=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/Attic/auth-rh-rsa.c,v retrieving revision 1.34 retrieving revision 1.34.6.1 diff -u -r1.34 -r1.34.6.1 --- src/usr.bin/ssh/Attic/auth-rh-rsa.c 2002/03/25 09:25:06 1.34 +++ src/usr.bin/ssh/Attic/auth-rh-rsa.c 2003/09/16 20:50:42 1.34.6.1 @@ -13,7 +13,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth-rh-rsa.c,v 1.34 2002/03/25 09:25:06 markus Exp $"); +RCSID("$OpenBSD: auth-rh-rsa.c,v 1.34.6.1 2003/09/16 20:50:42 brad Exp $"); #include "packet.h" #include "uidswap.h" @@ -63,7 +63,7 @@ client_host_key->rsa == NULL) return 0; - chost = (char *)get_canonical_hostname(options.verify_reverse_mapping); + chost = (char *)get_canonical_hostname(options.use_dns); debug("Rhosts RSA authentication: canonical host %.900s", chost); if (!PRIVSEP(auth_rhosts_rsa_key_allowed(pw, cuser, chost, client_host_key))) { @@ -75,7 +75,7 @@ /* Perform the challenge-response dialog with the client for the host key. */ if (!auth_rsa_challenge_dialog(client_host_key)) { - log("Client on %.800s failed to respond correctly to host authentication.", + logit("Client on %.800s failed to respond correctly to host authentication.", chost); return 0; }