- RSAless operation patch from kevin_oconnor@standardandpoors.com
This commit is contained in:
parent
615f939ebb
commit
c4be7ce669
1
CREDITS
1
CREDITS
|
@ -33,6 +33,7 @@ Jim Knoble <jmknoble@pobox.com> - Many patches
|
||||||
jonchen (email unknown) - the original author of PAM support of SSH
|
jonchen (email unknown) - the original author of PAM support of SSH
|
||||||
Juergen Keil <jk@tools.de> - scp bugfixing
|
Juergen Keil <jk@tools.de> - scp bugfixing
|
||||||
Kees Cook <cook@cpoint.net> - scp fixes
|
Kees Cook <cook@cpoint.net> - scp fixes
|
||||||
|
Kevin O'Connor <kevin_oconnor@standardandpoors.com> - RSAless operation
|
||||||
Kiyokazu SUTO <suto@ks-and-ks.ne.jp> - Bugfixes
|
Kiyokazu SUTO <suto@ks-and-ks.ne.jp> - Bugfixes
|
||||||
Lutz Jaenicke <Lutz.Jaenicke@aet.TU-Cottbus.DE> - Bugfixes
|
Lutz Jaenicke <Lutz.Jaenicke@aet.TU-Cottbus.DE> - Bugfixes
|
||||||
Marc G. Fournier <marc.fournier@acadiau.ca> - Solaris patches
|
Marc G. Fournier <marc.fournier@acadiau.ca> - Solaris patches
|
||||||
|
|
|
@ -31,6 +31,7 @@
|
||||||
- Solaris fixes
|
- Solaris fixes
|
||||||
- Checking for ssize_t and memmove. Based on patch from SAKAI Kiyotaka
|
- Checking for ssize_t and memmove. Based on patch from SAKAI Kiyotaka
|
||||||
<ksakai@kso.netwk.ntt-at.co.jp>
|
<ksakai@kso.netwk.ntt-at.co.jp>
|
||||||
|
- RSAless operation patch from kevin_oconnor@standardandpoors.com
|
||||||
|
|
||||||
20000513
|
20000513
|
||||||
- Fix for non-recognised DSA keys from Arkadiusz Miskiewicz
|
- Fix for non-recognised DSA keys from Arkadiusz Miskiewicz
|
||||||
|
|
9
sshd.c
9
sshd.c
|
@ -389,9 +389,12 @@ void
|
||||||
destroy_sensitive_data(void)
|
destroy_sensitive_data(void)
|
||||||
{
|
{
|
||||||
/* Destroy the private and public keys. They will no longer be needed. */
|
/* Destroy the private and public keys. They will no longer be needed. */
|
||||||
RSA_free(public_key);
|
if (public_key)
|
||||||
RSA_free(sensitive_data.private_key);
|
RSA_free(public_key);
|
||||||
RSA_free(sensitive_data.host_key);
|
if (sensitive_data.private_key)
|
||||||
|
RSA_free(sensitive_data.private_key);
|
||||||
|
if (sensitive_data.host_key)
|
||||||
|
RSA_free(sensitive_data.host_key);
|
||||||
if (sensitive_data.dsa_host_key != NULL)
|
if (sensitive_data.dsa_host_key != NULL)
|
||||||
key_free(sensitive_data.dsa_host_key);
|
key_free(sensitive_data.dsa_host_key);
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue