mirror of git://anongit.mindrot.org/openssh.git
upstream: avoid xmalloc(0) for PKCS#11 keyid for ECDSA keys (we
already did this for RSA keys). Avoids fatal errors for PKCS#11 libraries that return empty keyid, e.g. Microchip ATECC608B "cryptoauthlib"; bz#3364 OpenBSD-Commit-ID: 054d4dc1d6a99a2e6f8eebc48207b534057c154d
This commit is contained in:
parent
c74aa0eb73
commit
97f9b6e613
|
@ -1,4 +1,4 @@
|
||||||
/* $OpenBSD: ssh-pkcs11.c,v 1.54 2021/08/11 05:20:17 djm Exp $ */
|
/* $OpenBSD: ssh-pkcs11.c,v 1.55 2021/11/18 21:11:01 djm Exp $ */
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2010 Markus Friedl. All rights reserved.
|
* Copyright (c) 2010 Markus Friedl. All rights reserved.
|
||||||
* Copyright (c) 2014 Pedro Martelletto. All rights reserved.
|
* Copyright (c) 2014 Pedro Martelletto. All rights reserved.
|
||||||
|
@ -611,9 +611,10 @@ pkcs11_ecdsa_wrap(struct pkcs11_provider *provider, CK_ULONG slotidx,
|
||||||
k11->slotidx = slotidx;
|
k11->slotidx = slotidx;
|
||||||
/* identify key object on smartcard */
|
/* identify key object on smartcard */
|
||||||
k11->keyid_len = keyid_attrib->ulValueLen;
|
k11->keyid_len = keyid_attrib->ulValueLen;
|
||||||
k11->keyid = xmalloc(k11->keyid_len);
|
if (k11->keyid_len > 0) {
|
||||||
memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
|
k11->keyid = xmalloc(k11->keyid_len);
|
||||||
|
memcpy(k11->keyid, keyid_attrib->pValue, k11->keyid_len);
|
||||||
|
}
|
||||||
EC_KEY_set_method(ec, ec_key_method);
|
EC_KEY_set_method(ec, ec_key_method);
|
||||||
EC_KEY_set_ex_data(ec, ec_key_idx, k11);
|
EC_KEY_set_ex_data(ec, ec_key_idx, k11);
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue