version 1.51, 2000/01/16 23:03:10 |
version 1.52, 2000/01/16 23:53:02 |
|
|
rsa_public_encrypt(key, key, public_key); |
rsa_public_encrypt(key, key, public_key); |
} |
} |
|
|
|
/* Destroy the public keys since we no longer need them. */ |
|
RSA_free(public_key); |
|
RSA_free(host_key); |
|
|
if (options.cipher == SSH_CIPHER_NOT_SET) { |
if (options.cipher == SSH_CIPHER_NOT_SET) { |
if (cipher_mask() & supported_ciphers & (1 << ssh_cipher_default)) |
if (cipher_mask() & supported_ciphers & (1 << ssh_cipher_default)) |
options.cipher = ssh_cipher_default; |
options.cipher = ssh_cipher_default; |
|
|
for (i = 0; i < 8; i++) |
for (i = 0; i < 8; i++) |
packet_put_char(cookie[i]); |
packet_put_char(cookie[i]); |
|
|
/* Send the encrypted encryption key. */ |
/* Send and destroy the encrypted encryption key integer. */ |
packet_put_bignum(key); |
packet_put_bignum(key); |
|
BN_clear_free(key); |
|
|
/* Send protocol flags. */ |
/* Send protocol flags. */ |
packet_put_int(client_flags); |
packet_put_int(client_flags); |
|
|
/* Send the packet now. */ |
/* Send the packet now. */ |
packet_send(); |
packet_send(); |
packet_write_wait(); |
packet_write_wait(); |
|
|
/* Destroy the session key integer and the public keys since we no longer need them. */ |
|
BN_clear_free(key); |
|
RSA_free(public_key); |
|
RSA_free(host_key); |
|
|
|
debug("Sent encrypted session key."); |
debug("Sent encrypted session key."); |
|
|