summaryrefslogtreecommitdiff
path: root/kex.c
diff options
context:
space:
mode:
authormouring <mouring>2002-12-23 02:04:22 +0000
committermouring <mouring>2002-12-23 02:04:22 +0000
commitd1791d27e550efb94a1d6a0e03e9ed2fbf10cc1a (patch)
tree3a035ed04ac403a4d69a3484300f14320c2a5ca9 /kex.c
parent62f9c48cc24fd0e0be56e0a46f4dae810b5bf35e (diff)
downloadopenssh-d1791d27e550efb94a1d6a0e03e9ed2fbf10cc1a.tar.gz
- markus@cvs.openbsd.org 2002/11/21 22:45:31
[cipher.c kex.c packet.c sshconnect.c sshconnect2.c] debug->debug2, unify debug messages
Diffstat (limited to 'kex.c')
-rw-r--r--kex.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/kex.c b/kex.c
index bdbf3882..11366359 100644
--- a/kex.c
+++ b/kex.c
@@ -23,7 +23,7 @@
*/
#include "includes.h"
-RCSID("$OpenBSD: kex.c,v 1.51 2002/06/24 14:55:38 markus Exp $");
+RCSID("$OpenBSD: kex.c,v 1.52 2002/11/21 22:45:31 markus Exp $");
#include <openssl/crypto.h>
@@ -135,7 +135,7 @@ kex_finish(Kex *kex)
/* packet_write_wait(); */
debug("SSH2_MSG_NEWKEYS sent");
- debug("waiting for SSH2_MSG_NEWKEYS");
+ debug("expecting SSH2_MSG_NEWKEYS");
packet_read_expect(SSH2_MSG_NEWKEYS);
packet_check_eom();
debug("SSH2_MSG_NEWKEYS received");
@@ -433,7 +433,7 @@ kex_derive_keys(Kex *kex, u_char *hash, BIGNUM *shared_secret)
for (i = 0; i < NKEYS; i++)
keys[i] = derive_key(kex, 'A'+i, kex->we_need, hash, shared_secret);
- debug("kex_derive_keys");
+ debug2("kex_derive_keys");
for (mode = 0; mode < MODE_MAX; mode++) {
current_keys[mode] = kex->newkeys[mode];
kex->newkeys[mode] = NULL;