mirror of
https://github.com/clearml/dropbear
synced 2025-06-26 18:17:32 +00:00
Client mostly works up to password auth
Need to rework algo-choosing etc, since server is now broken. --HG-- extra : convert_revision : 458dc4eed0e885e7c91633d4781d3348213a0e19
This commit is contained in:
@@ -52,8 +52,12 @@ int buf_get_pub_key(buffer *buf, sign_key *key, int *type) {
|
||||
unsigned char* ident;
|
||||
unsigned int len;
|
||||
|
||||
TRACE(("enter buf_get_pub_key"));
|
||||
printhex(buf_getptr(buf, 0x99), 0x99);
|
||||
|
||||
ident = buf_getstring(buf, &len);
|
||||
|
||||
|
||||
#ifdef DROPBEAR_DSS
|
||||
if (memcmp(ident, SSH_SIGNKEY_DSS, len) == 0
|
||||
&& (*type == DROPBEAR_SIGNKEY_ANY
|
||||
@@ -78,6 +82,7 @@ int buf_get_pub_key(buffer *buf, sign_key *key, int *type) {
|
||||
return buf_get_rsa_pub_key(buf, key->rsakey);
|
||||
}
|
||||
#endif
|
||||
TRACE(("leave buf_get_pub_key: didn't match the type we want (%d versus '%s'len %d)", *type, ident, len));
|
||||
|
||||
m_free(ident);
|
||||
|
||||
@@ -352,6 +357,8 @@ int buf_verify(buffer * buf, sign_key *key, const unsigned char *data,
|
||||
unsigned char * ident = NULL;
|
||||
unsigned int identlen = 0;
|
||||
|
||||
TRACE(("enter buf_verify"));
|
||||
|
||||
bloblen = buf_getint(buf);
|
||||
ident = buf_getstring(buf, &identlen);
|
||||
|
||||
|
||||
Reference in New Issue
Block a user