.\n(fingerprint %s)\nDo you want to continue connecting? (y/n)\n", 122 fprintf(stderr, "\nHost '%s' is not in the trusted hosts file.\n(fingerprint %s)\nDo you want to continue connecting? (y/n)\n",
123 cli_opts.remotehost, 123 cli_opts.remotehost,
124 fp); 124 fp);
125 m_free(fp);
125 126
126 tty = fopen(_PATH_TTY, "r"); 127 tty = fopen(_PATH_TTY, "r");
127 if (tty) { 128 if (tty) {
128 response = getc(tty); 129 response = getc(tty);
129 fclose(tty); 130 fclose(tty);
130 } else { 131 } else {
131 response = getc(stdin); 132 response = getc(stdin);
132 } 133 }
133 134
134 if (response == 'y') { 135 if (response == 'y') {
135 m_free(fp);
136 return; 136 return;
137 } 137 }
138 138
139 dropbear_exit("Didn't validate host key"); 139 dropbear_exit("Didn't validate host key");
140 } 140 }