version 1.10, 2001/09/17 19:27:15 |
version 1.11, 2001/11/07 21:40:21 |
|
|
error("ssh_rsa_sign: no RSA key"); |
error("ssh_rsa_sign: no RSA key"); |
return -1; |
return -1; |
} |
} |
|
if (datafellows & SSH_BUG_SIGBLOB) { |
|
error("ssh_rsa_sign: SSH_BUG_SIGBLOB not supported"); |
|
return -1; |
|
} |
nid = (datafellows & SSH_BUG_RSASIGMD5) ? NID_md5 : NID_sha1; |
nid = (datafellows & SSH_BUG_RSASIGMD5) ? NID_md5 : NID_sha1; |
if ((evp_md = EVP_get_digestbynid(nid)) == NULL) { |
if ((evp_md = EVP_get_digestbynid(nid)) == NULL) { |
error("ssh_rsa_sign: EVP_get_digestbynid %d failed", nid); |
error("ssh_rsa_sign: EVP_get_digestbynid %d failed", nid); |
|
|
|
|
if (key == NULL || key->type != KEY_RSA || key->rsa == NULL) { |
if (key == NULL || key->type != KEY_RSA || key->rsa == NULL) { |
error("ssh_rsa_verify: no RSA key"); |
error("ssh_rsa_verify: no RSA key"); |
|
return -1; |
|
} |
|
if (datafellows & SSH_BUG_SIGBLOB) { |
|
error("ssh_rsa_verify: SSH_BUG_SIGBLOB not supported"); |
return -1; |
return -1; |
} |
} |
if (BN_num_bits(key->rsa->n) < 768) { |
if (BN_num_bits(key->rsa->n) < 768) { |