Commit a4610232 authored by Niels Möller's avatar Niels Möller

*** empty log message ***

Rev: doc/TODO:1.78
Rev: doc/srp-spec.nroff:1.3
Rev: src/abstract_crypto.c:1.15
parent b4534bf3
......@@ -218,14 +218,5 @@ pointer in some other places as well.
Exceptions from listen are handled badly in several places.
Occasionally,
lsh -p 4711 -v localhost echo hello
exits without writing any "hello". Perhaps some race condition, as I
can't reproduce it reliably.
Get rid of the install_keys class.
invert-defs doesn't work quite right when a message number has several
names. For now, use sort -nu.
Write a conversion program to read and write openssh/ssh2 style public
keys.
......@@ -14,7 +14,7 @@
.in 0
.ce
Using the SRP as a key exchange metod in Secure Shell
Using the SRP protocol as a key exchange method in Secure Shell
.ti 0
Status of this Memo
......@@ -136,7 +136,7 @@ authenticating the server, the user must prove knowledge of the key
To do this, the client sends m1 = HMAC(K, H) to the server, where H is
the "exchange hash" defined below. After verifying the MAC, the server
responds by sending m2 = HMAC(K, e | m1 | K) to the client. Actually,
responds by sending m2 = HMAC(K, e | m1 | H) to the client. Actually,
the purpose of this final message exchange is twofold: (i) to prove
knowledge of the shared secret key K, completing the SRP protocol, and
(ii) to use the shared key K to authenticate the exchange hash. The
......
......@@ -109,7 +109,7 @@ mac_string(struct mac_algorithm *a,
KILL(mac);
if (kfree)
lsh_string_alloc(key);
lsh_string_free(key);
if (ifree)
lsh_string_free(in);
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment