summaryrefslogtreecommitdiffstats
path: root/deattack.h
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>1999-11-24 14:26:21 +0100
committerDamien Miller <djm@mindrot.org>1999-11-24 14:26:21 +0100
commit95def09838fc61b37b6ea7cd5c234a465b4b129b (patch)
tree042744f76f40a326b873cb1c3690a6d7d966bc3e /deattack.h
parent - Add recommendation to use GNU make to INSTALL document (diff)
downloadopenssh-95def09838fc61b37b6ea7cd5c234a465b4b129b.tar.xz
openssh-95def09838fc61b37b6ea7cd5c234a465b4b129b.zip
- Merged very large OpenBSD source code reformat
- OpenBSD CVS updates - [channels.c cipher.c compat.c log-client.c scp.c serverloop.c] [ssh.h sshd.8 sshd.c] syslog changes: * Unified Logmessage for all auth-types, for success and for failed * Standard connections get only ONE line in the LOG when level==LOG: Auth-attempts are logged only, if authentication is: a) successfull or b) with passwd or c) we had more than AUTH_FAIL_LOG failues * many log() became verbose() * old behaviour with level=VERBOSE - [readconf.c readconf.h ssh.1 ssh.h sshconnect.c sshd.c] tranfer s/key challenge/response data in SSH_SMSG_AUTH_TIS_CHALLENGE messages. allows use of s/key in windows (ttssh, securecrt) and ssh-1.2.27 clients without 'ssh -v', ok: niels@ - [sshd.8] -V, for fallback to openssh in SSH2 compatibility mode - [sshd.c] fix sigchld race; cjc5@po.cwru.edu
Diffstat (limited to 'deattack.h')
-rw-r--r--deattack.h7
1 files changed, 4 insertions, 3 deletions
diff --git a/deattack.h b/deattack.h
index a0dcf5b6f..6ce54dedb 100644
--- a/deattack.h
+++ b/deattack.h
@@ -1,4 +1,4 @@
-/* $Id: deattack.h,v 1.1 1999/10/27 03:42:44 damien Exp $
+/*
* Cryptographic attack detector for ssh - Header file
*
* Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina.
@@ -14,7 +14,8 @@
* SOFTWARE.
*
* Ariel Futoransky <futo@core-sdi.com>
- * <http://www.core-sdi.com> */
+ * <http://www.core-sdi.com>
+ */
#ifndef _DEATTACK_H
#define _DEATTACK_H
@@ -23,5 +24,5 @@
#define DEATTACK_OK 0
#define DEATTACK_DETECTED 1
-int detect_attack(unsigned char *buf, u_int32_t len, unsigned char IV[8]);
+int detect_attack(unsigned char *buf, u_int32_t len, unsigned char IV[8]);
#endif