- markus@cvs.openbsd.org 2001/04/04 00:06:54
[clientloop.c sshconnect2.c]
enable client rekeying
(1) force rekeying with ~R, or
(2) if the server requests rekeying.
works against ssh-2.0.12/2.0.13/2.1.0/2.2.0/2.3.0/2.3.1/2.4.0
diff --git a/sshconnect2.c b/sshconnect2.c
index dd3f36b..1c52231 100644
--- a/sshconnect2.c
+++ b/sshconnect2.c
@@ -23,7 +23,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: sshconnect2.c,v 1.62 2001/04/03 23:32:12 markus Exp $");
+RCSID("$OpenBSD: sshconnect2.c,v 1.63 2001/04/04 00:06:54 markus Exp $");
#include <openssl/bn.h>
#include <openssl/md5.h>
@@ -69,6 +69,8 @@
char *xxx_host;
struct sockaddr *xxx_hostaddr;
+Kex *xxx_kex = NULL;
+
int
check_host_key_callback(Key *hostkey)
{
@@ -114,6 +116,8 @@
kex->server_version_string=server_version_string;
kex->check_host_key=&check_host_key_callback;
+ xxx_kex = kex;
+
/* start key exchange */
dispatch_run(DISPATCH_BLOCK, &kex->newkeys, kex);