[ssh-keysign.c]
     potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
This commit is contained in:
Damien Miller 2003-04-09 20:50:26 +10:00
parent a5539d2698
commit 703ced55bb
2 changed files with 6 additions and 3 deletions

View File

@ -7,6 +7,9 @@
[clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
[readconf.h serverloop.c sshconnect2.c]
reapply rekeying chage, tested by henning@, ok djm@
- markus@cvs.openbsd.org 2003/04/02 14:36:26
[ssh-keysign.c]
potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
20030402
- (bal) if IP_TOS is not found or broken don't try to compile in
@ -1309,4 +1312,4 @@
save auth method before monitor_reset_key_state(); bugzilla bug #284;
ok provos@
$Id: ChangeLog,v 1.2652 2003/04/09 10:50:06 djm Exp $
$Id: ChangeLog,v 1.2653 2003/04/09 10:50:26 djm Exp $

View File

@ -22,7 +22,7 @@
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "includes.h"
RCSID("$OpenBSD: ssh-keysign.c,v 1.10 2003/03/13 11:42:19 markus Exp $");
RCSID("$OpenBSD: ssh-keysign.c,v 1.11 2003/04/02 14:36:26 markus Exp $");
#include <openssl/evp.h>
#include <openssl/rand.h>
@ -55,7 +55,7 @@ valid_request(struct passwd *pw, char *host, Key **ret, u_char *data,
u_int datalen)
{
Buffer b;
Key *key;
Key *key = NULL;
u_char *pkblob;
u_int blen, len;
char *pkalg, *p;