version 1.91, 2019/11/13 07:53:10 |
version 1.92, 2019/11/13 22:00:21 |
|
|
if ((r = sshkey_xmss_init(n, k->xmss_name)) != 0) |
if ((r = sshkey_xmss_init(n, k->xmss_name)) != 0) |
goto out; |
goto out; |
if (k->xmss_pk != NULL) { |
if (k->xmss_pk != NULL) { |
|
u_int32_t left; |
size_t pklen = sshkey_xmss_pklen(k); |
size_t pklen = sshkey_xmss_pklen(k); |
if (pklen == 0 || sshkey_xmss_pklen(n) != pklen) { |
if (pklen == 0 || sshkey_xmss_pklen(n) != pklen) { |
r = SSH_ERR_INTERNAL_ERROR; |
r = SSH_ERR_INTERNAL_ERROR; |
|
|
goto out; |
goto out; |
} |
} |
memcpy(n->xmss_pk, k->xmss_pk, pklen); |
memcpy(n->xmss_pk, k->xmss_pk, pklen); |
|
/* simulate number of signatures left on pubkey */ |
|
left = sshkey_xmss_signatures_left(k); |
|
if (left) |
|
sshkey_xmss_enable_maxsign(n, left); |
} |
} |
break; |
break; |
#endif /* WITH_XMSS */ |
#endif /* WITH_XMSS */ |