diff options
author | 2020-02-28 01:06:05 +0000 | |
---|---|---|
committer | 2020-02-28 01:06:05 +0000 | |
commit | 50c28975851c67b8d1cfec32047aa5b0bdb15424 (patch) | |
tree | 7740008bfd0d0f8d67c75d0423c7e32683ac9ff5 /usr.bin/ssh/ssh-sk.c | |
parent | The HTML standard does not allow self-closing syntax for non-void elements. (diff) | |
download | wireguard-openbsd-50c28975851c67b8d1cfec32047aa5b0bdb15424.tar.xz wireguard-openbsd-50c28975851c67b8d1cfec32047aa5b0bdb15424.zip |
better error message when trying to use a FIDO key function and
SecurityKeyProvider is empty
Diffstat (limited to 'usr.bin/ssh/ssh-sk.c')
-rw-r--r-- | usr.bin/ssh/ssh-sk.c | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/usr.bin/ssh/ssh-sk.c b/usr.bin/ssh/ssh-sk.c index 0cc6afa5282..85806ab33ba 100644 --- a/usr.bin/ssh/ssh-sk.c +++ b/usr.bin/ssh/ssh-sk.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ssh-sk.c,v 1.27 2020/02/06 22:30:54 naddy Exp $ */ +/* $OpenBSD: ssh-sk.c,v 1.28 2020/02/28 01:06:05 djm Exp $ */ /* * Copyright (c) 2019 Google LLC * @@ -94,6 +94,10 @@ sshsk_open(const char *path) struct sshsk_provider *ret = NULL; uint32_t version; + if (path == NULL || *path == '\0') { + error("No FIDO SecurityKeyProvider specified"); + return NULL; + } if ((ret = calloc(1, sizeof(*ret))) == NULL) { error("%s: calloc failed", __func__); return NULL; |