diff options
author | djm@openbsd.org <djm@openbsd.org> | 2016-02-08 10:57:07 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2016-02-08 21:58:32 +1100 |
commit | 19bcf2ea2d17413f2d9730dd2a19575ff86b9b6a (patch) | |
tree | a87286b290fcd540635890856fbcafef74341ec0 /opacket.h | |
parent | 603ba41179e4b53951c7b90ee95b6ef3faa3f15d (diff) |
upstream commit
refactor activation of rekeying
This makes automatic rekeying internal to the packet code (previously
the server and client loops needed to assist). In doing to it makes
application of rekey limits more accurate by accounting for packets
about to be sent as well as packets queued during rekeying events
themselves.
Based on a patch from dtucker@ which was in turn based on a patch
Aleksander Adamowski in bz#2521; ok markus@
Upstream-ID: a441227fd64f9739850ca97b4cf794202860fcd8
Diffstat (limited to 'opacket.h')
-rw-r--r-- | opacket.h | 2 |
1 files changed, 0 insertions, 2 deletions
@@ -125,8 +125,6 @@ void packet_disconnect(const char *, ...) | |||
125 | sshpkt_add_padding(active_state, (pad)) | 125 | sshpkt_add_padding(active_state, (pad)) |
126 | #define packet_send_ignore(nbytes) \ | 126 | #define packet_send_ignore(nbytes) \ |
127 | ssh_packet_send_ignore(active_state, (nbytes)) | 127 | ssh_packet_send_ignore(active_state, (nbytes)) |
128 | #define packet_need_rekeying() \ | ||
129 | ssh_packet_need_rekeying(active_state) | ||
130 | #define packet_set_server() \ | 128 | #define packet_set_server() \ |
131 | ssh_packet_set_server(active_state) | 129 | ssh_packet_set_server(active_state) |
132 | #define packet_set_authenticated() \ | 130 | #define packet_set_authenticated() \ |