- markus@cvs.openbsd.org 2002/04/02 20:11:38
[ssh-rsa.c] ignore SSH_BUG_SIGBLOB for ssh-rsa; #187
This commit is contained in:
parent
2f3d52a2d6
commit
07739fe305
|
@ -36,6 +36,9 @@
|
||||||
- markus@cvs.openbsd.org 2002/04/02 17:37:48
|
- markus@cvs.openbsd.org 2002/04/02 17:37:48
|
||||||
[sftp.c]
|
[sftp.c]
|
||||||
always call log_init()
|
always call log_init()
|
||||||
|
- markus@cvs.openbsd.org 2002/04/02 20:11:38
|
||||||
|
[ssh-rsa.c]
|
||||||
|
ignore SSH_BUG_SIGBLOB for ssh-rsa; #187
|
||||||
|
|
||||||
20020401
|
20020401
|
||||||
- (stevesk) [monitor.c] PAM should work again; will *not* work with
|
- (stevesk) [monitor.c] PAM should work again; will *not* work with
|
||||||
|
@ -8143,4 +8146,4 @@
|
||||||
- Wrote replacements for strlcpy and mkdtemp
|
- Wrote replacements for strlcpy and mkdtemp
|
||||||
- Released 1.0pre1
|
- Released 1.0pre1
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.2018 2002/04/02 21:06:18 mouring Exp $
|
$Id: ChangeLog,v 1.2019 2002/04/03 03:03:04 mouring Exp $
|
||||||
|
|
10
ssh-rsa.c
10
ssh-rsa.c
|
@ -23,7 +23,7 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include "includes.h"
|
#include "includes.h"
|
||||||
RCSID("$OpenBSD: ssh-rsa.c,v 1.17 2002/03/29 19:18:33 stevesk Exp $");
|
RCSID("$OpenBSD: ssh-rsa.c,v 1.18 2002/04/02 20:11:38 markus Exp $");
|
||||||
|
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
|
@ -55,10 +55,6 @@ ssh_rsa_sign(
|
||||||
error("ssh_rsa_sign: no RSA key");
|
error("ssh_rsa_sign: no RSA key");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
if (datafellows & SSH_BUG_SIGBLOB) {
|
|
||||||
error("ssh_rsa_sign: SSH_BUG_SIGBLOB not supported");
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
nid = (datafellows & SSH_BUG_RSASIGMD5) ? NID_md5 : NID_sha1;
|
nid = (datafellows & SSH_BUG_RSASIGMD5) ? NID_md5 : NID_sha1;
|
||||||
if ((evp_md = EVP_get_digestbynid(nid)) == NULL) {
|
if ((evp_md = EVP_get_digestbynid(nid)) == NULL) {
|
||||||
error("ssh_rsa_sign: EVP_get_digestbynid %d failed", nid);
|
error("ssh_rsa_sign: EVP_get_digestbynid %d failed", nid);
|
||||||
|
@ -126,10 +122,6 @@ ssh_rsa_verify(
|
||||||
error("ssh_rsa_verify: no RSA key");
|
error("ssh_rsa_verify: no RSA key");
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
if (datafellows & SSH_BUG_SIGBLOB) {
|
|
||||||
error("ssh_rsa_verify: SSH_BUG_SIGBLOB not supported");
|
|
||||||
return -1;
|
|
||||||
}
|
|
||||||
if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
|
if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
|
||||||
error("ssh_rsa_verify: n too small: %d bits",
|
error("ssh_rsa_verify: n too small: %d bits",
|
||||||
BN_num_bits(key->rsa->n));
|
BN_num_bits(key->rsa->n));
|
||||||
|
|
Loading…
Reference in New Issue