summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog3
-rw-r--r--key.c5
2 files changed, 6 insertions, 2 deletions
diff --git a/ChangeLog b/ChangeLog
index fe048ae51..3a541c8ee 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -43,6 +43,9 @@
43 - djm@cvs.openbsd.org 2013/12/27 22:37:18 43 - djm@cvs.openbsd.org 2013/12/27 22:37:18
44 [ssh-rsa.c] 44 [ssh-rsa.c]
45 correct comment 45 correct comment
46 - djm@cvs.openbsd.org 2013/12/29 02:28:10
47 [key.c]
48 allow ed25519 keys to appear as certificate authorities
46 49
4720131221 5020131221
48 - (dtucker) [regress/keytype.sh] Actually test ecdsa key types. 51 - (dtucker) [regress/keytype.sh] Actually test ecdsa key types.
diff --git a/key.c b/key.c
index 814f9a001..ec40cb152 100644
--- a/key.c
+++ b/key.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: key.c,v 1.110 2013/12/07 00:19:15 djm Exp $ */ 1/* $OpenBSD: key.c,v 1.111 2013/12/29 02:28:10 djm Exp $ */
2/* 2/*
3 * read_bignum(): 3 * read_bignum():
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -1481,7 +1481,8 @@ cert_parse(Buffer *b, Key *key, const u_char *blob, u_int blen)
1481 } 1481 }
1482 if (key->cert->signature_key->type != KEY_RSA && 1482 if (key->cert->signature_key->type != KEY_RSA &&
1483 key->cert->signature_key->type != KEY_DSA && 1483 key->cert->signature_key->type != KEY_DSA &&
1484 key->cert->signature_key->type != KEY_ECDSA) { 1484 key->cert->signature_key->type != KEY_ECDSA &&
1485 key->cert->signature_key->type != KEY_ED25519) {
1485 error("%s: Invalid signature key type %s (%d)", __func__, 1486 error("%s: Invalid signature key type %s (%d)", __func__,
1486 key_type(key->cert->signature_key), 1487 key_type(key->cert->signature_key),
1487 key->cert->signature_key->type); 1488 key->cert->signature_key->type);