version 1.36, 2021/01/27 09:26:54 |
version 1.37, 2021/01/31 22:55:29 |
|
|
fprintf(stderr, "\nmin = %d, nbits = %d, max = %d\n", |
fprintf(stderr, "\nmin = %d, nbits = %d, max = %d\n", |
kex->min, kex->nbits, kex->max); |
kex->min, kex->nbits, kex->max); |
#endif |
#endif |
|
debug("expecting SSH2_MSG_KEX_DH_GEX_GROUP"); |
ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_GROUP, |
ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_GROUP, |
&input_kex_dh_gex_group); |
&input_kex_dh_gex_group); |
r = 0; |
r = 0; |
|
|
const BIGNUM *pub_key; |
const BIGNUM *pub_key; |
int r, bits; |
int r, bits; |
|
|
debug("got SSH2_MSG_KEX_DH_GEX_GROUP"); |
debug("SSH2_MSG_KEX_DH_GEX_GROUP received"); |
|
ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_GROUP, &kex_protocol_error); |
|
|
if ((r = sshpkt_get_bignum2(ssh, &p)) != 0 || |
if ((r = sshpkt_get_bignum2(ssh, &p)) != 0 || |
(r = sshpkt_get_bignum2(ssh, &g)) != 0 || |
(r = sshpkt_get_bignum2(ssh, &g)) != 0 || |
|
|
BN_print_fp(stderr, pub_key); |
BN_print_fp(stderr, pub_key); |
fprintf(stderr, "\n"); |
fprintf(stderr, "\n"); |
#endif |
#endif |
ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_GROUP, NULL); |
debug("expecting SSH2_MSG_KEX_DH_GEX_REPLY"); |
ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REPLY, &input_kex_dh_gex_reply); |
ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REPLY, &input_kex_dh_gex_reply); |
r = 0; |
r = 0; |
out: |
out: |
|
|
size_t slen, hashlen; |
size_t slen, hashlen; |
int r; |
int r; |
|
|
debug("got SSH2_MSG_KEX_DH_GEX_REPLY"); |
debug("SSH2_MSG_KEX_DH_GEX_REPLY received"); |
|
ssh_dispatch_set(ssh, SSH2_MSG_KEX_DH_GEX_REPLY, &kex_protocol_error); |
|
|
/* key, cert */ |
/* key, cert */ |
if ((r = sshpkt_getb_froms(ssh, &server_host_key_blob)) != 0) |
if ((r = sshpkt_getb_froms(ssh, &server_host_key_blob)) != 0) |
goto out; |
goto out; |