diff options
author | Ben Lindstrom <mouring@eviladmin.org> | 2001-04-04 17:57:54 +0000 |
---|---|---|
committer | Ben Lindstrom <mouring@eviladmin.org> | 2001-04-04 17:57:54 +0000 |
commit | 8ac9106c3dfbc1f02ddf237067cccd54ffac4e8d (patch) | |
tree | f7ec941db419252643adbf7a1b13895c92bca0d9 /sshd.c | |
parent | 238abf6a14d6ed038918fa35f618089230e68fd6 (diff) |
- markus@cvs.openbsd.org 2001/04/04 14:34:58
[clientloop.c kex.c kex.h serverloop.c sshconnect2.c sshd.c]
enable server side rekeying + some rekey related clientup.
todo: we should not send any non-KEX messages after we send KEXINIT
Diffstat (limited to 'sshd.c')
-rw-r--r-- | sshd.c | 9 |
1 files changed, 7 insertions, 2 deletions
@@ -40,7 +40,7 @@ | |||
40 | */ | 40 | */ |
41 | 41 | ||
42 | #include "includes.h" | 42 | #include "includes.h" |
43 | RCSID("$OpenBSD: sshd.c,v 1.188 2001/04/04 09:48:35 markus Exp $"); | 43 | RCSID("$OpenBSD: sshd.c,v 1.189 2001/04/04 14:34:58 markus Exp $"); |
44 | 44 | ||
45 | #include <openssl/dh.h> | 45 | #include <openssl/dh.h> |
46 | #include <openssl/bn.h> | 46 | #include <openssl/bn.h> |
@@ -141,6 +141,9 @@ int num_listen_socks = 0; | |||
141 | char *client_version_string = NULL; | 141 | char *client_version_string = NULL; |
142 | char *server_version_string = NULL; | 142 | char *server_version_string = NULL; |
143 | 143 | ||
144 | /* for rekeying XXX fixme */ | ||
145 | Kex *xxx_kex; | ||
146 | |||
144 | /* | 147 | /* |
145 | * Any really sensitive data in the application is contained in this | 148 | * Any really sensitive data in the application is contained in this |
146 | * structure. The idea is that this structure could be locked into memory so | 149 | * structure. The idea is that this structure could be locked into memory so |
@@ -1425,13 +1428,15 @@ do_ssh2_kex(void) | |||
1425 | } | 1428 | } |
1426 | myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = list_hostkey_types(); | 1429 | myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = list_hostkey_types(); |
1427 | 1430 | ||
1431 | /* start key exchange */ | ||
1428 | kex = kex_setup(myproposal); | 1432 | kex = kex_setup(myproposal); |
1429 | kex->server = 1; | 1433 | kex->server = 1; |
1430 | kex->client_version_string=client_version_string; | 1434 | kex->client_version_string=client_version_string; |
1431 | kex->server_version_string=server_version_string; | 1435 | kex->server_version_string=server_version_string; |
1432 | kex->load_host_key=&get_hostkey_by_type; | 1436 | kex->load_host_key=&get_hostkey_by_type; |
1433 | 1437 | ||
1434 | /* start key exchange */ | 1438 | xxx_kex = kex; |
1439 | |||
1435 | dispatch_run(DISPATCH_BLOCK, &kex->newkeys, kex); | 1440 | dispatch_run(DISPATCH_BLOCK, &kex->newkeys, kex); |
1436 | 1441 | ||
1437 | session_id2 = kex->session_id; | 1442 | session_id2 = kex->session_id; |