diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-03-06 01:09:20 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-03-06 01:09:20 +0000 |
commit | 4c4f05e09647ec68becba9664b6b84e643fc0578 (patch) | |
tree | b80be6bceb955898948ef10527b43fc4cf005d8e /kex.h | |
parent | c78a187b1776cb45c07a4a138946f8370ed6e71d (diff) |
- markus@cvs.openbsd.org 2001/03/05 17:17:21
[kex.c kex.h sshconnect2.c sshd.c]
generate a 2*need size (~300 instead of 1024/2048) random private
exponent during the DH key agreement. according to Niels (the great
german advisor) this is safe since /etc/primes contains strong
primes only.
References:
P. C. van Oorschot and M. J. Wiener, On Diffie-Hellman key
agreement with short exponents, In Advances in Cryptology
- EUROCRYPT'96, LNCS 1070, Springer-Verlag, 1996, pp.332-343.
Diffstat (limited to 'kex.h')
-rw-r--r-- | kex.h | 4 |
1 files changed, 2 insertions, 2 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: kex.h,v 1.14 2001/02/11 12:59:24 markus Exp $ */ | 1 | /* $OpenBSD: kex.h,v 1.15 2001/03/05 17:17:20 markus Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright (c) 2000 Markus Friedl. All rights reserved. | 4 | * Copyright (c) 2000 Markus Friedl. All rights reserved. |
@@ -106,7 +106,7 @@ void packet_set_kex(Kex *k); | |||
106 | int dh_pub_is_valid(DH *dh, BIGNUM *dh_pub); | 106 | int dh_pub_is_valid(DH *dh, BIGNUM *dh_pub); |
107 | DH *dh_new_group_asc(const char *, const char *); | 107 | DH *dh_new_group_asc(const char *, const char *); |
108 | DH *dh_new_group(BIGNUM *, BIGNUM *); | 108 | DH *dh_new_group(BIGNUM *, BIGNUM *); |
109 | void dh_gen_key(DH *); | 109 | void dh_gen_key(DH *, int); |
110 | DH *dh_new_group1(void); | 110 | DH *dh_new_group1(void); |
111 | 111 | ||
112 | u_char * | 112 | u_char * |