9ac7444af9
* Avoid compilation error on tolower and char type. Changelog: 2015-02-28 PuTTY 0.64 released, fixing a SECURITY HOLE PuTTY 0.64, released today, fixes a security hole in 0.63 and before: private-key-not-wiped-2. Also diffie-hellman-range-check has been argued to be a security hole. In addition to these and other less critical bug fixes, 0.64 also supports the major new feature of sharing an SSH connection between multiple instances of PuTTY and its tools, and a command-line and config option to specify the expected host key(s).
13 lines
491 B
C
13 lines
491 B
C
$NetBSD: patch-misc.c,v 1.1 2015/04/08 18:45:22 ryoon Exp $
|
|
|
|
--- misc.c.orig 2015-02-28 15:33:27.000000000 +0000
|
|
+++ misc.c
|
|
@@ -964,7 +964,7 @@ int validate_manual_hostkey(char *key)
|
|
if (q[3*i+2] != ':')
|
|
goto not_fingerprint; /* sorry */
|
|
for (i = 0; i < 16*3 - 1; i++)
|
|
- key[i] = tolower(q[i]);
|
|
+ key[i] = tolower((unsigned char)(q[i]));
|
|
key[16*3 - 1] = '\0';
|
|
return TRUE;
|
|
}
|