diff options
author | Damien Miller <djm@mindrot.org> | 1999-11-24 14:26:21 +0100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 1999-11-24 14:26:21 +0100 |
commit | 95def09838fc61b37b6ea7cd5c234a465b4b129b (patch) | |
tree | 042744f76f40a326b873cb1c3690a6d7d966bc3e /deattack.h | |
parent | - Add recommendation to use GNU make to INSTALL document (diff) | |
download | openssh-95def09838fc61b37b6ea7cd5c234a465b4b129b.tar.xz openssh-95def09838fc61b37b6ea7cd5c234a465b4b129b.zip |
- Merged very large OpenBSD source code reformat
- OpenBSD CVS updates
- [channels.c cipher.c compat.c log-client.c scp.c serverloop.c]
[ssh.h sshd.8 sshd.c]
syslog changes:
* Unified Logmessage for all auth-types, for success and for failed
* Standard connections get only ONE line in the LOG when level==LOG:
Auth-attempts are logged only, if authentication is:
a) successfull or
b) with passwd or
c) we had more than AUTH_FAIL_LOG failues
* many log() became verbose()
* old behaviour with level=VERBOSE
- [readconf.c readconf.h ssh.1 ssh.h sshconnect.c sshd.c]
tranfer s/key challenge/response data in SSH_SMSG_AUTH_TIS_CHALLENGE
messages. allows use of s/key in windows (ttssh, securecrt) and
ssh-1.2.27 clients without 'ssh -v', ok: niels@
- [sshd.8]
-V, for fallback to openssh in SSH2 compatibility mode
- [sshd.c]
fix sigchld race; cjc5@po.cwru.edu
Diffstat (limited to 'deattack.h')
-rw-r--r-- | deattack.h | 7 |
1 files changed, 4 insertions, 3 deletions
diff --git a/deattack.h b/deattack.h index a0dcf5b6f..6ce54dedb 100644 --- a/deattack.h +++ b/deattack.h @@ -1,4 +1,4 @@ -/* $Id: deattack.h,v 1.1 1999/10/27 03:42:44 damien Exp $ +/* * Cryptographic attack detector for ssh - Header file * * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. @@ -14,7 +14,8 @@ * SOFTWARE. * * Ariel Futoransky <futo@core-sdi.com> - * <http://www.core-sdi.com> */ + * <http://www.core-sdi.com> + */ #ifndef _DEATTACK_H #define _DEATTACK_H @@ -23,5 +24,5 @@ #define DEATTACK_OK 0 #define DEATTACK_DETECTED 1 -int detect_attack(unsigned char *buf, u_int32_t len, unsigned char IV[8]); +int detect_attack(unsigned char *buf, u_int32_t len, unsigned char IV[8]); #endif |