@@ -5,19 +5,18 @@ use std::sync::Arc;
55
66use bytes:: Bytes ;
77use log:: { debug, error, warn} ;
8- use signature:: Verifier ;
98use ssh_encoding:: { Decode , Encode } ;
109use ssh_key:: { Mpint , PublicKey , Signature } ;
1110
1211use super :: IncomingSshPacket ;
1312use crate :: client:: { Config , NewKeys } ;
1413use crate :: kex:: dh:: groups:: DhGroup ;
15- use crate :: kex:: { KexAlgorithm , KexAlgorithmImplementor , KexCause , KexProgress , KEXES } ;
14+ use crate :: kex:: { KEXES , KexAlgorithm , KexAlgorithmImplementor , KexCause , KexProgress } ;
1615use crate :: keys:: key:: parse_public_key;
1716use crate :: negotiation:: { Names , Select } ;
1817use crate :: session:: Exchange ;
1918use crate :: sshbuffer:: PacketWriter ;
20- use crate :: { msg , negotiation , strict_kex_violation , CryptoVec , Error , SshId } ;
19+ use crate :: { CryptoVec , Error , SshId , msg , negotiation , strict_kex_violation } ;
2120
2221thread_local ! {
2322 static HASH_BUFFER : RefCell <CryptoVec > = RefCell :: new( CryptoVec :: new( ) ) ;
@@ -116,7 +115,9 @@ impl ClientKex {
116115
117116 let names = {
118117 // read algorithms from packet.
119- self . exchange . server_kex_init . extend_from_slice ( & input. buffer ) ;
118+ self . exchange
119+ . server_kex_init
120+ . extend_from_slice ( & input. buffer ) ;
120121 negotiation:: Client :: read_kex (
121122 & input. buffer ,
122123 & self . config . preferred ,
@@ -270,7 +271,9 @@ impl ClientKex {
270271 ) ;
271272
272273 let server_ephemeral = Bytes :: decode ( r) ?;
273- self . exchange . server_ephemeral . extend_from_slice ( & server_ephemeral) ;
274+ self . exchange
275+ . server_ephemeral
276+ . extend_from_slice ( & server_ephemeral) ;
274277 kex. compute_shared_secret ( & self . exchange . server_ephemeral ) ?;
275278
276279 let mut pubkey_vec = Vec :: new ( ) ;
@@ -288,7 +291,9 @@ impl ClientKex {
288291 let signature = Bytes :: decode ( r) ?;
289292 let signature = Signature :: decode ( & mut & signature[ ..] ) ?;
290293
291- if let Err ( e) = signature_next:: Verifier :: verify ( & server_host_key, hash. as_ref ( ) , & signature) {
294+ if let Err ( e) =
295+ signature:: Verifier :: verify ( & server_host_key, hash. as_ref ( ) , & signature)
296+ {
292297 debug ! ( "wrong server sig: {e:?}" ) ;
293298 return Err ( Error :: WrongServerSig ) ;
294299 }
0 commit comments