aboutsummaryrefslogtreecommitdiff
path: root/src/packet_crypt.c
diff options
context:
space:
mode:
authorAlberto Aguirre <albaguirre@gmail.com>2018-02-28 10:25:02 -0600
committerAndreas Schneider <asn@cryptomilk.org>2018-06-28 09:06:30 +0200
commit1ece5a849c2c6d8a7411afb6b69a718638dc0786 (patch)
treec07eba327f83dabdad615549f269c45f53017b65 /src/packet_crypt.c
parent23accdde1a9a18f846b3bfb0a7ba6a2a1e236805 (diff)
downloadlibssh-1ece5a849c2c6d8a7411afb6b69a718638dc0786.tar.gz
libssh-1ece5a849c2c6d8a7411afb6b69a718638dc0786.tar.xz
libssh-1ece5a849c2c6d8a7411afb6b69a718638dc0786.zip
packet_crypt: Avoid setting keys every time
Avoid setting keys on every packet decrypt or encrypt operation. Signed-off-by: Alberto Aguirre <albaguirre@gmail.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
Diffstat (limited to 'src/packet_crypt.c')
-rw-r--r--src/packet_crypt.c13
1 files changed, 0 insertions, 13 deletions
diff --git a/src/packet_crypt.c b/src/packet_crypt.c
index fb09a225..68103afb 100644
--- a/src/packet_crypt.c
+++ b/src/packet_crypt.c
@@ -117,13 +117,6 @@ int ssh_packet_decrypt(ssh_session session,
return SSH_ERROR;
}
- rc = crypto->set_decrypt_key(crypto,
- session->current_crypto->decryptkey,
- session->current_crypto->decryptIV);
- if (rc < 0) {
- return -1;
- }
-
if (crypto->aead_decrypt != NULL) {
return crypto->aead_decrypt(crypto,
source,
@@ -177,12 +170,6 @@ unsigned char *ssh_packet_encrypt(ssh_session session, void *data, uint32_t len)
hmac_update(ctx,data,len);
hmac_final(ctx,session->current_crypto->hmacbuf,&finallen);
- if (crypto->set_encrypt_key(crypto, session->current_crypto->encryptkey,
- session->current_crypto->encryptIV) < 0) {
- SAFE_FREE(out);
- return NULL;
- }
-
#ifdef DEBUG_CRYPTO
ssh_print_hexa("mac: ",data,hmac_digest_len(type));
if (finallen != hmac_digest_len(type)) {