| Summary: | "Bad decrypted len" error in OpenSSH using smart-card stored public-key | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Stefan Hadjistoytchev <sth> |
| Component: | sshd | Assignee: | OpenSSH Bugzilla mailing list <openssh-bugs> |
| Status: | CLOSED FIXED | ||
| Severity: | major | ||
| Priority: | P2 | ||
| Version: | -current | ||
| Hardware: | All | ||
| OS: | All | ||
|
Description
Stefan Hadjistoytchev
2003-06-14 06:56:25 AEST
fixed for the next release (replaced != with <) This bugs seems to reappear in Version 3.7.1, it seemed to be fixed in 2.6.2. Any idea what's going wrong here? The change was backed out. There was some discussion about it: http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=105584179630664 $ cvs log ssh-rsa.c revision 1.30 date: 2003/06/18 11:28:11; author: markus; state: Exp; lines: +13 -22 branches: 1.30.2; backout last change, since it violates pkcs#1 switch to share/misc/license.template ---------------------------- revision 1.29 date: 2003/06/16 08:22:35; author: markus; state: Exp; lines: +3 -3 make sure the signature has at least the expected length (don't insist on len == hlen + oidlen, since this breaks some smartcards) bugzilla #592; ok djm@ Mass change of RESOLVED bugs to CLOSED |