diff options
author | Damien Miller <djm@mindrot.org> | 2000-11-29 12:18:44 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2000-11-29 12:18:44 +1100 |
commit | e39cacc5793b19e74319b3c33c5e3b9fed0c18ff (patch) | |
tree | fdfe9c87a8fb716af0d235105e04580a24261011 /sshconnect2.c | |
parent | 3f62abaee876bb4ef7450799cdee1081297aae51 (diff) |
- (djm) OpenBSD CVS updates:
- provos@cvs.openbsd.org 2000/11/22 08:38:31
[sshd.8]
talk about /etc/primes, okay markus@
- markus@cvs.openbsd.org 2000/11/23 14:03:48
[ssh.c sshconnect1.c sshconnect2.c]
complain about invalid ciphers for ssh1/ssh2, fall back to reasonable
defaults
- markus@cvs.openbsd.org 2000/11/25 09:42:53
[sshconnect1.c]
reorder check for illegal ciphers, bugreport from espie@
- markus@cvs.openbsd.org 2000/11/25 10:19:34
[ssh-keygen.c ssh.h]
print keytype when generating a key.
reasonable defaults for RSA1/RSA/DSA keys.
Diffstat (limited to 'sshconnect2.c')
-rw-r--r-- | sshconnect2.c | 13 |
1 files changed, 4 insertions, 9 deletions
diff --git a/sshconnect2.c b/sshconnect2.c index bb4774aa4..69d9c49e3 100644 --- a/sshconnect2.c +++ b/sshconnect2.c | |||
@@ -23,7 +23,7 @@ | |||
23 | */ | 23 | */ |
24 | 24 | ||
25 | #include "includes.h" | 25 | #include "includes.h" |
26 | RCSID("$OpenBSD: sshconnect2.c,v 1.28 2000/11/12 19:50:38 markus Exp $"); | 26 | RCSID("$OpenBSD: sshconnect2.c,v 1.29 2000/11/23 21:03:47 markus Exp $"); |
27 | 27 | ||
28 | #include <openssl/bn.h> | 28 | #include <openssl/bn.h> |
29 | #include <openssl/rsa.h> | 29 | #include <openssl/rsa.h> |
@@ -74,14 +74,9 @@ ssh_kex2(char *host, struct sockaddr *hostaddr) | |||
74 | Buffer *client_kexinit, *server_kexinit; | 74 | Buffer *client_kexinit, *server_kexinit; |
75 | char *sprop[PROPOSAL_MAX]; | 75 | char *sprop[PROPOSAL_MAX]; |
76 | 76 | ||
77 | if (options.ciphers == NULL) { | 77 | if (options.ciphers == (char *)-1) { |
78 | if (options.cipher == SSH_CIPHER_3DES) { | 78 | log("No valid ciphers for protocol version 2 given, using defaults."); |
79 | options.ciphers = "3des-cbc"; | 79 | options.ciphers = NULL; |
80 | } else if (options.cipher == SSH_CIPHER_BLOWFISH) { | ||
81 | options.ciphers = "blowfish-cbc"; | ||
82 | } else if (options.cipher == SSH_CIPHER_DES) { | ||
83 | fatal("cipher DES not supported for protocol version 2"); | ||
84 | } | ||
85 | } | 80 | } |
86 | if (options.ciphers != NULL) { | 81 | if (options.ciphers != NULL) { |
87 | myproposal[PROPOSAL_ENC_ALGS_CTOS] = | 82 | myproposal[PROPOSAL_ENC_ALGS_CTOS] = |