mirror of
https://git.tartarus.org/simon/putty.git
synced 2025-07-02 03:52:49 -05:00
Now that we've got at least some SDCTR modes working (and aes256-ctr is our
default preferred cipher), add code to inject SSH_MSG_IGNOREs to randomise the IV when using CBC-mode ciphers. Each cipher has a flag to indicate whether it needs this workaround, and the SSH packet output maze has gained some extra complexity to implement it. [originally from svn r5659]
This commit is contained in:
@ -102,14 +102,14 @@ const struct ssh2_cipher ssh_arcfour128_ssh2 = {
|
||||
arcfour_make_context, arcfour_free_context, arcfour_iv, arcfour128_key,
|
||||
arcfour_block, arcfour_block,
|
||||
"arcfour128-draft-00@putty.projects.tartarus.org",
|
||||
1, 128, "Arcfour-128"
|
||||
1, 128, 0, "Arcfour-128"
|
||||
};
|
||||
|
||||
const struct ssh2_cipher ssh_arcfour256_ssh2 = {
|
||||
arcfour_make_context, arcfour_free_context, arcfour_iv, arcfour256_key,
|
||||
arcfour_block, arcfour_block,
|
||||
"arcfour256-draft-00@putty.projects.tartarus.org",
|
||||
1, 256, "Arcfour-256"
|
||||
1, 256, 0, "Arcfour-256"
|
||||
};
|
||||
|
||||
static const struct ssh2_cipher *const arcfour_list[] = {
|
||||
|
Reference in New Issue
Block a user