- markus@cvs.openbsd.org 2006/10/31 16:33:12
[kexdhc.c kexdhs.c kexgexc.c kexgexs.c] check DH_compute_key() for -1 even if it should not happen because of earlier calls to dh_pub_is_valid(); report krahmer at suse.de; ok djm
This commit is contained in:
parent
3975ee2c3c
commit
570c2ab1b6
|
@ -3,6 +3,10 @@
|
||||||
- otto@cvs.openbsd.org 2006/10/28 18:08:10
|
- otto@cvs.openbsd.org 2006/10/28 18:08:10
|
||||||
[ssh.1]
|
[ssh.1]
|
||||||
correct/expand example of usage of -w; ok jmc@ stevesk@
|
correct/expand example of usage of -w; ok jmc@ stevesk@
|
||||||
|
- markus@cvs.openbsd.org 2006/10/31 16:33:12
|
||||||
|
[kexdhc.c kexdhs.c kexgexc.c kexgexs.c]
|
||||||
|
check DH_compute_key() for -1 even if it should not happen because of
|
||||||
|
earlier calls to dh_pub_is_valid(); report krahmer at suse.de; ok djm
|
||||||
|
|
||||||
20061101
|
20061101
|
||||||
- (dtucker) [openbsd-compat/port-solaris.c] Bug #1255: Make only hwerr
|
- (dtucker) [openbsd-compat/port-solaris.c] Bug #1255: Make only hwerr
|
||||||
|
@ -2584,4 +2588,4 @@
|
||||||
OpenServer 6 and add osr5bigcrypt support so when someone migrates
|
OpenServer 6 and add osr5bigcrypt support so when someone migrates
|
||||||
passwords between UnixWare and OpenServer they will still work. OK dtucker@
|
passwords between UnixWare and OpenServer they will still work. OK dtucker@
|
||||||
|
|
||||||
$Id: ChangeLog,v 1.4582 2006/11/04 18:31:33 djm Exp $
|
$Id: ChangeLog,v 1.4583 2006/11/04 18:32:02 djm Exp $
|
||||||
|
|
8
kexdhc.c
8
kexdhc.c
|
@ -1,4 +1,4 @@
|
||||||
/* $OpenBSD: kexdhc.c,v 1.9 2006/08/03 03:34:42 deraadt Exp $ */
|
/* $OpenBSD: kexdhc.c,v 1.10 2006/10/31 16:33:12 markus Exp $ */
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2001 Markus Friedl. All rights reserved.
|
* Copyright (c) 2001 Markus Friedl. All rights reserved.
|
||||||
*
|
*
|
||||||
|
@ -50,7 +50,8 @@ kexdh_client(Kex *kex)
|
||||||
Key *server_host_key;
|
Key *server_host_key;
|
||||||
u_char *server_host_key_blob = NULL, *signature = NULL;
|
u_char *server_host_key_blob = NULL, *signature = NULL;
|
||||||
u_char *kbuf, *hash;
|
u_char *kbuf, *hash;
|
||||||
u_int klen, kout, slen, sbloblen, hashlen;
|
u_int klen, slen, sbloblen, hashlen;
|
||||||
|
int kout;
|
||||||
|
|
||||||
/* generate and send 'e', client DH public key */
|
/* generate and send 'e', client DH public key */
|
||||||
switch (kex->kex_type) {
|
switch (kex->kex_type) {
|
||||||
|
@ -112,7 +113,8 @@ kexdh_client(Kex *kex)
|
||||||
|
|
||||||
klen = DH_size(dh);
|
klen = DH_size(dh);
|
||||||
kbuf = xmalloc(klen);
|
kbuf = xmalloc(klen);
|
||||||
kout = DH_compute_key(kbuf, dh_server_pub, dh);
|
if ((kout = DH_compute_key(kbuf, dh_server_pub, dh)) < 0)
|
||||||
|
fatal("DH_compute_key: failed");
|
||||||
#ifdef DEBUG_KEXDH
|
#ifdef DEBUG_KEXDH
|
||||||
dump_digest("shared secret", kbuf, kout);
|
dump_digest("shared secret", kbuf, kout);
|
||||||
#endif
|
#endif
|
||||||
|
|
9
kexdhs.c
9
kexdhs.c
|
@ -1,4 +1,4 @@
|
||||||
/* $OpenBSD: kexdhs.c,v 1.7 2006/08/03 03:34:42 deraadt Exp $ */
|
/* $OpenBSD: kexdhs.c,v 1.8 2006/10/31 16:33:12 markus Exp $ */
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2001 Markus Friedl. All rights reserved.
|
* Copyright (c) 2001 Markus Friedl. All rights reserved.
|
||||||
*
|
*
|
||||||
|
@ -52,8 +52,8 @@ kexdh_server(Kex *kex)
|
||||||
DH *dh;
|
DH *dh;
|
||||||
Key *server_host_key;
|
Key *server_host_key;
|
||||||
u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL;
|
u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL;
|
||||||
u_int sbloblen, klen, kout, hashlen;
|
u_int sbloblen, klen, hashlen, slen;
|
||||||
u_int slen;
|
int kout;
|
||||||
|
|
||||||
/* generate server DH public key */
|
/* generate server DH public key */
|
||||||
switch (kex->kex_type) {
|
switch (kex->kex_type) {
|
||||||
|
@ -101,7 +101,8 @@ kexdh_server(Kex *kex)
|
||||||
|
|
||||||
klen = DH_size(dh);
|
klen = DH_size(dh);
|
||||||
kbuf = xmalloc(klen);
|
kbuf = xmalloc(klen);
|
||||||
kout = DH_compute_key(kbuf, dh_client_pub, dh);
|
if ((kout = DH_compute_key(kbuf, dh_client_pub, dh)) < 0)
|
||||||
|
fatal("DH_compute_key: failed");
|
||||||
#ifdef DEBUG_KEXDH
|
#ifdef DEBUG_KEXDH
|
||||||
dump_digest("shared secret", kbuf, kout);
|
dump_digest("shared secret", kbuf, kout);
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
/* $OpenBSD: kexgexc.c,v 1.9 2006/08/03 03:34:42 deraadt Exp $ */
|
/* $OpenBSD: kexgexc.c,v 1.10 2006/10/31 16:33:12 markus Exp $ */
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2000 Niels Provos. All rights reserved.
|
* Copyright (c) 2000 Niels Provos. All rights reserved.
|
||||||
* Copyright (c) 2001 Markus Friedl. All rights reserved.
|
* Copyright (c) 2001 Markus Friedl. All rights reserved.
|
||||||
|
@ -51,7 +51,8 @@ kexgex_client(Kex *kex)
|
||||||
BIGNUM *p = NULL, *g = NULL;
|
BIGNUM *p = NULL, *g = NULL;
|
||||||
Key *server_host_key;
|
Key *server_host_key;
|
||||||
u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL;
|
u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL;
|
||||||
u_int klen, kout, slen, sbloblen, hashlen;
|
u_int klen, slen, sbloblen, hashlen;
|
||||||
|
int kout;
|
||||||
int min, max, nbits;
|
int min, max, nbits;
|
||||||
DH *dh;
|
DH *dh;
|
||||||
|
|
||||||
|
@ -150,7 +151,8 @@ kexgex_client(Kex *kex)
|
||||||
|
|
||||||
klen = DH_size(dh);
|
klen = DH_size(dh);
|
||||||
kbuf = xmalloc(klen);
|
kbuf = xmalloc(klen);
|
||||||
kout = DH_compute_key(kbuf, dh_server_pub, dh);
|
if ((kout = DH_compute_key(kbuf, dh_server_pub, dh)) < 0)
|
||||||
|
fatal("DH_compute_key: failed");
|
||||||
#ifdef DEBUG_KEXDH
|
#ifdef DEBUG_KEXDH
|
||||||
dump_digest("shared secret", kbuf, kout);
|
dump_digest("shared secret", kbuf, kout);
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
/* $OpenBSD: kexgexs.c,v 1.8 2006/08/03 03:34:42 deraadt Exp $ */
|
/* $OpenBSD: kexgexs.c,v 1.9 2006/10/31 16:33:12 markus Exp $ */
|
||||||
/*
|
/*
|
||||||
* Copyright (c) 2000 Niels Provos. All rights reserved.
|
* Copyright (c) 2000 Niels Provos. All rights reserved.
|
||||||
* Copyright (c) 2001 Markus Friedl. All rights reserved.
|
* Copyright (c) 2001 Markus Friedl. All rights reserved.
|
||||||
|
@ -55,8 +55,8 @@ kexgex_server(Kex *kex)
|
||||||
Key *server_host_key;
|
Key *server_host_key;
|
||||||
DH *dh;
|
DH *dh;
|
||||||
u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL;
|
u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL;
|
||||||
u_int sbloblen, klen, kout, slen, hashlen;
|
u_int sbloblen, klen, slen, hashlen;
|
||||||
int min = -1, max = -1, nbits = -1, type;
|
int min = -1, max = -1, nbits = -1, type, kout;
|
||||||
|
|
||||||
if (kex->load_host_key == NULL)
|
if (kex->load_host_key == NULL)
|
||||||
fatal("Cannot load hostkey");
|
fatal("Cannot load hostkey");
|
||||||
|
@ -134,7 +134,8 @@ kexgex_server(Kex *kex)
|
||||||
|
|
||||||
klen = DH_size(dh);
|
klen = DH_size(dh);
|
||||||
kbuf = xmalloc(klen);
|
kbuf = xmalloc(klen);
|
||||||
kout = DH_compute_key(kbuf, dh_client_pub, dh);
|
if ((kout = DH_compute_key(kbuf, dh_client_pub, dh)) < 0)
|
||||||
|
fatal("DH_compute_key: failed");
|
||||||
#ifdef DEBUG_KEXDH
|
#ifdef DEBUG_KEXDH
|
||||||
dump_digest("shared secret", kbuf, kout);
|
dump_digest("shared secret", kbuf, kout);
|
||||||
#endif
|
#endif
|
||||||
|
|
Loading…
Reference in New Issue