diff options
author | Damien Miller <djm@mindrot.org> | 2014-01-26 09:37:25 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2014-01-26 09:37:25 +1100 |
commit | 76eea4ab4e658670ca6e76dd1e6d17f262208b57 (patch) | |
tree | cf69b6a4ae613af69f6a984a68e8e1e7ee268a93 /kex.h | |
parent | 603b8f47f1cd9ed95a2017447db8e60ca6704594 (diff) |
- dtucker@cvs.openbsd.org 2014/01/25 10:12:50
[cipher.c cipher.h kex.c kex.h kexgexc.c]
Add a special case for the DH group size for 3des-cbc, which has an
effective strength much lower than the key size. This causes problems
with some cryptlib implementations, which don't support group sizes larger
than 4k but also don't use the largest group size it does support as
specified in the RFC. Based on a patch from Petr Lautrbach at Redhat,
reduced by me with input from Markus. ok djm@ markus@
Diffstat (limited to 'kex.h')
-rw-r--r-- | kex.h | 3 |
1 files changed, 2 insertions, 1 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: kex.h,v 1.60 2014/01/12 08:13:13 djm Exp $ */ | 1 | /* $OpenBSD: kex.h,v 1.61 2014/01/25 10:12:50 dtucker Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. | 4 | * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. |
@@ -124,6 +124,7 @@ struct Kex { | |||
124 | u_int session_id_len; | 124 | u_int session_id_len; |
125 | Newkeys *newkeys[MODE_MAX]; | 125 | Newkeys *newkeys[MODE_MAX]; |
126 | u_int we_need; | 126 | u_int we_need; |
127 | u_int dh_need; | ||
127 | int server; | 128 | int server; |
128 | char *name; | 129 | char *name; |
129 | int hostkey_type; | 130 | int hostkey_type; |