version 1.9, 1999/10/05 01:23:54 |
version 1.10, 1999/11/02 19:42:36 |
|
|
packet_encrypt(CipherContext *cc, void *dest, void *src, |
packet_encrypt(CipherContext *cc, void *dest, void *src, |
unsigned int bytes) |
unsigned int bytes) |
{ |
{ |
assert((bytes % 8) == 0); |
|
cipher_encrypt(cc, dest, src, bytes); |
cipher_encrypt(cc, dest, src, bytes); |
} |
} |
|
|
|
|
{ |
{ |
int i; |
int i; |
|
|
assert((bytes % 8) == 0); |
if ((bytes % 8) != 0) |
|
fatal("packet_decrypt: bad ciphertext length %d", bytes); |
|
|
/* |
/* |
Cryptographic attack detector for ssh - Modifications for packet.c |
Cryptographic attack detector for ssh - Modifications for packet.c |
|
|
buffer_consume(&incoming_packet, 8 - len % 8); |
buffer_consume(&incoming_packet, 8 - len % 8); |
|
|
/* Test check bytes. */ |
/* Test check bytes. */ |
assert(len == buffer_len(&incoming_packet)); |
|
|
if (len != buffer_len(&incoming_packet)) |
|
packet_disconnect("packet_read_poll: len %d != buffer_len %d.", |
|
len, buffer_len(&incoming_packet)); |
|
|
ucp = (unsigned char *)buffer_ptr(&incoming_packet) + len - 4; |
ucp = (unsigned char *)buffer_ptr(&incoming_packet) + len - 4; |
stored_checksum = GET_32BIT(ucp); |
stored_checksum = GET_32BIT(ucp); |
if (checksum != stored_checksum) |
if (checksum != stored_checksum) |