Mercurial > dropbear
comparison cli-kex.c @ 340:454a34b2dfd1
Fixes from Erik Hovland:
cli-authpubkey.c:
fix leak of keybuf
cli-kex.c:
fix leak of fingerprint fp
cli-service.c:
remove commented out code
dropbearkey.c:
don't attepmt to free NULL key on failure
common-kex.c:
only free key if it is initialised
keyimport.c:
remove dead encrypted-key code
don't leak a FILE* loading OpenSSH keys
rsa.c, dss.c:
check return values for some libtommath functions
svr-kex.c:
check return value retrieving DH kex mpint
svr-tcpfwd.c:
fix null-dereference if remote tcp forward request fails
tcp-accept.c:
don't incorrectly free the tcpinfo var
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Fri, 07 Jul 2006 09:17:18 +0000 |
parents | 84aa4e60bd3c |
children | ab57ba0cb667 |
comparison
equal
deleted
inserted
replaced
339:31743c9bdf78 | 340:454a34b2dfd1 |
---|---|
120 | 120 |
121 fp = sign_key_fingerprint(keyblob, keybloblen); | 121 fp = sign_key_fingerprint(keyblob, keybloblen); |
122 fprintf(stderr, "\nHost '%s' is not in the trusted hosts file.\n(fingerprint %s)\nDo you want to continue connecting? (y/n)\n", | 122 fprintf(stderr, "\nHost '%s' is not in the trusted hosts file.\n(fingerprint %s)\nDo you want to continue connecting? (y/n)\n", |
123 cli_opts.remotehost, | 123 cli_opts.remotehost, |
124 fp); | 124 fp); |
125 m_free(fp); | |
125 | 126 |
126 tty = fopen(_PATH_TTY, "r"); | 127 tty = fopen(_PATH_TTY, "r"); |
127 if (tty) { | 128 if (tty) { |
128 response = getc(tty); | 129 response = getc(tty); |
129 fclose(tty); | 130 fclose(tty); |
130 } else { | 131 } else { |
131 response = getc(stdin); | 132 response = getc(stdin); |
132 } | 133 } |
133 | 134 |
134 if (response == 'y') { | 135 if (response == 'y') { |
135 m_free(fp); | |
136 return; | 136 return; |
137 } | 137 } |
138 | 138 |
139 dropbear_exit("Didn't validate host key"); | 139 dropbear_exit("Didn't validate host key"); |
140 } | 140 } |