View | Details | Raw Unified | Return to bug 1829
Collapse All | Expand All

(-)file_not_specified_in_diff (-7 / +4 lines)
Line  Link Here
 either from auth_rsa(), right after auth_rsa_key_allowed() call,
1
 or from auth_rhosts_rsa(), right after auth_rhosts_rsa_key_allowed()
2
--
3
auth-rsa.c |    6 +++---
auth-rsa.c |    6 +++---
4
1 files changed, 3 insertions(+), 3 deletions(-)
1
1 files changed, 3 insertions(+), 3 deletions(-)
5
-- a/auth-rsa.c
2
++ b/auth-rsa.c
Lines 94-102 auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) Link Here
94
	MD5_CTX md;
94
	MD5_CTX md;
95
	int len;
95
	int len;
96
96
97
	if (auth_key_is_revoked(key))
98
		return 0;
99
100
	/* don't allow short keys */
97
	/* don't allow short keys */
101
	if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
98
	if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
102
		error("auth_rsa_verify_response: RSA modulus too small: %d < minimum %d bits",
99
		error("auth_rsa_verify_response: RSA modulus too small: %d < minimum %d bits",
Lines 249-254 auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) Link Here
249
			    "actual %d vs. announced %d.",
246
			    "actual %d vs. announced %d.",
250
			    file, linenum, BN_num_bits(key->rsa->n), bits);
247
			    file, linenum, BN_num_bits(key->rsa->n), bits);
251
248
249
		if (auth_key_is_revoked(key))
250
			continue;
251
252
		/* We have found the desired key. */
252
		/* We have found the desired key. */
253
		/*
253
		/*
254
		 * If our options do not allow this key to be used,
254
		 * If our options do not allow this key to be used,

Return to bug 1829