| 5822 |
|
|
| 5823 |
if ((ret = key_verify(rsa, dsa, signature, siglen, hash, 20)) != 1) { |
if ((ret = key_verify(rsa, dsa, signature, siglen, hash, 20)) != 1) { |
| 5824 |
if (ret == -3 && rsa != NULL) { |
if (ret == -3 && rsa != NULL) { |
| 5825 |
_snprintf_s(emsg_tmp, sizeof(emsg_tmp), _TRUNCATE, |
if (!pvar->settings.EnableRsaShortKeyServer) { |
| 5826 |
"key verify error(remote rsa key length is too short %d-bit) " |
_snprintf_s(emsg_tmp, sizeof(emsg_tmp), _TRUNCATE, |
| 5827 |
"@ handle_SSH2_dh_kex_reply()", BN_num_bits(rsa->n)); |
"key verify error(remote rsa key length is too short %d-bit) " |
| 5828 |
|
"@ handle_SSH2_dh_kex_reply()", BN_num_bits(rsa->n)); |
| 5829 |
|
} |
| 5830 |
} |
} |
| 5831 |
else { |
else { |
| 5832 |
_snprintf_s(emsg_tmp, sizeof(emsg_tmp), _TRUNCATE, |
_snprintf_s(emsg_tmp, sizeof(emsg_tmp), _TRUNCATE, |
| 6179 |
|
|
| 6180 |
if ((ret = key_verify(rsa, dsa, signature, siglen, hash, 20)) != 1) { |
if ((ret = key_verify(rsa, dsa, signature, siglen, hash, 20)) != 1) { |
| 6181 |
if (ret == -3 && rsa != NULL) { |
if (ret == -3 && rsa != NULL) { |
| 6182 |
_snprintf_s(emsg_tmp, sizeof(emsg_tmp), _TRUNCATE, |
if (!pvar->settings.EnableRsaShortKeyServer) { |
| 6183 |
"key verify error(remote rsa key length is too short %d-bit) " |
_snprintf_s(emsg_tmp, sizeof(emsg_tmp), _TRUNCATE, |
| 6184 |
"@ SSH2_DH_GEX", BN_num_bits(rsa->n)); |
"key verify error(remote rsa key length is too short %d-bit) " |
| 6185 |
|
"@ SSH2_DH_GEX", BN_num_bits(rsa->n)); |
| 6186 |
|
} |
| 6187 |
} |
} |
| 6188 |
else { |
else { |
| 6189 |
_snprintf_s(emsg_tmp, sizeof(emsg_tmp), _TRUNCATE, |
_snprintf_s(emsg_tmp, sizeof(emsg_tmp), _TRUNCATE, |