version 1.208, 2015/12/04 16:41:28 |
version 1.209, 2015/12/11 02:20:28 |
|
|
if (flags & SSH_AGENT_OLD_SIGNATURE) |
if (flags & SSH_AGENT_OLD_SIGNATURE) |
compat = SSH_BUG_SIGBLOB; |
compat = SSH_BUG_SIGBLOB; |
if ((r = sshkey_from_blob(blob, blen, &key)) != 0) { |
if ((r = sshkey_from_blob(blob, blen, &key)) != 0) { |
error("%s: cannot parse key blob: %s", __func__, ssh_err(ok)); |
error("%s: cannot parse key blob: %s", __func__, ssh_err(r)); |
goto send; |
goto send; |
} |
} |
if ((id = lookup_identity(key, 2)) == NULL) { |
if ((id = lookup_identity(key, 2)) == NULL) { |
|
|
} |
} |
if ((r = sshkey_sign(id->key, &signature, &slen, |
if ((r = sshkey_sign(id->key, &signature, &slen, |
data, dlen, agent_decode_alg(key, flags), compat)) != 0) { |
data, dlen, agent_decode_alg(key, flags), compat)) != 0) { |
error("%s: sshkey_sign: %s", __func__, ssh_err(ok)); |
error("%s: sshkey_sign: %s", __func__, ssh_err(r)); |
goto send; |
goto send; |
} |
} |
/* Success */ |
/* Success */ |