diff options
author | Kevin Steves <stevesk@cvs.openbsd.org> | 2002-06-10 16:53:07 +0000 |
---|---|---|
committer | Kevin Steves <stevesk@cvs.openbsd.org> | 2002-06-10 16:53:07 +0000 |
commit | e996cfb85caaac21552c3258903556e1949af9c3 (patch) | |
tree | e19acc3393fe2de988dfba213248cfc23311d482 /usr.bin | |
parent | 843aa584d09c4e83459da5e65986de87653c6038 (diff) |
display minimum RSA modulus in error(); ok markus@
Diffstat (limited to 'usr.bin')
-rw-r--r-- | usr.bin/ssh/auth-rsa.c | 6 | ||||
-rw-r--r-- | usr.bin/ssh/ssh-rsa.c | 6 |
2 files changed, 6 insertions, 6 deletions
diff --git a/usr.bin/ssh/auth-rsa.c b/usr.bin/ssh/auth-rsa.c index 493f14b1147..92f6277f9a0 100644 --- a/usr.bin/ssh/auth-rsa.c +++ b/usr.bin/ssh/auth-rsa.c @@ -14,7 +14,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth-rsa.c,v 1.55 2002/03/29 19:18:33 stevesk Exp $"); +RCSID("$OpenBSD: auth-rsa.c,v 1.56 2002/06/10 16:53:06 stevesk Exp $"); #include <openssl/rsa.h> #include <openssl/md5.h> @@ -81,8 +81,8 @@ auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) /* don't allow short keys */ if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) { - error("auth_rsa_verify_response: n too small: %d bits", - BN_num_bits(key->rsa->n)); + error("auth_rsa_verify_response: RSA modulus too small: %d < minimum %d bits", + BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE); return (0); } diff --git a/usr.bin/ssh/ssh-rsa.c b/usr.bin/ssh/ssh-rsa.c index 458c9c840ef..3e66294e9f8 100644 --- a/usr.bin/ssh/ssh-rsa.c +++ b/usr.bin/ssh/ssh-rsa.c @@ -23,7 +23,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: ssh-rsa.c,v 1.19 2002/05/31 13:20:50 markus Exp $"); +RCSID("$OpenBSD: ssh-rsa.c,v 1.20 2002/06/10 16:53:06 stevesk Exp $"); #include <openssl/evp.h> #include <openssl/err.h> @@ -123,8 +123,8 @@ ssh_rsa_verify( return -1; } if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) { - error("ssh_rsa_verify: n too small: %d bits", - BN_num_bits(key->rsa->n)); + error("ssh_rsa_verify: RSA modulus too small: %d < minimum %d bits", + BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE); return -1; } buffer_init(&b); |