diff options
| author | Jon Simons <jon@jonsimons.org> | 2014-12-07 16:41:31 -0800 |
|---|---|---|
| committer | Andreas Schneider <asn@cryptomilk.org> | 2014-12-09 19:21:47 +0100 |
| commit | b35f1f488c022e08a905f94e582de3d6f0b1881b (patch) | |
| tree | 3b864e6718f1d6e05328fccf90219ec7ad891b53 /include/libssh/misc.h | |
| parent | 10f71c67690cf3c0e1b6a733c3641407df2224e2 (diff) | |
| download | libssh-b35f1f488c022e08a905f94e582de3d6f0b1881b.tar.gz libssh-b35f1f488c022e08a905f94e582de3d6f0b1881b.tar.xz libssh-b35f1f488c022e08a905f94e582de3d6f0b1881b.zip | |
pki_gcrypt: fix DSA signature extraction
Fix DSA signature extraction for the LIBGCRYPT build. Here, the same fix
that was applied to the LIBCRYPTO build for https://red.libssh.org/issues/144
is now adapted for pki_gcrypt. Additionally, ensure to set the resulting
output sig_blob buffer before returning.
Before this fix, one can observe the failure with the pkd test on a LIBGCRYPT
build as so:
# ./pkd_hello -i 1 -t torture_pkd_openssh_dsa_dsa_default
After, runs of 10000 back-to-back iterations of the same test are passing.
Signed-off-by: Jon Simons <jon@jonsimons.org>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
Diffstat (limited to 'include/libssh/misc.h')
0 files changed, 0 insertions, 0 deletions
