summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/kex.h
diff options
context:
space:
mode:
authorMarkus Friedl <markus@cvs.openbsd.org>2001-03-05 17:17:22 +0000
committerMarkus Friedl <markus@cvs.openbsd.org>2001-03-05 17:17:22 +0000
commit7218d19a71f7c2a4ddc25c5a53094118396c1552 (patch)
tree540863db6e928cc4d51d1802d21cc44a11e08488 /usr.bin/ssh/kex.h
parentb5b298c7f02515dc226161e6ef5d3375180b8b2b (diff)
generate a 2*need size (~300 instead of 1024/2048) random private
exponent during the DH key agreement. according to Niels (the great german advisor) this is safe since /etc/primes contains strong primes only. References: P. C. van Oorschot and M. J. Wiener, On Diffie-Hellman key agreement with short exponents, In Advances in Cryptology - EUROCRYPT'96, LNCS 1070, Springer-Verlag, 1996, pp.332-343.
Diffstat (limited to 'usr.bin/ssh/kex.h')
-rw-r--r--usr.bin/ssh/kex.h4
1 files changed, 2 insertions, 2 deletions
diff --git a/usr.bin/ssh/kex.h b/usr.bin/ssh/kex.h
index 90496fbdf46..5004699d9c3 100644
--- a/usr.bin/ssh/kex.h
+++ b/usr.bin/ssh/kex.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: kex.h,v 1.14 2001/02/11 12:59:24 markus Exp $ */
+/* $OpenBSD: kex.h,v 1.15 2001/03/05 17:17:20 markus Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
@@ -106,7 +106,7 @@ void packet_set_kex(Kex *k);
int dh_pub_is_valid(DH *dh, BIGNUM *dh_pub);
DH *dh_new_group_asc(const char *, const char *);
DH *dh_new_group(BIGNUM *, BIGNUM *);
-void dh_gen_key(DH *);
+void dh_gen_key(DH *, int);
DH *dh_new_group1(void);
u_char *