|
Line
Link Here
|
|
either from auth_rsa(), right after auth_rsa_key_allowed() call, |
|
|
| 1 |
or from auth_rhosts_rsa(), right after auth_rhosts_rsa_key_allowed() |
| 2 |
-- |
| 3 |
auth-rsa.c | 6 +++--- |
|
auth-rsa.c | 6 +++--- |
| 4 |
1 files changed, 3 insertions(+), 3 deletions(-) |
1 |
1 files changed, 3 insertions(+), 3 deletions(-) |
| 5 |
-- a/auth-rsa.c |
2 |
++ b/auth-rsa.c |
|
Lines 94-102
auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16])
Link Here
|
| 94 |
MD5_CTX md; |
94 |
MD5_CTX md; |
| 95 |
int len; |
95 |
int len; |
| 96 |
|
96 |
|
| 97 |
if (auth_key_is_revoked(key)) |
|
|
| 98 |
return 0; |
| 99 |
|
| 100 |
/* don't allow short keys */ |
97 |
/* don't allow short keys */ |
| 101 |
if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) { |
98 |
if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) { |
| 102 |
error("auth_rsa_verify_response: RSA modulus too small: %d < minimum %d bits", |
99 |
error("auth_rsa_verify_response: RSA modulus too small: %d < minimum %d bits", |
|
Lines 249-254
auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey)
Link Here
|
| 249 |
"actual %d vs. announced %d.", |
246 |
"actual %d vs. announced %d.", |
| 250 |
file, linenum, BN_num_bits(key->rsa->n), bits); |
247 |
file, linenum, BN_num_bits(key->rsa->n), bits); |
| 251 |
|
248 |
|
|
|
249 |
if (auth_key_is_revoked(key)) |
| 250 |
continue; |
| 251 |
|
| 252 |
/* We have found the desired key. */ |
252 |
/* We have found the desired key. */ |
| 253 |
/* |
253 |
/* |
| 254 |
* If our options do not allow this key to be used, |
254 |
* If our options do not allow this key to be used, |