X-Git-Url: https://asedeno.scripts.mit.edu/gitweb/?a=blobdiff_plain;f=ssh.h;h=75aad70ba82beddc788da304ef1c4250c6d6b1de;hb=2eb952ca31aa13d1f6f429305fbb6f43a9a28c56;hp=139ea33f114f90d8128e58f7b4bd79cf5b2a2711;hpb=1df12e3915bb7713a3122cee27827072077b51f6;p=PuTTY.git diff --git a/ssh.h b/ssh.h index 139ea33f..75aad70b 100644 --- a/ssh.h +++ b/ssh.h @@ -24,6 +24,7 @@ void sshfwd_x11_is_local(struct ssh_channel *c); extern Socket ssh_connection_sharing_init(const char *host, int port, Conf *conf, Ssh ssh, void **state); +int ssh_share_test_for_upstream(const char *host, int port, Conf *conf); void share_got_pkt_from_server(void *ctx, int type, unsigned char *pkt, int pktlen); void share_activate(void *state, const char *server_verstring); @@ -319,7 +320,19 @@ struct ssh2_cipher { void (*decrypt_length) (void *, unsigned char *blk, int len, unsigned long seq); const char *name; int blksize; - int keylen; + /* real_keybits is the number of bits of entropy genuinely used by + * the cipher scheme; it's used for deciding how big a + * Diffie-Hellman group is needed to exchange a key for the + * cipher. */ + int real_keybits; + /* padded_keybytes is the number of bytes of key data expected as + * input to the setkey function; it's used for deciding how much + * data needs to be generated from the post-kex generation of key + * material. In a sensible cipher which uses all its key bytes for + * real work, this will just be real_keybits/8, but in DES-type + * ciphers which ignore one bit in each byte, it'll be slightly + * different. */ + int padded_keybytes; unsigned int flags; #define SSH_CIPHER_IS_CBC 1 #define SSH_CIPHER_SEPARATE_LENGTH 2 @@ -347,7 +360,7 @@ struct ssh_mac { void (*genresult) (void *, unsigned char *); int (*verresult) (void *, unsigned char const *); const char *name, *etm_name; - int len; + int len, keylen; const char *text_name; };