diff options
author | naddy@openbsd.org <naddy@openbsd.org> | 2017-05-03 21:08:09 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2017-05-08 09:18:27 +1000 |
commit | 768405fddf64ff83aa6ef701ebb3c1f82d98a2f3 (patch) | |
tree | b06085d43ce03ece262bea0beb1f4407b312c209 /packet.c | |
parent | 1a1b24f8229bf7a21f89df21987433283265527a (diff) |
upstream commit
remove miscellaneous SSH1 leftovers; ok markus@
Upstream-ID: af23696022ae4d45a1abc2fb8b490d8d9dd63b7c
Diffstat (limited to 'packet.c')
-rw-r--r-- | packet.c | 21 |
1 files changed, 2 insertions, 19 deletions
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: packet.c,v 1.252 2017/04/30 23:28:42 djm Exp $ */ | 1 | /* $OpenBSD: packet.c,v 1.253 2017/05/03 21:08:09 naddy Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -184,10 +184,6 @@ struct session_state { | |||
184 | u_int32_t rekey_interval; /* how often in seconds */ | 184 | u_int32_t rekey_interval; /* how often in seconds */ |
185 | time_t rekey_time; /* time of last rekeying */ | 185 | time_t rekey_time; /* time of last rekeying */ |
186 | 186 | ||
187 | /* Session key for protocol v1 */ | ||
188 | u_char ssh1_key[SSH_SESSION_KEY_LENGTH]; | ||
189 | u_int ssh1_keylen; | ||
190 | |||
191 | /* roundup current message to extra_pad bytes */ | 187 | /* roundup current message to extra_pad bytes */ |
192 | u_char extra_pad; | 188 | u_char extra_pad; |
193 | 189 | ||
@@ -278,8 +274,7 @@ ssh_packet_is_rekeying(struct ssh *ssh) | |||
278 | } | 274 | } |
279 | 275 | ||
280 | /* | 276 | /* |
281 | * Sets the descriptors used for communication. Disables encryption until | 277 | * Sets the descriptors used for communication. |
282 | * packet_set_encryption_key is called. | ||
283 | */ | 278 | */ |
284 | struct ssh * | 279 | struct ssh * |
285 | ssh_packet_set_connection(struct ssh *ssh, int fd_in, int fd_out) | 280 | ssh_packet_set_connection(struct ssh *ssh, int fd_in, int fd_out) |
@@ -796,18 +791,6 @@ uncompress_buffer(struct ssh *ssh, struct sshbuf *in, struct sshbuf *out) | |||
796 | /* NOTREACHED */ | 791 | /* NOTREACHED */ |
797 | } | 792 | } |
798 | 793 | ||
799 | /* | ||
800 | * Causes any further packets to be encrypted using the given key. The same | ||
801 | * key is used for both sending and reception. However, both directions are | ||
802 | * encrypted independently of each other. | ||
803 | */ | ||
804 | |||
805 | void | ||
806 | ssh_packet_set_encryption_key(struct ssh *ssh, const u_char *key, u_int keylen, int number) | ||
807 | { | ||
808 | fatal("no SSH protocol 1 support"); | ||
809 | } | ||
810 | |||
811 | int | 794 | int |
812 | ssh_set_newkeys(struct ssh *ssh, int mode) | 795 | ssh_set_newkeys(struct ssh *ssh, int mode) |
813 | { | 796 | { |