version 1.328, 2019/11/13 04:47:52 |
version 1.329, 2019/11/25 00:51:37 |
|
|
sshkey_type_plain(ctx->keys[i]->type) == KEY_RSA; |
sshkey_type_plain(ctx->keys[i]->type) == KEY_RSA; |
if ((r = sshkey_verify(ctx->keys[i], sig, siglen, |
if ((r = sshkey_verify(ctx->keys[i], sig, siglen, |
sshbuf_ptr(signdata), sshbuf_len(signdata), |
sshbuf_ptr(signdata), sshbuf_len(signdata), |
use_kexsigtype ? ssh->kex->hostkey_alg : NULL, 0)) != 0) { |
use_kexsigtype ? ssh->kex->hostkey_alg : NULL, 0, |
|
NULL)) != 0) { |
error("%s: server gave bad signature for %s key %zu", |
error("%s: server gave bad signature for %s key %zu", |
__func__, sshkey_type(ctx->keys[i]), i); |
__func__, sshkey_type(ctx->keys[i]), i); |
goto out; |
goto out; |