[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH 0/3] ed25519: a couple fixes
[Thread Prev] | [Thread Next]
- Subject: [PATCH 0/3] ed25519: a couple fixes
- From: Jon Simons <jon@xxxxxxxxxxxxx>
- Reply-to: libssh@xxxxxxxxxx
- Date: Sat, 27 Sep 2014 03:00:42 -0700
- To: libssh@xxxxxxxxxx
From 930cad4aa7d8ad6a4bc9072a2712cdf98e1e964d Mon Sep 17 00:00:00 2001 From: Jon Simons <jon@xxxxxxxxxxxxx> Date: Sat, 27 Sep 2014 02:42:45 -0700 Subject: [PATCH 0/3] ed25519: a couple fixes Hi, Here are a couple of patches that fix a couple of memory leaks and add some extra return checking for the new ed25519 code. To my understanding the first patch also fixes a correctness issue in 'pki_import_pubkey_buffer'. Jon Simons (3): pki: fail when pubkey buffer length is not ED25519_PK_LEN pki: check ssh_buffer_pack return in ssh_pki_do_sign ed25519: fix leak in pki_ed25519_sign src/pki.c | 21 +++++++++++++++------ src/pki_ed25519.c | 4 ++-- 2 files changed, 17 insertions(+), 8 deletions(-) -- 2.1.1.602.g02f248d
Archive administrator: postmaster@lists.cynapses.org