summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/packet.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
* avoid more fatal/exit in the packet.c paths that ssh-keyscandjm2015-01-301-5/+7
| | | | uses; feedback and "looks good" markus@
* avoid fatal() calls in packet codedjm2015-01-281-2/+2
| | | | | makes ssh-keyscan more reliable against server failures ok dtucker@ markus@
* add experimental api for packet layer; ok djm@markus2015-01-191-1/+13
|
* move dispatch to struct ssh; ok djm@markus2015-01-191-1/+8
|
* update packet.c & isolate, introduce struct sshmarkus2015-01-191-95/+133
| | | | | | | | a) switch packet.c to buffer api and isolate per-connection info into struct ssh b) (de)serialization of the state is moved from monitor to packet.c c) the old packet.c API is implemented in opacket.[ch] d) compress.c/h is removed and integrated into packet.c with and ok djm@
* unbreak compression, by re-init-ing the compression code in themarkus2014-05-031-1/+2
| | | | | | post-auth child. the new buffer code is more strict, and requires buffer_init() while the old code was happy after a bzero(); originally from djm@
* buffer_get_string_ptr's return should be const to reminddjm2014-04-281-2/+2
| | | | | callers that futzing with it will futz with the actual buffer contents
* fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@djm2013-07-121-2/+2
|
* Add an optional second argument to RekeyLimit in the client to allowdtucker2013-05-161-2/+3
| | | | | rekeying based on elapsed time in addition to amount of traffic. with djm@ jmc@, ok djm
* packet_read_poll() is not used anymore.markus2012-01-251-2/+1
|
* set traffic class for IPv6 traffic as we do for IPv4 TOS;djm2011-05-061-2/+1
| | | | | patch from lionel AT mamane.lu via Colin Watson in bz#1855; ok markus@
* allow ssh and sshd to set arbitrary TOS/DSCP/QoS values instead ofdjm2010-11-131-2/+2
| | | | | | hardcoding lowdelay/throughput. bz#1733 patch from philipp AT redfish-solutions.com; ok markus@ deraadt@
* Implement Elliptic Curve Cryptography modes for key exchange (ECDH) anddjm2010-08-311-1/+4
| | | | | | | | | | | | | | | | | host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equivalent symmetric key length, as well as much shorter keys. Only the mandatory sections of RFC5656 are implemented, specifically the three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and ECDSA. Point compression (optional in RFC5656 is NOT implemented). Certificate host and user keys using the new ECDSA key types are supported. Note that this code has not been tested for interoperability and may be subject to change. feedback and ok markus@
* Add buffer_get_cstring() and related functions that verify that thedjm2010-08-311-1/+2
| | | | | | | | | | | | | string extracted from the buffer contains no embedded \0 characters* This prevents random (possibly malicious) crap from being appended to strings where it would not be noticed if the string is used with a string(3) function. Use the new API in a few sensitive places. * actually, we allow a single one at the end of the string for now because we don't know how many deployed implementations get this wrong, but don't count on this to remain indefinitely.
* packet_bacup_state() and packet_restore_state() will be used toandreas2009-06-271-1/+4
| | | | | temporarily save the current state ren resuming a suspended connection. ok markus@
* Add packet_put_int64() and packet_get_int64(), part of a larger changeandreas2009-05-271-1/+3
| | | | | from Martin Forssen. ok markus@
* Put the globals in packet.c into a struct and don't access it directlyandreas2009-05-251-4/+8
| | | | | from other files. No functional changes. ok markus@ djm@
* sync v1 and v2 traffic accounting; add it to sshd, too; ok djm@, dtucker@markus2008-07-101-3/+3
|
* Make keepalive timeouts apply while waiting for a packet, particularly duringdtucker2008-06-121-1/+2
| | | | key renegotiation (bz #1363). With djm and Matt Day, ok djm@
* avoid extra malloc/copy/free when receiving data over the net;markus2008-05-081-1/+2
| | | | ~10% speedup for localhost-scp; ok djm@
* Allow all SSH2 packet types, including UNIMPLEMENTED to reset thedtucker2008-02-221-1/+2
| | | | keepalive timer (bz #1307). ok markus@
* standardise spacing in $OpenBSD$ tags; requested by deraadt@djm2006-03-251-1/+1
|
* move #include <termios.h> out of includes.h; ok markus@stevesk2006-02-071-1/+3
|
* add a new compression method that delays compression until the usermarkus2005-07-251-1/+3
| | | | | | | | | has been authenticated successfully and set compression to 'delayed' for sshd. this breaks older openssh clients (< 3.5) if they insist on compression, so you have to re-enable compression in sshd_config. ok djm@
* make this -Wsign-compare clean; ok avsm@ markus@djm2005-06-171-2/+2
|
* improve some code lint did not like; djm millert okderaadt2004-05-111-2/+2
|
* int -> u_int; ok djm@, deraadt@, mouring@markus2003-06-241-3/+3
|
* rename log() into logit() to avoid name conflict. markus ok, from netbsditojun2003-04-081-2/+2
|
* reapply rekeying chage, tested by henning@, ok djm@markus2003-04-021-3/+6
|
* backout rekeying changes (for 3.6.1)markus2003-04-011-6/+3
|
* rekeying bugfixes and automatic rekeying:markus2003-04-011-3/+6
| | | | | | | | | | | | * both client and server rekey _automatically_ (a) after 2^31 packets, because after 2^32 packets the sequence number for packets wraps (b) after 2^(blocksize_in_bits/4) blocks (see: http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt) (a) and (b) are _enabled_ by default, and only disabled for known openssh versions, that don't support rekeying properly. * client option 'RekeyLimit' * do not reply to requests during rekeying
* make the monitor sync the transfer ssh1 session key;markus2002-06-191-1/+2
| | | | | transfer keycontext only for RC4 (this is still depends on EVP implementation details and is broken).
* export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsepmarkus2002-03-181-1/+11
|
* $OpenBSD$ and RCSID() cleanup: don't use RCSID() in .h files; addstevesk2002-03-041-2/+2
| | | | | missing RCSID() to .c files and remove dup /*$OpenBSD$*/ from .c files. ok markus@
* packet_read* no longer return the packet length, since it's not used.markus2001-12-281-6/+6
|
* packet_get_bignum* no longer returns a sizemarkus2001-12-281-3/+3
|
* s/packet_done/packet_check_eom/ (end-of-message); ok djm@markus2001-12-281-2/+3
|
* get rid of packet_integrity_check, use packet_done() instead.markus2001-12-271-11/+1
|
* Conformance fix: we should send failing packet sequence number whendjm2001-12-201-1/+3
| | | | | responding with a SSH_MSG_UNIMPLEMENTED message. Spotted by yakk@yakk.dot.net; ok markus@
* change the buffer/packet interface to use void* vs. char*; ok markus@stevesk2001-12-191-5/+5
|
* pad using the padding field from the ssh2 packet instead of sendingmarkus2001-11-071-2/+2
| | | | extra ignore messages. tested against several other ssh servers.
* remove comments from .h, since they are cut&paste from the .c filesmarkus2001-06-261-178/+54
| | | | and out of sync
* prototype pedant. not very creative...itojun2001-06-261-13/+12
| | | | | - () -> (void) - no variable names
* remove some lines, simplify.markus2001-05-281-5/+2
|
* protocol 2 tty modes support; ok markus@stevesk2001-04-141-3/+3
|
* use ignore message to simulate a SSH2_MSG_CHANNEL_DATA messagemarkus2001-02-281-1/+4
| | | | use random content in ignore messages.
* in ssh protocol v2 use ignore messages for padding (instead of trailing \0).markus2001-02-281-1/+4
|
* split out keepalive from packet_interactive (from dale@accentre.com)markus2001-01-131-2/+2
| | | | set IPTOS_LOWDELAY TCP_NODELAY IPTOS_THROUGHPUT for ssh2, too.
* replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'markus2000-12-191-11/+11
| | | | with u_char.
* cleanup copyright notices on all files. I have attempted to be accurate withderaadt2000-09-071-8/+6
| | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.