return pkt->body + (pkt->savedpos - length);
}
static int ssh1_pkt_getrsakey(struct Packet *pkt, struct RSAKey *key,
- unsigned char **keystr)
+ const unsigned char **keystr)
{
int j;
struct do_ssh1_login_state {
int crLine;
int len;
- unsigned char *rsabuf, *keystr1, *keystr2;
+ unsigned char *rsabuf;
+ const unsigned char *keystr1, *keystr2;
unsigned long supported_ciphers_mask, supported_auths_mask;
int tried_publickey, tried_agent;
int tis_auth_refused, ccard_auth_refused;
ssh->kex->hash->text_name);
ssh->pkt_kctx = SSH2_PKTCTX_ECDHKEX;
- s->eckey = NULL;
- if (!strcmp(ssh->kex->name, "ecdh-sha2-nistp256")) {
- s->eckey = ssh_ecdhkex_newkey(ec_p256());
- } else if (!strcmp(ssh->kex->name, "ecdh-sha2-nistp384")) {
- s->eckey = ssh_ecdhkex_newkey(ec_p384());
- } else if (!strcmp(ssh->kex->name, "ecdh-sha2-nistp521")) {
- s->eckey = ssh_ecdhkex_newkey(ec_p521());
- }
+ s->eckey = ssh_ecdhkex_newkey(ssh->kex->name);
if (!s->eckey) {
bombout(("Unable to generate key for ECDH"));
crStopV;