diff options
author | wbx <wbx@hydrogenium.(none)> | 2009-05-17 14:41:34 +0200 |
---|---|---|
committer | wbx <wbx@hydrogenium.(none)> | 2009-05-17 14:41:34 +0200 |
commit | 219a6dab8995aad9ac4860cc1a84d6f3509a03a4 (patch) | |
tree | b9c0f3c43aebba2fcfef777592d0add39f2072f4 /package/dsniff/patches/patch-ssh_c |
Initial import
Diffstat (limited to 'package/dsniff/patches/patch-ssh_c')
-rw-r--r-- | package/dsniff/patches/patch-ssh_c | 46 |
1 files changed, 46 insertions, 0 deletions
diff --git a/package/dsniff/patches/patch-ssh_c b/package/dsniff/patches/patch-ssh_c new file mode 100644 index 000000000..2bf20f1f6 --- /dev/null +++ b/package/dsniff/patches/patch-ssh_c @@ -0,0 +1,46 @@ +$Id: update-patches 24 2008-08-31 14:56:13Z wbx $ +--- dsniff-2.4.orig/ssh.c 2001-03-15 09:33:04.000000000 +0100 ++++ dsniff-2.4/ssh.c 2009-05-09 23:17:07.000000000 +0200 +@@ -331,12 +331,14 @@ SSH_accept(SSH *ssh) + ssh->encrypt = des3_encrypt; + ssh->decrypt = des3_decrypt; + } ++#ifndef OPENSSL_NO_BF + else if (cipher == SSH_CIPHER_BLOWFISH) { + ssh->estate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey)); + ssh->dstate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey)); + ssh->encrypt = blowfish_encrypt; + ssh->decrypt = blowfish_decrypt; + } ++#endif + + /* Send verification. */ + msg[0] = SSH_SMSG_SUCCESS; +@@ -461,18 +463,20 @@ SSH_connect(SSH *ssh) + return (-1); + } + /* Set cipher. */ +- if (cipher == SSH_CIPHER_BLOWFISH) { +- ssh->estate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey)); +- ssh->dstate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey)); +- ssh->encrypt = blowfish_encrypt; +- ssh->decrypt = blowfish_decrypt; +- } +- else if (cipher == SSH_CIPHER_3DES) { ++ if (cipher == SSH_CIPHER_3DES) { + ssh->estate = des3_init(ssh->sesskey, sizeof(ssh->sesskey)); + ssh->dstate = des3_init(ssh->sesskey, sizeof(ssh->sesskey)); + ssh->encrypt = des3_encrypt; + ssh->decrypt = des3_decrypt; + } ++#ifndef OPENSSL_NO_BF ++ else if (cipher == SSH_CIPHER_BLOWFISH) { ++ ssh->estate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey)); ++ ssh->dstate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey)); ++ ssh->encrypt = blowfish_encrypt; ++ ssh->decrypt = blowfish_decrypt; ++ } ++#endif + /* Get server response. */ + if ((i = SSH_recv(ssh, pkt, sizeof(pkt))) <= 0) { + warn("SSH_recv"); |