summaryrefslogtreecommitdiff
path: root/packet.c
diff options
context:
space:
mode:
authornaddy@openbsd.org <naddy@openbsd.org>2017-05-03 21:08:09 +0000
committerDamien Miller <djm@mindrot.org>2017-05-08 09:18:27 +1000
commit768405fddf64ff83aa6ef701ebb3c1f82d98a2f3 (patch)
treeb06085d43ce03ece262bea0beb1f4407b312c209 /packet.c
parent1a1b24f8229bf7a21f89df21987433283265527a (diff)
upstream commit
remove miscellaneous SSH1 leftovers; ok markus@ Upstream-ID: af23696022ae4d45a1abc2fb8b490d8d9dd63b7c
Diffstat (limited to 'packet.c')
-rw-r--r--packet.c21
1 files changed, 2 insertions, 19 deletions
diff --git a/packet.c b/packet.c
index f997064cb..533bd1e61 100644
--- a/packet.c
+++ b/packet.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: packet.c,v 1.252 2017/04/30 23:28:42 djm Exp $ */ 1/* $OpenBSD: packet.c,v 1.253 2017/05/03 21:08:09 naddy Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -184,10 +184,6 @@ struct session_state {
184 u_int32_t rekey_interval; /* how often in seconds */ 184 u_int32_t rekey_interval; /* how often in seconds */
185 time_t rekey_time; /* time of last rekeying */ 185 time_t rekey_time; /* time of last rekeying */
186 186
187 /* Session key for protocol v1 */
188 u_char ssh1_key[SSH_SESSION_KEY_LENGTH];
189 u_int ssh1_keylen;
190
191 /* roundup current message to extra_pad bytes */ 187 /* roundup current message to extra_pad bytes */
192 u_char extra_pad; 188 u_char extra_pad;
193 189
@@ -278,8 +274,7 @@ ssh_packet_is_rekeying(struct ssh *ssh)
278} 274}
279 275
280/* 276/*
281 * Sets the descriptors used for communication. Disables encryption until 277 * Sets the descriptors used for communication.
282 * packet_set_encryption_key is called.
283 */ 278 */
284struct ssh * 279struct ssh *
285ssh_packet_set_connection(struct ssh *ssh, int fd_in, int fd_out) 280ssh_packet_set_connection(struct ssh *ssh, int fd_in, int fd_out)
@@ -796,18 +791,6 @@ uncompress_buffer(struct ssh *ssh, struct sshbuf *in, struct sshbuf *out)
796 /* NOTREACHED */ 791 /* NOTREACHED */
797} 792}
798 793
799/*
800 * Causes any further packets to be encrypted using the given key. The same
801 * key is used for both sending and reception. However, both directions are
802 * encrypted independently of each other.
803 */
804
805void
806ssh_packet_set_encryption_key(struct ssh *ssh, const u_char *key, u_int keylen, int number)
807{
808 fatal("no SSH protocol 1 support");
809}
810
811int 794int
812ssh_set_newkeys(struct ssh *ssh, int mode) 795ssh_set_newkeys(struct ssh *ssh, int mode)
813{ 796{