summaryrefslogtreecommitdiffhomepage
diff options
context:
space:
mode:
-rw-r--r--common-kex.c6
-rw-r--r--dropbearkey.c2
-rw-r--r--svr-kex.c2
-rw-r--r--sysoptions.h3
4 files changed, 7 insertions, 6 deletions
diff --git a/common-kex.c b/common-kex.c
index 55c5aba..173bf8c 100644
--- a/common-kex.c
+++ b/common-kex.c
@@ -272,8 +272,8 @@ static void hashkeys(unsigned char *out, int outlen,
}
/* Generate the actual encryption/integrity keys, using the results of the
- * key exchange, as specified in section 5.2 of the IETF secsh-transport
- * draft. This occurs after the DH key-exchange.
+ * key exchange, as specified in section 7.2 of the transport rfc 4253.
+ * This occurs after the DH key-exchange.
*
* ses.newkeys is the new set of keys which are generated, these are only
* taken into use after both sides have sent a newkeys message */
@@ -532,7 +532,7 @@ static void load_dh_p(mp_int * dh_p)
}
/* Initialises and generate one side of the diffie-hellman key exchange values.
- * See the ietf-secsh-transport draft, section 6, for details */
+ * See the transport rfc 4253 section 8 for details */
/* dh_pub and dh_priv MUST be already initialised */
void gen_kexdh_vals(mp_int *dh_pub, mp_int *dh_priv) {
diff --git a/dropbearkey.c b/dropbearkey.c
index aff809f..421b6e0 100644
--- a/dropbearkey.c
+++ b/dropbearkey.c
@@ -23,7 +23,7 @@
* SOFTWARE. */
/* The format of the keyfiles is basically a raw dump of the buffer. Data types
- * are specified in the transport draft - string is a 32-bit len then the
+ * are specified in the transport rfc 4253 - string is a 32-bit len then the
* non-null-terminated string, mp_int is a 32-bit len then the bignum data.
* The actual functions are buf_put_rsa_priv_key() and buf_put_dss_priv_key()
diff --git a/svr-kex.c b/svr-kex.c
index 75cb090..abd7986 100644
--- a/svr-kex.c
+++ b/svr-kex.c
@@ -70,7 +70,7 @@ void recv_msg_kexdh_init() {
* that, the session hash is calculated, and signed with RSA or DSS. The
* result is sent to the client.
*
- * See the ietf-secsh-transport draft, section 6, for details */
+ * See the transport rfc 4253 section 8 for details */
static void send_msg_kexdh_reply(mp_int *dh_e) {
DEF_MP_INT(dh_y);
diff --git a/sysoptions.h b/sysoptions.h
index 9be5aca..2329391 100644
--- a/sysoptions.h
+++ b/sysoptions.h
@@ -99,6 +99,7 @@
#define MAX_PROPOSED_ALGO 20
/* size/count limits */
+/* From transport rfc */
#define MIN_PACKET_LEN 16
#define RECV_MAX_PACKET_LEN (MAX(35000, ((RECV_MAX_PAYLOAD_LEN)+100)))
@@ -123,7 +124,7 @@
#define MAX_PRIVKEY_SIZE 1700
/* The maximum size of the bignum portion of the kexhash buffer */
-/* Sect. 8 of the transport draft, K_S + e + f + K */
+/* Sect. 8 of the transport rfc 4253, K_S + e + f + K */
#define KEXHASHBUF_MAX_INTS (1700 + 130 + 130 + 130)
#define DROPBEAR_MAX_SOCKS 2 /* IPv4, IPv6 are all we'll get for now. Revisit