]> andersk Git - openssh.git/commitdiff
- stevesk@cvs.openbsd.org 2002/06/10 16:53:06
authormouring <mouring>
Tue, 11 Jun 2002 15:47:42 +0000 (15:47 +0000)
committermouring <mouring>
Tue, 11 Jun 2002 15:47:42 +0000 (15:47 +0000)
     [auth-rsa.c ssh-rsa.c]
     display minimum RSA modulus in error(); ok markus@

ChangeLog
auth-rsa.c
ssh-rsa.c

index 2a8f3a11000883eb245a50af9889259ada7312c1..38f7e785240bccf25d9677a454ee7ccf5021d408 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
@@ -7,6 +7,9 @@
    - itojun@cvs.openbsd.org 2002/06/09 22:17:21
      [sshconnect.c]
      pass salen to sockaddr_ntop so that we are happy on linux/solaris
+   - stevesk@cvs.openbsd.org 2002/06/10 16:53:06
+     [auth-rsa.c ssh-rsa.c]
+     display minimum RSA modulus in error(); ok markus@
 
 20020609
  - (bal) OpenBSD CVS Sync
index 493f14b1147a6eb7b691ce56a246c8b57cc40162..92f6277f9a06ed35e1c72bb239cef4572b18c206 100644 (file)
@@ -14,7 +14,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: auth-rsa.c,v 1.55 2002/03/29 19:18:33 stevesk Exp $");
+RCSID("$OpenBSD: auth-rsa.c,v 1.56 2002/06/10 16:53:06 stevesk Exp $");
 
 #include <openssl/rsa.h>
 #include <openssl/md5.h>
@@ -81,8 +81,8 @@ auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16])
 
        /* don't allow short keys */
        if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
-               error("auth_rsa_verify_response: n too small: %d bits",
-                   BN_num_bits(key->rsa->n));
+               error("auth_rsa_verify_response: RSA modulus too small: %d < minimum %d bits",
+                   BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE);
                return (0);
        }
 
index 458c9c840efab6d4375b655de7ce18d2a3090059..3e66294e9f8c4ad939cfb0a8b40e8b5c673f5728 100644 (file)
--- a/ssh-rsa.c
+++ b/ssh-rsa.c
@@ -23,7 +23,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: ssh-rsa.c,v 1.19 2002/05/31 13:20:50 markus Exp $");
+RCSID("$OpenBSD: ssh-rsa.c,v 1.20 2002/06/10 16:53:06 stevesk Exp $");
 
 #include <openssl/evp.h>
 #include <openssl/err.h>
@@ -123,8 +123,8 @@ ssh_rsa_verify(
                return -1;
        }
        if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
-               error("ssh_rsa_verify: n too small: %d bits",
-                   BN_num_bits(key->rsa->n));
+               error("ssh_rsa_verify: RSA modulus too small: %d < minimum %d bits",
+                   BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE);
                return -1;
        }
        buffer_init(&b);
This page took 0.872018 seconds and 5 git commands to generate.