diff options
author | Colin Watson <cjwatson@debian.org> | 2010-08-23 23:52:36 +0100 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2010-08-23 23:52:36 +0100 |
commit | 78799892cb1858927be02be9737c594052e3f910 (patch) | |
tree | ac3dc2e848ab9dc62fe4252e01e52c3d456f628f /ssh-dss.c | |
parent | 3875951bb76a9ec62634ae4026c9cc885d933477 (diff) | |
parent | 31e30b835fd9695d3b6647cab4867001b092e28f (diff) |
* New upstream release (http://www.openssh.com/txt/release-5.6):
- Added a ControlPersist option to ssh_config(5) that automatically
starts a background ssh(1) multiplex master when connecting. This
connection can stay alive indefinitely, or can be set to automatically
close after a user-specified duration of inactivity (closes: #335697,
#350898, #454787, #500573, #550262).
- Support AuthorizedKeysFile, AuthorizedPrincipalsFile,
HostbasedUsesNameFromPacketOnly, and PermitTunnel in sshd_config(5)
Match blocks (closes: #549858).
- sftp(1): fix ls in working directories that contain globbing
characters in their pathnames (LP: #530714).
Diffstat (limited to 'ssh-dss.c')
-rw-r--r-- | ssh-dss.c | 12 |
1 files changed, 5 insertions, 7 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ssh-dss.c,v 1.25 2010/02/26 20:29:54 djm Exp $ */ | 1 | /* $OpenBSD: ssh-dss.c,v 1.26 2010/04/16 01:47:26 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. | 3 | * Copyright (c) 2000 Markus Friedl. All rights reserved. |
4 | * | 4 | * |
@@ -53,9 +53,8 @@ ssh_dss_sign(const Key *key, u_char **sigp, u_int *lenp, | |||
53 | u_int rlen, slen, len, dlen; | 53 | u_int rlen, slen, len, dlen; |
54 | Buffer b; | 54 | Buffer b; |
55 | 55 | ||
56 | if (key == NULL || | 56 | if (key == NULL || key->dsa == NULL || (key->type != KEY_DSA && |
57 | (key->type != KEY_DSA && key->type != KEY_DSA_CERT) || | 57 | key->type != KEY_DSA_CERT && key->type != KEY_DSA_CERT_V00)) { |
58 | key->dsa == NULL) { | ||
59 | error("ssh_dss_sign: no DSA key"); | 58 | error("ssh_dss_sign: no DSA key"); |
60 | return -1; | 59 | return -1; |
61 | } | 60 | } |
@@ -118,9 +117,8 @@ ssh_dss_verify(const Key *key, const u_char *signature, u_int signaturelen, | |||
118 | int rlen, ret; | 117 | int rlen, ret; |
119 | Buffer b; | 118 | Buffer b; |
120 | 119 | ||
121 | if (key == NULL || | 120 | if (key == NULL || key->dsa == NULL || (key->type != KEY_DSA && |
122 | (key->type != KEY_DSA && key->type != KEY_DSA_CERT) || | 121 | key->type != KEY_DSA_CERT && key->type != KEY_DSA_CERT_V00)) { |
123 | key->dsa == NULL) { | ||
124 | error("ssh_dss_verify: no DSA key"); | 122 | error("ssh_dss_verify: no DSA key"); |
125 | return -1; | 123 | return -1; |
126 | } | 124 | } |