version 1.27, 2015/01/18 14:01:00 |
version 1.28, 2015/01/19 17:35:48 |
|
|
/* Finally, output sections for revocations by public key/hash */ |
/* Finally, output sections for revocations by public key/hash */ |
sshbuf_reset(sect); |
sshbuf_reset(sect); |
RB_FOREACH(rb, revoked_blob_tree, &krl->revoked_keys) { |
RB_FOREACH(rb, revoked_blob_tree, &krl->revoked_keys) { |
KRL_DBG(("%s: key len %u ", __func__, rb->len)); |
KRL_DBG(("%s: key len %zu ", __func__, rb->len)); |
if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) |
if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) |
goto out; |
goto out; |
} |
} |
|
|
} |
} |
sshbuf_reset(sect); |
sshbuf_reset(sect); |
RB_FOREACH(rb, revoked_blob_tree, &krl->revoked_sha1s) { |
RB_FOREACH(rb, revoked_blob_tree, &krl->revoked_sha1s) { |
KRL_DBG(("%s: hash len %u ", __func__, rb->len)); |
KRL_DBG(("%s: hash len %zu ", __func__, rb->len)); |
if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) |
if ((r = sshbuf_put_string(sect, rb->blob, rb->len)) != 0) |
goto out; |
goto out; |
} |
} |
|
|
if ((r = sshkey_sign(sign_keys[i], &sblob, &slen, |
if ((r = sshkey_sign(sign_keys[i], &sblob, &slen, |
sshbuf_ptr(buf), sshbuf_len(buf), 0)) == -1) |
sshbuf_ptr(buf), sshbuf_len(buf), 0)) == -1) |
goto out; |
goto out; |
KRL_DBG(("%s: signature sig len %u", __func__, slen)); |
KRL_DBG(("%s: signature sig len %zu", __func__, slen)); |
if ((r = sshbuf_put_string(buf, sblob, slen)) != 0) |
if ((r = sshbuf_put_string(buf, sblob, slen)) != 0) |
goto out; |
goto out; |
} |
} |