diff options
author | djm@openbsd.org <djm@openbsd.org> | 2023-12-18 15:45:17 +0100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2023-12-18 15:51:11 +0100 |
commit | 1edb00c58f8a6875fad6a497aa2bacf37f9e6cd5 (patch) | |
tree | d1e2e3a301cdfb9fe828e290710faf1a5f273bdd /packet.h | |
parent | better detection of broken -fzero-call-used-regs (diff) | |
download | openssh-1edb00c58f8a6875fad6a497aa2bacf37f9e6cd5.tar.xz openssh-1edb00c58f8a6875fad6a497aa2bacf37f9e6cd5.zip |
upstream: implement "strict key exchange" in ssh and sshd
This adds a protocol extension to improve the integrity of the SSH
transport protocol, particular in and around the initial key exchange
(KEX) phase.
Full details of the extension are in the PROTOCOL file.
with markus@
OpenBSD-Commit-ID: 2a66ac962f0a630d7945fee54004ed9e9c439f14
Diffstat (limited to 'packet.h')
-rw-r--r-- | packet.h | 3 |
1 files changed, 1 insertions, 2 deletions
@@ -1,4 +1,4 @@ -/* $OpenBSD: packet.h,v 1.95 2023/08/28 03:31:16 djm Exp $ */ +/* $OpenBSD: packet.h,v 1.96 2023/12/18 14:45:17 djm Exp $ */ /* * Author: Tatu Ylonen <ylo@cs.hut.fi> @@ -124,7 +124,6 @@ int ssh_packet_send2_wrapped(struct ssh *); int ssh_packet_send2(struct ssh *); int ssh_packet_read(struct ssh *); -int ssh_packet_read_expect(struct ssh *, u_int type); int ssh_packet_read_poll(struct ssh *); int ssh_packet_read_poll2(struct ssh *, u_char *, u_int32_t *seqnr_p); int ssh_packet_process_incoming(struct ssh *, const char *buf, u_int len); |