diff options
author | Andreas Schneider <asn@cryptomilk.org> | 2018-06-29 09:22:26 +0200 |
---|---|---|
committer | Andreas Schneider <asn@cryptomilk.org> | 2018-06-29 09:30:59 +0200 |
commit | 1444ae5add315df23a20db48474b1e357b0385e0 (patch) | |
tree | c4026fa7736c7ca38624318b30496d25ac506794 /src/pki.c | |
parent | aa95eb1965b223e1630f6d184255dee48ee3215c (diff) | |
download | libssh-1444ae5add315df23a20db48474b1e357b0385e0.tar.gz libssh-1444ae5add315df23a20db48474b1e357b0385e0.tar.xz libssh-1444ae5add315df23a20db48474b1e357b0385e0.zip |
pki: Fix random memory corruption
Fixes T78
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
Diffstat (limited to 'src/pki.c')
-rw-r--r-- | src/pki.c | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -1084,7 +1084,7 @@ int ssh_pki_import_pubkey_file(const char *filename, ssh_key *pkey) key_buf[size] = '\0'; q = p = key_buf; - while (!isspace((int)*p)) p++; + while (*p != '\0' && !isspace((int)*p)) p++; *p = '\0'; type = ssh_key_type_from_name(q); @@ -1093,7 +1093,7 @@ int ssh_pki_import_pubkey_file(const char *filename, ssh_key *pkey) return SSH_ERROR; } q = ++p; - while (!isspace((int)*p)) p++; + while (*p != '\0' && !isspace((int)*p)) p++; *p = '\0'; rc = ssh_pki_import_pubkey_base64(q, type, pkey); |