version 1.6, 2000/09/07 20:27:54 |
version 1.7, 2000/10/11 20:27:24 |
|
|
#include "ssh.h" |
#include "ssh.h" |
#include "buffer.h" |
#include "buffer.h" |
#include "packet.h" |
#include "packet.h" |
#include "cipher.h" |
|
#include "mpaux.h" |
#include "mpaux.h" |
#include "uidswap.h" |
#include "uidswap.h" |
#include "readconf.h" |
#include "readconf.h" |
|
|
|
|
if (options.cipher == SSH_CIPHER_ILLEGAL) { |
if (options.cipher == SSH_CIPHER_ILLEGAL) { |
log("No valid SSH1 cipher, using %.100s instead.", |
log("No valid SSH1 cipher, using %.100s instead.", |
cipher_name(SSH_FALLBACK_CIPHER)); |
cipher_name(ssh_cipher_default)); |
options.cipher = SSH_FALLBACK_CIPHER; |
options.cipher = ssh_cipher_default; |
} else if (options.cipher == SSH_CIPHER_NOT_SET) { |
} else if (options.cipher == SSH_CIPHER_NOT_SET) { |
if (cipher_mask1() & supported_ciphers & (1 << ssh_cipher_default)) |
if (cipher_mask1() & supported_ciphers & (1 << ssh_cipher_default)) |
options.cipher = ssh_cipher_default; |
options.cipher = ssh_cipher_default; |
else { |
|
debug("Cipher %s not supported, using %.100s instead.", |
|
cipher_name(ssh_cipher_default), |
|
cipher_name(SSH_FALLBACK_CIPHER)); |
|
options.cipher = SSH_FALLBACK_CIPHER; |
|
} |
|
} |
} |
/* Check that the selected cipher is supported. */ |
/* Check that the selected cipher is supported. */ |
if (!(supported_ciphers & (1 << options.cipher))) |
if (!(supported_ciphers & (1 << options.cipher))) |