From 47a499eaa2630b331afbf3c56c6ec6e7f300eb8c Mon Sep 17 00:00:00 2001 From: Werner Koch Date: Tue, 22 Sep 2015 09:34:05 +0200 Subject: [PATCH] ssh: Fix fingerprint computation for 384 bit ECDSA keys. * common/ssh-utils.c (get_fingerprint): Fix hashed string. -- That was an obvious c+p bug which should have been caught by a test case. GnuPG-bug-id: 2075 Debian-bug-id: 795636 (backported from master 2167951b275bae51cf669c02547e2e7ea8fbe2ee) --- common/ssh-utils.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/common/ssh-utils.c b/common/ssh-utils.c index 30cb4511d..cda1694f3 100644 --- a/common/ssh-utils.c +++ b/common/ssh-utils.c @@ -111,7 +111,7 @@ get_fingerprint (gcry_sexp_t key, void **r_fpr, size_t *r_len, else if (!strcmp (name, "NIST P-256") || !strcmp (name, "nistp256")) gcry_md_write (md, "256\0\0\0\x08nistp256", 15); else if (!strcmp (name, "NIST P-384") || !strcmp (name, "nistp384")) - gcry_md_write (md, "384\0\0\0\x08nistp521", 15); + gcry_md_write (md, "384\0\0\0\x08nistp384", 15); else if (!strcmp (name, "NIST P-521") || !strcmp (name, "nistp521")) gcry_md_write (md, "521\0\0\0\x08nistp521", 15); else