- markus@cvs.openbsd.org 2003/06/16 08:22:35
     [ssh-rsa.c]
     make sure the signature has at least the expected length (don't
     insist on len == hlen + oidlen, since this breaks some smartcards)
     bugzilla #592; ok djm@
diff --git a/ChangeLog b/ChangeLog
index 2ccd501..93aaeb0 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -12,6 +12,11 @@
    - markus@cvs.openbsd.org 2003/06/12 19:12:03
      [scard.c scard.h ssh-agent.c ssh.c]
      add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
+   - markus@cvs.openbsd.org 2003/06/16 08:22:35
+     [ssh-rsa.c]
+     make sure the signature has at least the expected length (don't
+     insist on len == hlen + oidlen, since this breaks some smartcards)
+     bugzilla #592; ok djm@
 
 20030614
  - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
@@ -527,4 +532,4 @@
  - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
    Report from murple@murple.net, diagnosis from dtucker@zip.com.au
 
-$Id: ChangeLog,v 1.2805 2003/06/18 10:28:40 djm Exp $
+$Id: ChangeLog,v 1.2806 2003/06/18 10:29:01 djm Exp $
diff --git a/ssh-rsa.c b/ssh-rsa.c
index efbc9e6..db8e5e3 100644
--- a/ssh-rsa.c
+++ b/ssh-rsa.c
@@ -23,7 +23,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: ssh-rsa.c,v 1.28 2003/02/12 09:33:04 markus Exp $");
+RCSID("$OpenBSD: ssh-rsa.c,v 1.29 2003/06/16 08:22:35 markus Exp $");
 
 #include <openssl/evp.h>
 #include <openssl/err.h>
@@ -247,8 +247,8 @@
 		    ERR_error_string(ERR_get_error(), NULL));
 		goto done;
 	}
-	if (len != hlen + oidlen) {
-		error("bad decrypted len: %d != %d + %d", len, hlen, oidlen);
+	if (len < hlen + oidlen) {
+		error("bad decrypted len: %d < %d + %d", len, hlen, oidlen);
 		goto done;
 	}
 	if (memcmp(decrypted, oid, oidlen) != 0) {