- markus@cvs.openbsd.org 2001/11/07 21:40:21
[ssh-rsa.c]
ssh_rsa_sign/verify: SSH_BUG_SIGBLOB not supported
+ - markus@cvs.openbsd.org 2001/11/07 22:10:28
+ [ssh-dss.c ssh-rsa.c]
+ missing free and sync dss/rsa code.
20011109
- (stevesk) auth-pam.c: use do_pam_authenticate(PAM_DISALLOW_NULL_AUTHTOK)
*/
#include "includes.h"
-RCSID("$OpenBSD: ssh-dss.c,v 1.8 2001/09/17 19:27:15 stevesk Exp $");
+RCSID("$OpenBSD: ssh-dss.c,v 1.9 2001/11/07 22:10:28 markus Exp $");
#include <openssl/bn.h>
#include <openssl/evp.h>
if (strcmp("ssh-dss", ktype) != 0) {
error("ssh_dss_verify: cannot handle type %s", ktype);
buffer_free(&b);
+ xfree(ktype);
return -1;
}
+ xfree(ktype);
sigblob = buffer_get_string(&b, &len);
rlen = buffer_len(&b);
+ buffer_free(&b);
if(rlen != 0) {
- error("remaining bytes in signature %d", rlen);
- buffer_free(&b);
+ error("ssh_dss_verify: "
+ "remaining bytes in signature %d", rlen);
+ xfree(sigblob);
return -1;
}
- buffer_free(&b);
- xfree(ktype);
}
if (len != SIGBLOB_LEN) {
*/
#include "includes.h"
-RCSID("$OpenBSD: ssh-rsa.c,v 1.11 2001/11/07 21:40:21 markus Exp $");
+RCSID("$OpenBSD: ssh-rsa.c,v 1.12 2001/11/07 22:10:28 markus Exp $");
#include <openssl/evp.h>
#include <openssl/err.h>
rlen = buffer_len(&b);
buffer_free(&b);
if(rlen != 0) {
- xfree(sigblob);
error("ssh_rsa_verify: remaining bytes in signature %d", rlen);
+ xfree(sigblob);
return -1;
}
nid = (datafellows & SSH_BUG_RSASIGMD5) ? NID_md5 : NID_sha1;
if ((evp_md = EVP_get_digestbynid(nid)) == NULL) {
- xfree(sigblob);
error("ssh_rsa_verify: EVP_get_digestbynid %d failed", nid);
+ xfree(sigblob);
return -1;
}
dlen = evp_md->md_size;