diff options
-rw-r--r-- | ChangeLog | 3 | ||||
-rw-r--r-- | key.c | 5 |
2 files changed, 6 insertions, 2 deletions
@@ -43,6 +43,9 @@ | |||
43 | - djm@cvs.openbsd.org 2013/12/27 22:37:18 | 43 | - djm@cvs.openbsd.org 2013/12/27 22:37:18 |
44 | [ssh-rsa.c] | 44 | [ssh-rsa.c] |
45 | correct comment | 45 | correct comment |
46 | - djm@cvs.openbsd.org 2013/12/29 02:28:10 | ||
47 | [key.c] | ||
48 | allow ed25519 keys to appear as certificate authorities | ||
46 | 49 | ||
47 | 20131221 | 50 | 20131221 |
48 | - (dtucker) [regress/keytype.sh] Actually test ecdsa key types. | 51 | - (dtucker) [regress/keytype.sh] Actually test ecdsa key types. |
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: key.c,v 1.110 2013/12/07 00:19:15 djm Exp $ */ | 1 | /* $OpenBSD: key.c,v 1.111 2013/12/29 02:28:10 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * read_bignum(): | 3 | * read_bignum(): |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -1481,7 +1481,8 @@ cert_parse(Buffer *b, Key *key, const u_char *blob, u_int blen) | |||
1481 | } | 1481 | } |
1482 | if (key->cert->signature_key->type != KEY_RSA && | 1482 | if (key->cert->signature_key->type != KEY_RSA && |
1483 | key->cert->signature_key->type != KEY_DSA && | 1483 | key->cert->signature_key->type != KEY_DSA && |
1484 | key->cert->signature_key->type != KEY_ECDSA) { | 1484 | key->cert->signature_key->type != KEY_ECDSA && |
1485 | key->cert->signature_key->type != KEY_ED25519) { | ||
1485 | error("%s: Invalid signature key type %s (%d)", __func__, | 1486 | error("%s: Invalid signature key type %s (%d)", __func__, |
1486 | key_type(key->cert->signature_key), | 1487 | key_type(key->cert->signature_key), |
1487 | key->cert->signature_key->type); | 1488 | key->cert->signature_key->type); |