diff options
author | Damien Miller <djm@mindrot.org> | 2010-04-16 15:56:21 +1000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2010-04-16 15:56:21 +1000 |
commit | 4e270b05dd9d850fb9e2e0ac43f33cb4090d3ebc (patch) | |
tree | 4fc84942b5966e9f38f18a1257ac43ddbed336be /ssh-dss.c | |
parent | 031c9100dfe3ee65a29084ebbd61965a76b3ad26 (diff) |
- djm@cvs.openbsd.org 2010/04/16 01:47:26
[PROTOCOL.certkeys auth-options.c auth-options.h auth-rsa.c]
[auth2-pubkey.c authfd.c key.c key.h myproposal.h ssh-add.c]
[ssh-agent.c ssh-dss.c ssh-keygen.1 ssh-keygen.c ssh-rsa.c]
[sshconnect.c sshconnect2.c sshd.c]
revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with the
following changes:
move the nonce field to the beginning of the certificate where it can
better protect against chosen-prefix attacks on the signature hash
Rename "constraints" field to "critical options"
Add a new non-critical "extensions" field
Add a serial number
The older format is still support for authentication and cert generation
(use "ssh-keygen -t v00 -s ca_key ..." to generate a v00 certificate)
ok markus@
Diffstat (limited to 'ssh-dss.c')
-rw-r--r-- | ssh-dss.c | 12 |
1 files changed, 5 insertions, 7 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh-dss.c,v 1.25 2010/02/26 20:29:54 djm Exp $ */ | 1 | /* $OpenBSD: ssh-dss.c,v 1.26 2010/04/16 01:47:26 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -53,9 +53,8 @@ ssh_dss_sign(const Key *key, u_char **sigp, u_int *lenp, | |||
53 | u_int rlen, slen, len, dlen; | 53 | u_int rlen, slen, len, dlen; |
54 | Buffer b; | 54 | Buffer b; |
55 | 55 | ||
56 | if (key == NULL || | 56 | if (key == NULL || key->dsa == NULL || (key->type != KEY_DSA && |
57 | (key->type != KEY_DSA && key->type != KEY_DSA_CERT) || | 57 | key->type != KEY_DSA_CERT && key->type != KEY_DSA_CERT_V00)) { |
58 | key->dsa == NULL) { | ||
59 | error("ssh_dss_sign: no DSA key"); | 58 | error("ssh_dss_sign: no DSA key"); |
60 | return -1; | 59 | return -1; |
61 | } | 60 | } |
@@ -118,9 +117,8 @@ ssh_dss_verify(const Key *key, const u_char *signature, u_int signaturelen, | |||
118 | int rlen, ret; | 117 | int rlen, ret; |
119 | Buffer b; | 118 | Buffer b; |
120 | 119 | ||
121 | if (key == NULL || | 120 | if (key == NULL || key->dsa == NULL || (key->type != KEY_DSA && |
122 | (key->type != KEY_DSA && key->type != KEY_DSA_CERT) || | 121 | key->type != KEY_DSA_CERT && key->type != KEY_DSA_CERT_V00)) { |
123 | key->dsa == NULL) { | ||
124 | error("ssh_dss_verify: no DSA key"); | 122 | error("ssh_dss_verify: no DSA key"); |
125 | return -1; | 123 | return -1; |
126 | } | 124 | } |