diff options
author | mouring <mouring> | 2002-06-11 15:47:42 +0000 |
---|---|---|
committer | mouring <mouring> | 2002-06-11 15:47:42 +0000 |
commit | 616a0eb0960ea62618b2abcf6bd505d02bfa3b99 (patch) | |
tree | dc2a1ffd33cd23deea45ee1a9dbf8fa79d3f3b4c /auth-rsa.c | |
parent | 38968c5aafc9d3c9cd10557635c0a4def0b90d66 (diff) | |
download | openssh-616a0eb0960ea62618b2abcf6bd505d02bfa3b99.tar.gz |
- stevesk@cvs.openbsd.org 2002/06/10 16:53:06
[auth-rsa.c ssh-rsa.c]
display minimum RSA modulus in error(); ok markus@
Diffstat (limited to 'auth-rsa.c')
-rw-r--r-- | auth-rsa.c | 6 |
1 files changed, 3 insertions, 3 deletions
@@ -14,7 +14,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: auth-rsa.c,v 1.55 2002/03/29 19:18:33 stevesk Exp $"); +RCSID("$OpenBSD: auth-rsa.c,v 1.56 2002/06/10 16:53:06 stevesk Exp $"); #include <openssl/rsa.h> #include <openssl/md5.h> @@ -81,8 +81,8 @@ auth_rsa_verify_response(Key *key, BIGNUM *challenge, u_char response[16]) /* don't allow short keys */ if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) { - error("auth_rsa_verify_response: n too small: %d bits", - BN_num_bits(key->rsa->n)); + error("auth_rsa_verify_response: RSA modulus too small: %d < minimum %d bits", + BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE); return (0); } |