Displaying 2 results from an estimated 2 matches for "sigbuf".
Did you mean:
sigbus
2002 Apr 24
2
RSA_verify question on OpenSSH Client w/ OpenSSL0.9.6a
Using OpenSSH 2.3.1 client and OpenSSL 0.9.6a
When trying to ssh to OpenSSH server of
higher versions SSH-1.99-OpenSSH_2.5.2p2 or such,
I see error in RSA key exchange:
RSA_verify(..)routine.
I see:
error at:int RSA_verify(int dtype, unsigned char *m,
unsigned int m_len,
unsigned char *sigbuf, unsigned int siglen,
RSA *rsa)
{
int i,ret=0,sigtype;
unsigned char *p,*s;
X509_SIG *sig=NULL;
if (siglen != (unsigned int)RSA_size(rsa))
{
RSAerr(RSA_F_RSA_VERIFY,RSA_R_WRONG_SIGNATURE_LENGTH);
return(0);
}
debugger output:
Breakpoint 1, RSA...
2006 Nov 15
11
OpenSSH Certkey (PKI)
...}
+
+/* check whether certificate is valid and signature correct */
+int
+cert_verify(const u_char *cert, const Key *ca_key, const Key *key,
+ const u_char *identity)
+{
+ u_char ca_fp[128], ca_name[128], ca_id[128], ca_opts[512];
+ u_char ca_vf[16], ca_vt[16], ca_alg[64], ca_sig[1024];
+ u_char sigbuf[1024], datbuf[2048], c, *fp;
+ unsigned long vf, vt, now = time(NULL);
+ u_int siglen, i;
+
+ if (cert == NULL || ca_key == NULL || ca_key->type != KEY_RSA ||
+ ca_key->rsa == NULL || key == NULL) {
+ debug2("cert_verify: invalid arguments");
+ return 0;
+ }
+
+ cert_token(&am...