version 1.91, 2017/05/30 08:52:19 |
version 1.92, 2017/05/30 14:10:53 |
|
|
*/ |
*/ |
|
|
int |
int |
mm_key_verify(struct sshkey *key, u_char *sig, u_int siglen, u_char *data, |
mm_sshkey_verify(const struct sshkey *key, const u_char *sig, size_t siglen, |
u_int datalen) |
const u_char *data, size_t datalen, u_int compat) |
{ |
{ |
Buffer m; |
Buffer m; |
u_char *blob; |
u_char *blob; |
u_int len; |
u_int len; |
int verified = 0; |
u_int encoded_ret = 0; |
|
|
debug3("%s entering", __func__); |
debug3("%s entering", __func__); |
|
|
|
|
debug3("%s: waiting for MONITOR_ANS_KEYVERIFY", __func__); |
debug3("%s: waiting for MONITOR_ANS_KEYVERIFY", __func__); |
mm_request_receive_expect(pmonitor->m_recvfd, MONITOR_ANS_KEYVERIFY, &m); |
mm_request_receive_expect(pmonitor->m_recvfd, MONITOR_ANS_KEYVERIFY, &m); |
|
|
verified = buffer_get_int(&m); |
encoded_ret = buffer_get_int(&m); |
|
|
buffer_free(&m); |
buffer_free(&m); |
|
|
return (verified); |
if (encoded_ret != 0) |
|
return SSH_ERR_SIGNATURE_INVALID; |
|
return 0; |
} |
} |
|
|
void |
void |