• R/O
  • SSH
  • HTTPS

ttssh2: Commit


Commit MetaInfo

Revision10262 (tree)
Time2022-09-11 15:04:20
Authornmaya

Log Message

KEX の Client Secret の取得に DH_get0_key() を使うようにした

OpenSSL 3 では直接アクセスできないため

Change Summary

Incremental Difference

--- trunk/ttssh2/ttxssh/ssh.c (revision 10261)
+++ trunk/ttssh2/ttxssh/ssh.c (revision 10262)
@@ -5098,7 +5098,7 @@
50985098 buffer_t *msg = NULL;
50995099 unsigned char *outmsg;
51005100 int len;
5101- BIGNUM *pub_key;
5101+ BIGNUM *pub_key, *priv_key;
51025102
51035103 // Diffie-Hellman key agreement
51045104 switch (pvar->kex_type) {
@@ -5121,7 +5121,8 @@
51215121
51225122 // 秘密にすべき乱数(X)を生成
51235123 dh_gen_key(pvar, dh, pvar->we_need);
5124- log_kex_key(pvar, dh->priv_key);
5124+ DH_get0_key(dh, NULL, &priv_key);
5125+ log_kex_key(pvar, priv_key);
51255126
51265127 msg = buffer_init();
51275128 if (msg == NULL) {
@@ -5273,7 +5274,7 @@
52735274 buffer_t *msg = NULL;
52745275 unsigned char *outmsg;
52755276 char tmpbuf[256];
5276- BIGNUM *pub_key;
5277+ BIGNUM *pub_key, *priv_key;
52775278
52785279 logputs(LOG_LEVEL_VERBOSE, "SSH2_MSG_KEX_DH_GEX_GROUP was received.");
52795280
@@ -5352,7 +5353,8 @@
53525353
53535354 // 秘密にすべき乱数(X)を生成
53545355 dh_gen_key(pvar, dh, pvar->we_need);
5355- log_kex_key(pvar, dh->priv_key);
5356+ DH_get0_key(dh, NULL, &priv_key);
5357+ log_kex_key(pvar, priv_key);
53565358
53575359 // 公開鍵をサーバへ送信
53585360 msg = buffer_init();
Show on old repository browser