diff options
author | Damien Miller <djm@mindrot.org> | 2000-04-16 11:18:38 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2000-04-16 11:18:38 +1000 |
commit | 4af51306d9a51459a5bef922df1037f876ae51fe (patch) | |
tree | 09ecfc215fce82345a3259f8a0f384b9a67906f0 /dsa.c | |
parent | 5d1705ecf9bd3216dc99a84242bcdf2e7297d307 (diff) |
- OpenBSD CVS updates.
[ssh.1 ssh.c]
- ssh -2
[auth.c channels.c clientloop.c packet.c packet.h serverloop.c]
[session.c sshconnect.c]
- check payload for (illegal) extra data
[ALL]
- whitespace cleanup
Diffstat (limited to 'dsa.c')
-rw-r--r-- | dsa.c | 10 |
1 files changed, 5 insertions, 5 deletions
@@ -28,7 +28,7 @@ | |||
28 | */ | 28 | */ |
29 | 29 | ||
30 | #include "includes.h" | 30 | #include "includes.h" |
31 | RCSID("$Id: dsa.c,v 1.3 2000/04/12 09:39:10 markus Exp $"); | 31 | RCSID("$Id: dsa.c,v 1.4 2000/04/14 10:30:31 markus Exp $"); |
32 | 32 | ||
33 | #include "ssh.h" | 33 | #include "ssh.h" |
34 | #include "xmalloc.h" | 34 | #include "xmalloc.h" |
@@ -108,7 +108,7 @@ dsa_load_private(char *filename) | |||
108 | in = BIO_new(BIO_s_file()); | 108 | in = BIO_new(BIO_s_file()); |
109 | if (in == NULL) | 109 | if (in == NULL) |
110 | fatal("BIO_new failed"); | 110 | fatal("BIO_new failed"); |
111 | if (BIO_read_filename(in, filename) <= 0) | 111 | if (BIO_read_filename(in, filename) <= 0) |
112 | fatal("BIO_read failed %s: %s", filename, strerror(errno)); | 112 | fatal("BIO_read failed %s: %s", filename, strerror(errno)); |
113 | fprintf(stderr, "read DSA private key\n"); | 113 | fprintf(stderr, "read DSA private key\n"); |
114 | dsa = PEM_read_bio_DSAPrivateKey(in,NULL,NULL,NULL); | 114 | dsa = PEM_read_bio_DSAPrivateKey(in,NULL,NULL,NULL); |
@@ -182,9 +182,9 @@ dsa_sign( | |||
182 | 182 | ||
183 | sig = DSA_do_sign(digest, evp_md->md_size, key->dsa); | 183 | sig = DSA_do_sign(digest, evp_md->md_size, key->dsa); |
184 | 184 | ||
185 | rlen = BN_num_bytes(sig->r); | 185 | rlen = BN_num_bytes(sig->r); |
186 | slen = BN_num_bytes(sig->s); | 186 | slen = BN_num_bytes(sig->s); |
187 | if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) { | 187 | if (rlen > INTBLOB_LEN || slen > INTBLOB_LEN) { |
188 | error("bad sig size %d %d", rlen, slen); | 188 | error("bad sig size %d %d", rlen, slen); |
189 | DSA_SIG_free(sig); | 189 | DSA_SIG_free(sig); |
190 | return -1; | 190 | return -1; |