- jakob@cvs.openbsd.org 2003/05/15 02:27:15
[dns.c] add missing freerrset
This commit is contained in:
parent
5975cf12c3
commit
b0622653ba
|
@ -19,6 +19,9 @@
|
||||||
- jakob@cvs.openbsd.org 2003/05/15 01:48:10
|
- jakob@cvs.openbsd.org 2003/05/15 01:48:10
|
||||||
[readconf.c readconf.h servconf.c servconf.h]
|
[readconf.c readconf.h servconf.c servconf.h]
|
||||||
always parse kerberos options. ok djm@ markus@
|
always parse kerberos options. ok djm@ markus@
|
||||||
|
- jakob@cvs.openbsd.org 2003/05/15 02:27:15
|
||||||
|
[dns.c]
|
||||||
|
add missing freerrset
|
||||||
- (djm) Always parse UsePAM
|
- (djm) Always parse UsePAM
|
||||||
- (djm) Configure glue for DNS support (code doesn't work in portable yet)
|
- (djm) Configure glue for DNS support (code doesn't work in portable yet)
|
||||||
- (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
|
- (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
|
||||||
|
@ -1499,4 +1502,4 @@
|
||||||
save auth method before monitor_reset_key_state(); bugzilla bug #284;
|
save auth method before monitor_reset_key_state(); bugzilla bug #284;
|
||||||
ok provos@
|
ok provos@
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.2709 2003/05/15 03:23:36 djm Exp $
|
$Id: ChangeLog,v 1.2710 2003/05/15 03:27:28 djm Exp $
|
||||||
|
|
6
dns.c
6
dns.c
|
@ -1,4 +1,4 @@
|
||||||
/* $OpenBSD: dns.c,v 1.4 2003/05/14 23:29:22 jakob Exp $ */
|
/* $OpenBSD: dns.c,v 1.5 2003/05/15 02:27:15 jakob Exp $ */
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2003 Wesley Griffin. All rights reserved.
|
* Copyright (c) 2003 Wesley Griffin. All rights reserved.
|
||||||
|
@ -44,7 +44,7 @@
|
||||||
#include "uuencode.h"
|
#include "uuencode.h"
|
||||||
|
|
||||||
extern char *__progname;
|
extern char *__progname;
|
||||||
RCSID("$OpenBSD: dns.c,v 1.4 2003/05/14 23:29:22 jakob Exp $");
|
RCSID("$OpenBSD: dns.c,v 1.5 2003/05/15 02:27:15 jakob Exp $");
|
||||||
|
|
||||||
#ifndef LWRES
|
#ifndef LWRES
|
||||||
static const char *errset_text[] = {
|
static const char *errset_text[] = {
|
||||||
|
@ -183,6 +183,7 @@ verify_host_key_dns(const char *hostname, struct sockaddr *address,
|
||||||
/* Only accept validated answers */
|
/* Only accept validated answers */
|
||||||
if (!fingerprints->rri_flags & RRSET_VALIDATED) {
|
if (!fingerprints->rri_flags & RRSET_VALIDATED) {
|
||||||
error("Ignored unvalidated fingerprint from DNS.");
|
error("Ignored unvalidated fingerprint from DNS.");
|
||||||
|
freerrset(fingerprints);
|
||||||
return DNS_VERIFY_ERROR;
|
return DNS_VERIFY_ERROR;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
@ -193,6 +194,7 @@ verify_host_key_dns(const char *hostname, struct sockaddr *address,
|
||||||
if (!dns_read_key(&hostkey_algorithm, &hostkey_digest_type,
|
if (!dns_read_key(&hostkey_algorithm, &hostkey_digest_type,
|
||||||
&hostkey_digest, &hostkey_digest_len, hostkey)) {
|
&hostkey_digest, &hostkey_digest_len, hostkey)) {
|
||||||
error("Error calculating host key fingerprint.");
|
error("Error calculating host key fingerprint.");
|
||||||
|
freerrset(fingerprints);
|
||||||
return DNS_VERIFY_ERROR;
|
return DNS_VERIFY_ERROR;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue