version 1.360, 2021/04/30 04:29:53 |
version 1.361, 2021/05/03 00:16:45 |
|
|
*/ |
*/ |
use_kexsigtype = kexsigtype == KEY_RSA && |
use_kexsigtype = kexsigtype == KEY_RSA && |
sshkey_type_plain(ctx->keys[i]->type) == KEY_RSA; |
sshkey_type_plain(ctx->keys[i]->type) == KEY_RSA; |
|
debug3_f("verify %s key %zu using %s sigalg", |
|
sshkey_type(ctx->keys[i]), i, |
|
use_kexsigtype ? ssh->kex->hostkey_alg : NULL); |
if ((r = sshkey_verify(ctx->keys[i], sig, siglen, |
if ((r = sshkey_verify(ctx->keys[i], sig, siglen, |
sshbuf_ptr(signdata), sshbuf_len(signdata), |
sshbuf_ptr(signdata), sshbuf_len(signdata), |
use_kexsigtype ? ssh->kex->hostkey_alg : NULL, 0, |
use_kexsigtype ? ssh->kex->hostkey_alg : NULL, 0, |
NULL)) != 0) { |
NULL)) != 0) { |
error_f("server gave bad signature for %s key %zu", |
error_fr(r, "server gave bad signature for %s key %zu", |
sshkey_type(ctx->keys[i]), i); |
sshkey_type(ctx->keys[i]), i); |
goto out; |
goto out; |
} |
} |