version 1.12, 2019/01/21 10:07:22 |
version 1.13, 2019/01/21 10:20:12 |
|
|
goto out; |
goto out; |
} |
} |
if ((r = kexc25519_shared_key(kex->c25519_client_key, server_pubkey, |
if ((r = kexc25519_shared_key(kex->c25519_client_key, server_pubkey, |
shared_secret)) < 0) |
shared_secret)) != 0) |
goto out; |
goto out; |
|
|
/* calc and verify H */ |
/* calc and verify H */ |
|
|
sshbuf_ptr(kex->my), sshbuf_len(kex->my), |
sshbuf_ptr(kex->my), sshbuf_len(kex->my), |
sshbuf_ptr(kex->peer), sshbuf_len(kex->peer), |
sshbuf_ptr(kex->peer), sshbuf_len(kex->peer), |
server_host_key_blob, sbloblen, |
server_host_key_blob, sbloblen, |
kex->c25519_client_pubkey, |
kex->c25519_client_pubkey, sizeof(kex->c25519_client_pubkey), |
server_pubkey, |
server_pubkey, pklen, |
sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), |
sshbuf_ptr(shared_secret), sshbuf_len(shared_secret), |
hash, &hashlen)) < 0) |
hash, &hashlen)) != 0) |
goto out; |
goto out; |
|
|
if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen, |
if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen, |