summaryrefslogtreecommitdiffhomepage
path: root/common-kex.c
diff options
context:
space:
mode:
authorMatt Johnston <matt@ucc.asn.au>2014-01-23 21:56:35 +0800
committerMatt Johnston <matt@ucc.asn.au>2014-01-23 21:56:35 +0800
commit8128b15e4157abc382f360eaf95c0fabefe5bc61 (patch)
tree3641a48821e6eeaae375238fab58e85281668e4a /common-kex.c
parent8081b0e03399c608dcbe8ebe187e9017886a0c34 (diff)
Fix failing rekeying when we receive a still-in-flight packet
Diffstat (limited to 'common-kex.c')
-rw-r--r--common-kex.c5
1 files changed, 1 insertions, 4 deletions
diff --git a/common-kex.c b/common-kex.c
index b318515..3c1e604 100644
--- a/common-kex.c
+++ b/common-kex.c
@@ -483,9 +483,6 @@ static void gen_new_zstream_trans() {
* and we calculate the first portion of the key-exchange-hash for used
* later in the key exchange. No response is sent, as the client should
* initiate the diffie-hellman key exchange */
-
-/* Originally from kex.c, generalized for cli/svr mode --mihnea */
-/* Belongs in common_kex.c where it should be moved after review */
void recv_msg_kexinit() {
unsigned int kexhashbuf_len = 0;
@@ -528,7 +525,7 @@ void recv_msg_kexinit() {
/* I_S, the payload of the server's SSH_MSG_KEXINIT */
buf_setpos(ses.payload, 0);
buf_putstring(ses.kexhashbuf, ses.payload->data, ses.payload->len);
-
+ ses.requirenext[0] = SSH_MSG_KEXDH_REPLY;
} else {
/* SERVER */