version 1.75, 2005/06/09 13:43:49 |
version 1.76, 2005/06/17 02:44:32 |
|
|
fatal("cipher_init: EVP_CipherInit failed for %s", |
fatal("cipher_init: EVP_CipherInit failed for %s", |
cipher->name); |
cipher->name); |
klen = EVP_CIPHER_CTX_key_length(&cc->evp); |
klen = EVP_CIPHER_CTX_key_length(&cc->evp); |
if (klen > 0 && keylen != klen) { |
if (klen > 0 && keylen != (u_int)klen) { |
debug2("cipher_init: set keylen (%d -> %d)", klen, keylen); |
debug2("cipher_init: set keylen (%d -> %d)", klen, keylen); |
if (EVP_CIPHER_CTX_set_key_length(&cc->evp, keylen) == 0) |
if (EVP_CIPHER_CTX_set_key_length(&cc->evp, keylen) == 0) |
fatal("cipher_init: set keylen failed (%d -> %d)", |
fatal("cipher_init: set keylen failed (%d -> %d)", |
|
|
case SSH_CIPHER_DES: |
case SSH_CIPHER_DES: |
case SSH_CIPHER_BLOWFISH: |
case SSH_CIPHER_BLOWFISH: |
evplen = EVP_CIPHER_CTX_iv_length(&cc->evp); |
evplen = EVP_CIPHER_CTX_iv_length(&cc->evp); |
if (evplen == 0) |
if (evplen <= 0) |
return; |
return; |
if (evplen != len) |
if ((u_int)evplen != len) |
fatal("%s: wrong iv length %d != %d", __func__, |
fatal("%s: wrong iv length %d != %d", __func__, |
evplen, len); |
evplen, len); |
if (c->evptype == evp_aes_128_ctr) |
if (c->evptype == evp_aes_128_ctr) |