version 1.42, 2001/01/21 19:05:46 |
version 1.43, 2001/02/04 15:32:23 |
|
|
void |
void |
cast_setiv(CipherContext *cc, const u_char *iv, u_int ivlen) |
cast_setiv(CipherContext *cc, const u_char *iv, u_int ivlen) |
{ |
{ |
if (iv == NULL) |
if (iv == NULL) |
fatal("no IV for %s.", cc->cipher->name); |
fatal("no IV for %s.", cc->cipher->name); |
memcpy(cc->u.cast.iv, (char *)iv, 8); |
memcpy(cc->u.cast.iv, (char *)iv, 8); |
} |
} |
|
|
void |
void |
rijndael_setiv(CipherContext *cc, const u_char *iv, u_int ivlen) |
rijndael_setiv(CipherContext *cc, const u_char *iv, u_int ivlen) |
{ |
{ |
if (iv == NULL) |
if (iv == NULL) |
fatal("no IV for %s.", cc->cipher->name); |
fatal("no IV for %s.", cc->cipher->name); |
memcpy((u_char *)cc->u.rijndael.iv, iv, RIJNDAEL_BLOCKSIZE); |
memcpy((u_char *)cc->u.rijndael.iv, iv, RIJNDAEL_BLOCKSIZE); |
} |
} |
|
|
SSH_CIPHER_SSH2, 16, 32, |
SSH_CIPHER_SSH2, 16, 32, |
rijndael_setkey, rijndael_setiv, |
rijndael_setkey, rijndael_setiv, |
rijndael_cbc_encrypt, rijndael_cbc_decrypt }, |
rijndael_cbc_encrypt, rijndael_cbc_decrypt }, |
{ NULL, SSH_CIPHER_ILLEGAL, 0, 0, NULL, NULL, NULL, NULL } |
{ NULL, SSH_CIPHER_ILLEGAL, 0, 0, NULL, NULL, NULL, NULL } |
}; |
}; |
|
|
/*--*/ |
/*--*/ |