summaryrefslogtreecommitdiff
path: root/package/dsniff/patches/patch-ssh_c
diff options
context:
space:
mode:
Diffstat (limited to 'package/dsniff/patches/patch-ssh_c')
-rw-r--r--package/dsniff/patches/patch-ssh_c46
1 files changed, 46 insertions, 0 deletions
diff --git a/package/dsniff/patches/patch-ssh_c b/package/dsniff/patches/patch-ssh_c
new file mode 100644
index 000000000..2bf20f1f6
--- /dev/null
+++ b/package/dsniff/patches/patch-ssh_c
@@ -0,0 +1,46 @@
+$Id: update-patches 24 2008-08-31 14:56:13Z wbx $
+--- dsniff-2.4.orig/ssh.c 2001-03-15 09:33:04.000000000 +0100
++++ dsniff-2.4/ssh.c 2009-05-09 23:17:07.000000000 +0200
+@@ -331,12 +331,14 @@ SSH_accept(SSH *ssh)
+ ssh->encrypt = des3_encrypt;
+ ssh->decrypt = des3_decrypt;
+ }
++#ifndef OPENSSL_NO_BF
+ else if (cipher == SSH_CIPHER_BLOWFISH) {
+ ssh->estate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey));
+ ssh->dstate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey));
+ ssh->encrypt = blowfish_encrypt;
+ ssh->decrypt = blowfish_decrypt;
+ }
++#endif
+
+ /* Send verification. */
+ msg[0] = SSH_SMSG_SUCCESS;
+@@ -461,18 +463,20 @@ SSH_connect(SSH *ssh)
+ return (-1);
+ }
+ /* Set cipher. */
+- if (cipher == SSH_CIPHER_BLOWFISH) {
+- ssh->estate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey));
+- ssh->dstate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey));
+- ssh->encrypt = blowfish_encrypt;
+- ssh->decrypt = blowfish_decrypt;
+- }
+- else if (cipher == SSH_CIPHER_3DES) {
++ if (cipher == SSH_CIPHER_3DES) {
+ ssh->estate = des3_init(ssh->sesskey, sizeof(ssh->sesskey));
+ ssh->dstate = des3_init(ssh->sesskey, sizeof(ssh->sesskey));
+ ssh->encrypt = des3_encrypt;
+ ssh->decrypt = des3_decrypt;
+ }
++#ifndef OPENSSL_NO_BF
++ else if (cipher == SSH_CIPHER_BLOWFISH) {
++ ssh->estate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey));
++ ssh->dstate = blowfish_init(ssh->sesskey,sizeof(ssh->sesskey));
++ ssh->encrypt = blowfish_encrypt;
++ ssh->decrypt = blowfish_decrypt;
++ }
++#endif
+ /* Get server response. */
+ if ((i = SSH_recv(ssh, pkt, sizeof(pkt))) <= 0) {
+ warn("SSH_recv");