summaryrefslogtreecommitdiff
path: root/ssh-dss.c
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2010-08-23 23:52:36 +0100
committerColin Watson <cjwatson@debian.org>2010-08-23 23:52:36 +0100
commit78799892cb1858927be02be9737c594052e3f910 (patch)
treeac3dc2e848ab9dc62fe4252e01e52c3d456f628f /ssh-dss.c
parent3875951bb76a9ec62634ae4026c9cc885d933477 (diff)
parent31e30b835fd9695d3b6647cab4867001b092e28f (diff)
* New upstream release (http://www.openssh.com/txt/release-5.6):
- Added a ControlPersist option to ssh_config(5) that automatically starts a background ssh(1) multiplex master when connecting. This connection can stay alive indefinitely, or can be set to automatically close after a user-specified duration of inactivity (closes: #335697, #350898, #454787, #500573, #550262). - Support AuthorizedKeysFile, AuthorizedPrincipalsFile, HostbasedUsesNameFromPacketOnly, and PermitTunnel in sshd_config(5) Match blocks (closes: #549858). - sftp(1): fix ls in working directories that contain globbing characters in their pathnames (LP: #530714).
Diffstat (limited to 'ssh-dss.c')
-rw-r--r--ssh-dss.c12
1 files changed, 5 insertions, 7 deletions
diff --git a/ssh-dss.c b/ssh-dss.c
index 449f493b4..175e4d030 100644
--- a/ssh-dss.c
+++ b/ssh-dss.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ssh-dss.c,v 1.25 2010/02/26 20:29:54 djm Exp $ */ 1/* $OpenBSD: ssh-dss.c,v 1.26 2010/04/16 01:47:26 djm Exp $ */
2/* 2/*
3 * Copyright (c) 2000 Markus Friedl. All rights reserved. 3 * Copyright (c) 2000 Markus Friedl. All rights reserved.
4 * 4 *
@@ -53,9 +53,8 @@ ssh_dss_sign(const Key *key, u_char **sigp, u_int *lenp,
53 u_int rlen, slen, len, dlen; 53 u_int rlen, slen, len, dlen;
54 Buffer b; 54 Buffer b;
55 55
56 if (key == NULL || 56 if (key == NULL || key->dsa == NULL || (key->type != KEY_DSA &&
57 (key->type != KEY_DSA && key->type != KEY_DSA_CERT) || 57 key->type != KEY_DSA_CERT && key->type != KEY_DSA_CERT_V00)) {
58 key->dsa == NULL) {
59 error("ssh_dss_sign: no DSA key"); 58 error("ssh_dss_sign: no DSA key");
60 return -1; 59 return -1;
61 } 60 }
@@ -118,9 +117,8 @@ ssh_dss_verify(const Key *key, const u_char *signature, u_int signaturelen,
118 int rlen, ret; 117 int rlen, ret;
119 Buffer b; 118 Buffer b;
120 119
121 if (key == NULL || 120 if (key == NULL || key->dsa == NULL || (key->type != KEY_DSA &&
122 (key->type != KEY_DSA && key->type != KEY_DSA_CERT) || 121 key->type != KEY_DSA_CERT && key->type != KEY_DSA_CERT_V00)) {
123 key->dsa == NULL) {
124 error("ssh_dss_verify: no DSA key"); 122 error("ssh_dss_verify: no DSA key");
125 return -1; 123 return -1;
126 } 124 }