diff options
Diffstat (limited to 'authfd.c')
-rw-r--r-- | authfd.c | 18 |
1 files changed, 16 insertions, 2 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: authfd.c,v 1.99 2015/09/02 07:51:12 jsg Exp $ */ | 1 | /* $OpenBSD: authfd.c,v 1.100 2015/12/04 16:41:28 markus Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -426,11 +426,24 @@ ssh_decrypt_challenge(int sock, struct sshkey* key, BIGNUM *challenge, | |||
426 | } | 426 | } |
427 | #endif | 427 | #endif |
428 | 428 | ||
429 | /* encode signature algoritm in flag bits, so we can keep the msg format */ | ||
430 | static u_int | ||
431 | agent_encode_alg(struct sshkey *key, const char *alg) | ||
432 | { | ||
433 | if (alg != NULL && key->type == KEY_RSA) { | ||
434 | if (strcmp(alg, "rsa-sha2-256") == 0) | ||
435 | return SSH_AGENT_RSA_SHA2_256; | ||
436 | else if (strcmp(alg, "rsa-sha2-512") == 0) | ||
437 | return SSH_AGENT_RSA_SHA2_512; | ||
438 | } | ||
439 | return 0; | ||
440 | } | ||
441 | |||
429 | /* ask agent to sign data, returns err.h code on error, 0 on success */ | 442 | /* ask agent to sign data, returns err.h code on error, 0 on success */ |
430 | int | 443 | int |
431 | ssh_agent_sign(int sock, struct sshkey *key, | 444 | ssh_agent_sign(int sock, struct sshkey *key, |
432 | u_char **sigp, size_t *lenp, | 445 | u_char **sigp, size_t *lenp, |
433 | const u_char *data, size_t datalen, u_int compat) | 446 | const u_char *data, size_t datalen, const char *alg, u_int compat) |
434 | { | 447 | { |
435 | struct sshbuf *msg; | 448 | struct sshbuf *msg; |
436 | u_char *blob = NULL, type; | 449 | u_char *blob = NULL, type; |
@@ -449,6 +462,7 @@ ssh_agent_sign(int sock, struct sshkey *key, | |||
449 | return SSH_ERR_ALLOC_FAIL; | 462 | return SSH_ERR_ALLOC_FAIL; |
450 | if ((r = sshkey_to_blob(key, &blob, &blen)) != 0) | 463 | if ((r = sshkey_to_blob(key, &blob, &blen)) != 0) |
451 | goto out; | 464 | goto out; |
465 | flags |= agent_encode_alg(key, alg); | ||
452 | if ((r = sshbuf_put_u8(msg, SSH2_AGENTC_SIGN_REQUEST)) != 0 || | 466 | if ((r = sshbuf_put_u8(msg, SSH2_AGENTC_SIGN_REQUEST)) != 0 || |
453 | (r = sshbuf_put_string(msg, blob, blen)) != 0 || | 467 | (r = sshbuf_put_string(msg, blob, blen)) != 0 || |
454 | (r = sshbuf_put_string(msg, data, datalen)) != 0 || | 468 | (r = sshbuf_put_string(msg, data, datalen)) != 0 || |