diff options
author | Damien Miller <djm@mindrot.org> | 2001-11-12 11:03:16 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2001-11-12 11:03:16 +1100 |
commit | 9af8c3c226b591f6cbb93eefcf2d56c9ddb3a682 (patch) | |
tree | 911b395b1df0118910491d61fb74893f7e93d3f6 /ssh-rsa.c | |
parent | 9f64390f414b1148822ce11c9493b9cdd9bf7b7a (diff) |
- markus@cvs.openbsd.org 2001/11/07 21:40:21
[ssh-rsa.c]
ssh_rsa_sign/verify: SSH_BUG_SIGBLOB not supported
Diffstat (limited to 'ssh-rsa.c')
-rw-r--r-- | ssh-rsa.c | 10 |
1 files changed, 9 insertions, 1 deletions
@@ -23,7 +23,7 @@ | |||
23 | */ | 23 | */ |
24 | 24 | ||
25 | #include "includes.h" | 25 | #include "includes.h" |
26 | RCSID("$OpenBSD: ssh-rsa.c,v 1.10 2001/09/17 19:27:15 stevesk Exp $"); | 26 | RCSID("$OpenBSD: ssh-rsa.c,v 1.11 2001/11/07 21:40:21 markus Exp $"); |
27 | 27 | ||
28 | #include <openssl/evp.h> | 28 | #include <openssl/evp.h> |
29 | #include <openssl/err.h> | 29 | #include <openssl/err.h> |
@@ -54,6 +54,10 @@ ssh_rsa_sign( | |||
54 | error("ssh_rsa_sign: no RSA key"); | 54 | error("ssh_rsa_sign: no RSA key"); |
55 | return -1; | 55 | return -1; |
56 | } | 56 | } |
57 | if (datafellows & SSH_BUG_SIGBLOB) { | ||
58 | error("ssh_rsa_sign: SSH_BUG_SIGBLOB not supported"); | ||
59 | return -1; | ||
60 | } | ||
57 | nid = (datafellows & SSH_BUG_RSASIGMD5) ? NID_md5 : NID_sha1; | 61 | nid = (datafellows & SSH_BUG_RSASIGMD5) ? NID_md5 : NID_sha1; |
58 | if ((evp_md = EVP_get_digestbynid(nid)) == NULL) { | 62 | if ((evp_md = EVP_get_digestbynid(nid)) == NULL) { |
59 | error("ssh_rsa_sign: EVP_get_digestbynid %d failed", nid); | 63 | error("ssh_rsa_sign: EVP_get_digestbynid %d failed", nid); |
@@ -124,6 +128,10 @@ ssh_rsa_verify( | |||
124 | error("ssh_rsa_verify: no RSA key"); | 128 | error("ssh_rsa_verify: no RSA key"); |
125 | return -1; | 129 | return -1; |
126 | } | 130 | } |
131 | if (datafellows & SSH_BUG_SIGBLOB) { | ||
132 | error("ssh_rsa_verify: SSH_BUG_SIGBLOB not supported"); | ||
133 | return -1; | ||
134 | } | ||
127 | if (BN_num_bits(key->rsa->n) < 768) { | 135 | if (BN_num_bits(key->rsa->n) < 768) { |
128 | error("ssh_rsa_verify: n too small: %d bits", | 136 | error("ssh_rsa_verify: n too small: %d bits", |
129 | BN_num_bits(key->rsa->n)); | 137 | BN_num_bits(key->rsa->n)); |