diff options
author | siddharth <s@ricketyspace.net> | 2022-01-21 19:30:26 -0500 |
---|---|---|
committer | siddharth <s@ricketyspace.net> | 2022-01-21 19:31:43 -0500 |
commit | 0325ffc0afb5798e1242f6c7da3c0f34d87dcb38 (patch) | |
tree | ded6c248359ab1ae03a24c645b1750ff3b9e1911 | |
parent | 889516bb504a7eb7172b1382566110e29bdbd15b (diff) |
challenge: update challenge 34v0.34.0
Use sha1 of the session key as the key for encryption/decryption
instead of the session key itself.
-rw-r--r-- | challenge/c34.go | 10 |
1 files changed, 8 insertions, 2 deletions
diff --git a/challenge/c34.go b/challenge/c34.go index 86a40b8..130c437 100644 --- a/challenge/c34.go +++ b/challenge/c34.go @@ -63,7 +63,10 @@ func C34(args []string) { // Encipher using AES-CBC. encipher := func(skey *big.Int, msg string) (string, error) { // Make key out of DH sesssion key. - skeyb := skey.Bytes() + sha1 := lib.Sha1{} + sha1.Init([]uint32{}) + sha1.Message(skey.Bytes()) + skeyb := sha1.Hash() if len(skeyb) < 16 { // Pad it to 16 bytes. skeyb = append(skeyb, make([]byte, 16-len(skeyb))...) @@ -89,7 +92,10 @@ func C34(args []string) { // Decipher using AES-CBC. decipher := func(skey *big.Int, packet string) (string, error) { // Make key out of DH sesssion key. - skeyb := skey.Bytes() + sha1 := lib.Sha1{} + sha1.Init([]uint32{}) + sha1.Message(skey.Bytes()) + skeyb := sha1.Hash() if len(skeyb) < 16 { // Pad it to 16 bytes. skeyb = append(skeyb, make([]byte, 16-len(skeyb))...) |