mirror of
https://git.tartarus.org/simon/putty.git
synced 2025-01-10 09:58:01 +00:00
When emitting SSH_MSG_IGNORE to protect against known-IV attacks on CBC,
remember to put an empty string in it rather than sending a completely empty packet. This should help with those servers (notably RomSShell) that actually check the contents of SSH_MSG_IGNORE. [originally from svn r7236]
This commit is contained in:
parent
9c35141162
commit
91694cb3a2
1
ssh.c
1
ssh.c
@ -1864,6 +1864,7 @@ static void ssh2_pkt_defer_noqueue(Ssh ssh, struct Packet *pkt, int noignore)
|
|||||||
* get encrypted with a known IV.
|
* get encrypted with a known IV.
|
||||||
*/
|
*/
|
||||||
struct Packet *ipkt = ssh2_pkt_init(SSH2_MSG_IGNORE);
|
struct Packet *ipkt = ssh2_pkt_init(SSH2_MSG_IGNORE);
|
||||||
|
ssh2_pkt_addstring_start(ipkt);
|
||||||
ssh2_pkt_defer_noqueue(ssh, ipkt, TRUE);
|
ssh2_pkt_defer_noqueue(ssh, ipkt, TRUE);
|
||||||
}
|
}
|
||||||
len = ssh2_pkt_construct(ssh, pkt);
|
len = ssh2_pkt_construct(ssh, pkt);
|
||||||
|
Loading…
Reference in New Issue
Block a user