summaryrefslogtreecommitdiff
path: root/sshd.c
diff options
context:
space:
mode:
authorBen Lindstrom <mouring@eviladmin.org>2001-04-04 17:57:54 +0000
committerBen Lindstrom <mouring@eviladmin.org>2001-04-04 17:57:54 +0000
commit8ac9106c3dfbc1f02ddf237067cccd54ffac4e8d (patch)
treef7ec941db419252643adbf7a1b13895c92bca0d9 /sshd.c
parent238abf6a14d6ed038918fa35f618089230e68fd6 (diff)
- markus@cvs.openbsd.org 2001/04/04 14:34:58
[clientloop.c kex.c kex.h serverloop.c sshconnect2.c sshd.c] enable server side rekeying + some rekey related clientup. todo: we should not send any non-KEX messages after we send KEXINIT
Diffstat (limited to 'sshd.c')
-rw-r--r--sshd.c9
1 files changed, 7 insertions, 2 deletions
diff --git a/sshd.c b/sshd.c
index 0bb4269d5..ea29e75ac 100644
--- a/sshd.c
+++ b/sshd.c
@@ -40,7 +40,7 @@
40 */ 40 */
41 41
42#include "includes.h" 42#include "includes.h"
43RCSID("$OpenBSD: sshd.c,v 1.188 2001/04/04 09:48:35 markus Exp $"); 43RCSID("$OpenBSD: sshd.c,v 1.189 2001/04/04 14:34:58 markus Exp $");
44 44
45#include <openssl/dh.h> 45#include <openssl/dh.h>
46#include <openssl/bn.h> 46#include <openssl/bn.h>
@@ -141,6 +141,9 @@ int num_listen_socks = 0;
141char *client_version_string = NULL; 141char *client_version_string = NULL;
142char *server_version_string = NULL; 142char *server_version_string = NULL;
143 143
144/* for rekeying XXX fixme */
145Kex *xxx_kex;
146
144/* 147/*
145 * Any really sensitive data in the application is contained in this 148 * Any really sensitive data in the application is contained in this
146 * structure. The idea is that this structure could be locked into memory so 149 * structure. The idea is that this structure could be locked into memory so
@@ -1425,13 +1428,15 @@ do_ssh2_kex(void)
1425 } 1428 }
1426 myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = list_hostkey_types(); 1429 myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = list_hostkey_types();
1427 1430
1431 /* start key exchange */
1428 kex = kex_setup(myproposal); 1432 kex = kex_setup(myproposal);
1429 kex->server = 1; 1433 kex->server = 1;
1430 kex->client_version_string=client_version_string; 1434 kex->client_version_string=client_version_string;
1431 kex->server_version_string=server_version_string; 1435 kex->server_version_string=server_version_string;
1432 kex->load_host_key=&get_hostkey_by_type; 1436 kex->load_host_key=&get_hostkey_by_type;
1433 1437
1434 /* start key exchange */ 1438 xxx_kex = kex;
1439
1435 dispatch_run(DISPATCH_BLOCK, &kex->newkeys, kex); 1440 dispatch_run(DISPATCH_BLOCK, &kex->newkeys, kex);
1436 1441
1437 session_id2 = kex->session_id; 1442 session_id2 = kex->session_id;