X-Git-Url: https://asedeno.scripts.mit.edu/gitweb/?a=blobdiff_plain;f=sshdss.c;h=7c95d11b65c5ecf975d2773d89793fcd8c23b5bc;hb=c8f2b65d166047d0bad013a73003e7e057792d15;hp=22992fea538194d28e219bb04618d7534e2cab81;hpb=7958a63147b848a1951bafe3880e1510e620c94f;p=PuTTY.git diff --git a/sshdss.c b/sshdss.c index 22992fea..7c95d11b 100644 --- a/sshdss.c +++ b/sshdss.c @@ -231,14 +231,14 @@ static int dss_verifysig(void *key, char *sig, int siglen, #endif /* * Commercial SSH (2.0.13) and OpenSSH disagree over the format - * of a DSA signature. OpenSSH is in line with the IETF drafts: + * of a DSA signature. OpenSSH is in line with RFC 4253: * it uses a string "ssh-dss", followed by a 40-byte string * containing two 160-bit integers end-to-end. Commercial SSH * can't be bothered with the header bit, and considers a DSA * signature blob to be _just_ the 40-byte string containing * the two 160-bit integers. We tell them apart by measuring * the length: length 40 means the commercial-SSH bug, anything - * else is assumed to be IETF-compliant. + * else is assumed to be RFC-compliant. */ if (siglen != 40) { /* bug not present; read admin fields */ getstring(&sig, &siglen, &p, &slen);