comparison signkey.c @ 297:79bf1023cf11 agent-client

propagate from branch 'au.asn.ucc.matt.dropbear' (head 0501e6f661b5415eb76f3b312d183c3adfbfb712) to branch 'au.asn.ucc.matt.dropbear.cli-agent' (head 01038174ec27245b51bd43a66c01ad930880f67b)
author Matt Johnston <matt@ucc.asn.au>
date Tue, 21 Mar 2006 16:20:59 +0000
parents eb7b9f2bb8e8
children dc6173e09ff7 7282370416a0
comparison
equal deleted inserted replaced
225:ca7e76d981d9 297:79bf1023cf11
402 402
403 #ifdef DROPBEAR_DSS 403 #ifdef DROPBEAR_DSS
404 if (bloblen == DSS_SIGNATURE_SIZE && 404 if (bloblen == DSS_SIGNATURE_SIZE &&
405 memcmp(ident, SSH_SIGNKEY_DSS, identlen) == 0) { 405 memcmp(ident, SSH_SIGNKEY_DSS, identlen) == 0) {
406 m_free(ident); 406 m_free(ident);
407 if (key->dsskey == NULL) {
408 dropbear_exit("no dss key to verify signature");
409 }
407 return buf_dss_verify(buf, key->dsskey, data, len); 410 return buf_dss_verify(buf, key->dsskey, data, len);
408 } 411 }
409 #endif 412 #endif
410 413
411 #ifdef DROPBEAR_RSA 414 #ifdef DROPBEAR_RSA
412 if (memcmp(ident, SSH_SIGNKEY_RSA, identlen) == 0) { 415 if (memcmp(ident, SSH_SIGNKEY_RSA, identlen) == 0) {
413 m_free(ident); 416 m_free(ident);
417 if (key->rsakey == NULL) {
418 dropbear_exit("no rsa key to verify signature");
419 }
414 return buf_rsa_verify(buf, key->rsakey, data, len); 420 return buf_rsa_verify(buf, key->rsakey, data, len);
415 } 421 }
416 #endif 422 #endif
417 423
418 m_free(ident); 424 m_free(ident);