=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/signify/signify.c,v retrieving revision 1.64 retrieving revision 1.65 diff -c -r1.64 -r1.65 *** src/usr.bin/signify/signify.c 2014/03/17 03:07:10 1.64 --- src/usr.bin/signify/signify.c 2014/03/17 03:10:26 1.65 *************** *** 1,4 **** ! /* $OpenBSD: signify.c,v 1.64 2014/03/17 03:07:10 tedu Exp $ */ /* * Copyright (c) 2013 Ted Unangst * --- 1,4 ---- ! /* $OpenBSD: signify.c,v 1.65 2014/03/17 03:10:26 tedu Exp $ */ /* * Copyright (c) 2013 Ted Unangst * *************** *** 130,136 **** commentend = strchr(b64, '\n'); if (!commentend || commentend - b64 <= COMMENTHDRLEN || ! memcmp(b64, COMMENTHDR, COMMENTHDRLEN)) errx(1, "invalid comment in %s; must start with '%s'", filename, COMMENTHDR); *commentend = 0; --- 130,136 ---- commentend = strchr(b64, '\n'); if (!commentend || commentend - b64 <= COMMENTHDRLEN || ! memcmp(b64, COMMENTHDR, COMMENTHDRLEN) != 0) errx(1, "invalid comment in %s; must start with '%s'", filename, COMMENTHDR); *commentend = 0; *************** *** 146,152 **** rv = b64_pton(commentend + 1, buf, buflen); if (rv != buflen) errx(1, "invalid b64 encoding in %s", filename); ! if (memcmp(buf, PKALG, 2)) errx(1, "unsupported file %s", filename); return b64end - b64 + 1; } --- 146,152 ---- rv = b64_pton(commentend + 1, buf, buflen); if (rv != buflen) errx(1, "invalid b64 encoding in %s", filename); ! if (memcmp(buf, PKALG, 2) != 0) errx(1, "unsupported file %s", filename); return b64end - b64 + 1; } *************** *** 350,356 **** readb64file(seckeyfile, &enckey, sizeof(enckey), comment); ! if (memcmp(enckey.kdfalg, KDFALG, 2)) errx(1, "unsupported KDF"); rounds = ntohl(enckey.kdfrounds); kdf(enckey.salt, sizeof(enckey.salt), rounds, strcmp(msgfile, "-") != 0, --- 350,356 ---- readb64file(seckeyfile, &enckey, sizeof(enckey), comment); ! if (memcmp(enckey.kdfalg, KDFALG, 2) != 0) errx(1, "unsupported KDF"); rounds = ntohl(enckey.kdfrounds); kdf(enckey.salt, sizeof(enckey.salt), rounds, strcmp(msgfile, "-") != 0, *************** *** 361,367 **** SHA512Init(&ctx); SHA512Update(&ctx, enckey.seckey, sizeof(enckey.seckey)); SHA512Final(digest, &ctx); ! if (memcmp(enckey.checksum, digest, sizeof(enckey.checksum))) errx(1, "incorrect passphrase"); explicit_bzero(digest, sizeof(digest)); --- 361,367 ---- SHA512Init(&ctx); SHA512Update(&ctx, enckey.seckey, sizeof(enckey.seckey)); SHA512Final(digest, &ctx); ! if (memcmp(enckey.checksum, digest, sizeof(enckey.checksum)) != 0) errx(1, "incorrect passphrase"); explicit_bzero(digest, sizeof(digest)); *************** *** 424,430 **** uint8_t *sigbuf, *dummybuf; unsigned long long siglen, dummylen; ! if (memcmp(pubkey->fingerprint, sig->fingerprint, FPLEN)) errx(1, "verification failed: checked against wrong key"); siglen = SIGBYTES + msglen; --- 424,430 ---- uint8_t *sigbuf, *dummybuf; unsigned long long siglen, dummylen; ! if (memcmp(pubkey->fingerprint, sig->fingerprint, FPLEN) != 0) errx(1, "verification failed: checked against wrong key"); siglen = SIGBYTES + msglen;