]> asedeno.scripts.mit.edu Git - PuTTY.git/commit
Now that we've got at least some SDCTR modes working (and aes256-ctr is our
authorBen Harris <bjh21@bjh21.me.uk>
Sat, 23 Apr 2005 16:22:51 +0000 (16:22 +0000)
committerBen Harris <bjh21@bjh21.me.uk>
Sat, 23 Apr 2005 16:22:51 +0000 (16:22 +0000)
commitf2b0335c48ee9afe69420f9869cf205f018ace99
tree5e78b0b7d37c6cea3b9eeb20c89b3b085d53ff50
parentb28330fc35b257fdbda92e16442aa2c90a13671d
Now that we've got at least some SDCTR modes working (and aes256-ctr is our
default preferred cipher), add code to inject SSH_MSG_IGNOREs to randomise
the IV when using CBC-mode ciphers.  Each cipher has a flag to indicate
whether it needs this workaround, and the SSH packet output maze has gained
some extra complexity to implement it.

[originally from svn r5659]
ssh.c
ssh.h
sshaes.c
ssharcf.c
sshblowf.c
sshdes.c