summaryrefslogtreecommitdiff
path: root/auth2-pubkey.c
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2018-10-19 21:29:01 +0100
committerColin Watson <cjwatson@debian.org>2018-10-20 22:54:15 +0100
commitd80ebbf028196b2478beebf5a290b97f35e1eed9 (patch)
tree6666a5484923a26738675ff27a6186cfe15d4cad /auth2-pubkey.c
parent4f5bbf3f11efeec65bbd56464b20a19bd250e5cc (diff)
parent1d2a55436d4b556269f42ad5f7e16608b5a8ed74 (diff)
New upstream release (7.9p1)
Diffstat (limited to 'auth2-pubkey.c')
-rw-r--r--auth2-pubkey.c12
1 files changed, 9 insertions, 3 deletions
diff --git a/auth2-pubkey.c b/auth2-pubkey.c
index 3d9f9af1f..2fb5950ea 100644
--- a/auth2-pubkey.c
+++ b/auth2-pubkey.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: auth2-pubkey.c,v 1.84 2018/08/23 03:01:08 djm Exp $ */ 1/* $OpenBSD: auth2-pubkey.c,v 1.86 2018/09/20 03:28:06 djm Exp $ */
2/* 2/*
3 * Copyright (c) 2000 Markus Friedl. All rights reserved. 3 * Copyright (c) 2000 Markus Friedl. All rights reserved.
4 * 4 *
@@ -137,7 +137,13 @@ userauth_pubkey(struct ssh *ssh)
137 __func__, sshkey_ssh_name(key)); 137 __func__, sshkey_ssh_name(key));
138 goto done; 138 goto done;
139 } 139 }
140 140 if ((r = sshkey_check_cert_sigtype(key,
141 options.ca_sign_algorithms)) != 0) {
142 logit("%s: certificate signature algorithm %s: %s", __func__,
143 (key->cert == NULL || key->cert->signature_type == NULL) ?
144 "(null)" : key->cert->signature_type, ssh_err(r));
145 goto done;
146 }
141 key_s = format_key(key); 147 key_s = format_key(key);
142 if (sshkey_is_cert(key)) 148 if (sshkey_is_cert(key))
143 ca_s = format_key(key->cert->signature_key); 149 ca_s = format_key(key->cert->signature_key);
@@ -177,7 +183,7 @@ userauth_pubkey(struct ssh *ssh)
177 (r = sshbuf_put_cstring(b, authctxt->service)) != 0 || 183 (r = sshbuf_put_cstring(b, authctxt->service)) != 0 ||
178 (r = sshbuf_put_cstring(b, "publickey")) != 0 || 184 (r = sshbuf_put_cstring(b, "publickey")) != 0 ||
179 (r = sshbuf_put_u8(b, have_sig)) != 0 || 185 (r = sshbuf_put_u8(b, have_sig)) != 0 ||
180 (r = sshbuf_put_cstring(b, pkalg) != 0) || 186 (r = sshbuf_put_cstring(b, pkalg)) != 0 ||
181 (r = sshbuf_put_string(b, pkblob, blen)) != 0) 187 (r = sshbuf_put_string(b, pkblob, blen)) != 0)
182 fatal("%s: build packet failed: %s", 188 fatal("%s: build packet failed: %s",
183 __func__, ssh_err(r)); 189 __func__, ssh_err(r));