]> andersk Git - gssapi-openssh.git/blame - openssh/packet.h
http://www.psc.edu/networking/projects/hpn-ssh/openssh-5.2p1-hpn13v6.diff.gz committe...
[gssapi-openssh.git] / openssh / packet.h
CommitLineData
22616013 1/* $OpenBSD: packet.h,v 1.49 2008/07/10 18:08:11 markus Exp $ */
e9a17296 2
3c0ef626 3/*
4 * Author: Tatu Ylonen <ylo@cs.hut.fi>
5 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
6 * All rights reserved
7 * Interface for the packet protocol functions.
8 *
9 * As far as I am concerned, the code I have written for this software
10 * can be used freely for any purpose. Any derived versions of this
11 * software must be clearly marked as such, and if the derived work is
12 * incompatible with the protocol description in the RFC file, it must be
13 * called by a name other than "ssh" or "Secure Shell".
14 */
15
3c0ef626 16#ifndef PACKET_H
17#define PACKET_H
18
9108f8d9 19#include <termios.h>
20
3c0ef626 21#include <openssl/bn.h>
22
76d45d2f 23void
24packet_request_rekeying(void);
25
3c0ef626 26void packet_set_connection(int, int);
22616013 27void packet_set_timeout(int, int);
3c0ef626 28void packet_set_nonblocking(void);
29int packet_get_connection_in(void);
30int packet_get_connection_out(void);
31void packet_close(void);
32void packet_set_encryption_key(const u_char *, u_int, int);
f5799ae1 33u_int packet_get_encryption_key(u_char *);
3c0ef626 34void packet_set_protocol_flags(u_int);
35u_int packet_get_protocol_flags(void);
36void packet_start_compression(int);
37void packet_set_interactive(int);
38int packet_is_interactive(void);
665a873d 39void packet_set_server(void);
40void packet_set_authenticated(void);
76d45d2f 41int packet_authentication_state(void);
3c0ef626 42
43void packet_start(u_char);
44void packet_put_char(int ch);
45void packet_put_int(u_int value);
46void packet_put_bignum(BIGNUM * value);
47void packet_put_bignum2(BIGNUM * value);
e9a17296 48void packet_put_string(const void *buf, u_int len);
3c0ef626 49void packet_put_cstring(const char *str);
e9a17296 50void packet_put_raw(const void *buf, u_int len);
76d45d2f 51int packet_send(void);
3c0ef626 52
e9a17296 53int packet_read(void);
54void packet_read_expect(int type);
55int packet_read_poll(void);
3c0ef626 56void packet_process_incoming(const char *buf, u_int len);
e9a17296 57int packet_read_seqnr(u_int32_t *seqnr_p);
58int packet_read_poll_seqnr(u_int32_t *seqnr_p);
3c0ef626 59
60u_int packet_get_char(void);
61u_int packet_get_int(void);
e9a17296 62void packet_get_bignum(BIGNUM * value);
63void packet_get_bignum2(BIGNUM * value);
665a873d 64void *packet_get_raw(u_int *length_ptr);
e9a17296 65void *packet_get_string(u_int *length_ptr);
22616013 66void *packet_get_string_ptr(u_int *length_ptr);
3c0ef626 67void packet_disconnect(const char *fmt,...) __attribute__((format(printf, 1, 2)));
68void packet_send_debug(const char *fmt,...) __attribute__((format(printf, 1, 2)));
69
700318f3 70void set_newkeys(int mode);
71int packet_get_keyiv_len(int);
72void packet_get_keyiv(int, u_char *, u_int);
73int packet_get_keycontext(int, u_char *);
74void packet_set_keycontext(int, u_char *);
22616013 75void packet_get_state(int, u_int32_t *, u_int64_t *, u_int32_t *, u_int64_t *);
76void packet_set_state(int, u_int32_t, u_int64_t, u_int32_t, u_int64_t);
700318f3 77int packet_get_ssh1_cipher(void);
78void packet_set_iv(int, u_char *);
79
76d45d2f 80int packet_write_poll(void);
81int packet_write_wait(void);
3c0ef626 82int packet_have_data_to_write(void);
83int packet_not_very_much_data_to_write(void);
84
85int packet_connection_is_on_socket(void);
86int packet_connection_is_ipv4(void);
87int packet_remaining(void);
88void packet_send_ignore(int);
89void packet_add_padding(u_char);
90
91void tty_make_modes(int, struct termios *);
92void tty_parse_modes(int, int *);
93
0fff78ff 94extern u_int max_packet_size;
47686178 95extern int keep_alive_timeouts;
c9f39d2c 96int packet_set_maxsize(u_int);
3c0ef626 97#define packet_get_maxsize() max_packet_size
98
e9a17296 99/* don't allow remaining bytes after the end of the message */
100#define packet_check_eom() \
3c0ef626 101do { \
102 int _len = packet_remaining(); \
103 if (_len > 0) { \
0fff78ff 104 logit("Packet integrity error (%d bytes remaining) at %s:%d", \
3c0ef626 105 _len ,__FILE__, __LINE__); \
106 packet_disconnect("Packet integrity error."); \
107 } \
108} while (0)
109
0fff78ff 110int packet_need_rekeying(void);
111void packet_set_rekey_limit(u_int32_t);
112
3c0ef626 113#endif /* PACKET_H */
This page took 0.182973 seconds and 5 git commands to generate.