diff options
author | Jon Simons <jon@jonsimons.org> | 2014-12-07 16:41:31 -0800 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2014-12-09 19:21:47 +0100 |
commit | b35f1f488c022e08a905f94e582de3d6f0b1881b (patch) | |
tree | 3b864e6718f1d6e05328fccf90219ec7ad891b53 /src/config.c | |
parent | 10f71c67690cf3c0e1b6a733c3641407df2224e2 (diff) | |
download | libssh-b35f1f488c022e08a905f94e582de3d6f0b1881b.tar.gz libssh-b35f1f488c022e08a905f94e582de3d6f0b1881b.tar.xz libssh-b35f1f488c022e08a905f94e582de3d6f0b1881b.zip |
pki_gcrypt: fix DSA signature extraction
Fix DSA signature extraction for the LIBGCRYPT build. Here, the same fix
that was applied to the LIBCRYPTO build for https://red.libssh.org/issues/144
is now adapted for pki_gcrypt. Additionally, ensure to set the resulting
output sig_blob buffer before returning.
Before this fix, one can observe the failure with the pkd test on a LIBGCRYPT
build as so:
# ./pkd_hello -i 1 -t torture_pkd_openssh_dsa_dsa_default
After, runs of 10000 back-to-back iterations of the same test are passing.
Signed-off-by: Jon Simons <jon@jonsimons.org>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
Diffstat (limited to 'src/config.c')
0 files changed, 0 insertions, 0 deletions