comparison kex.h @ 623:895fbe068f2c

Fix case where "-K 1" would cause a SSH_MSG_IGNORE packet to be sent with the wrong encryption key ("bad packet length" symptom) while key exchange was happening.
author Matt Johnston <matt@ucc.asn.au>
date Tue, 07 Jun 2011 11:55:44 +0000
parents d58c478bd399
children 2b1bb792cd4d d44325108d0e b07eb3dc23ec
comparison
equal deleted inserted replaced
622:e27d7fb23376 623:895fbe068f2c
50 struct KEXState { 50 struct KEXState {
51 51
52 unsigned sentkexinit : 1; /*set when we've sent/recv kexinit packet */ 52 unsigned sentkexinit : 1; /*set when we've sent/recv kexinit packet */
53 unsigned recvkexinit : 1; 53 unsigned recvkexinit : 1;
54 unsigned firstfollows : 1; /* true when first_kex_packet_follows is set */ 54 unsigned firstfollows : 1; /* true when first_kex_packet_follows is set */
55 unsigned sentnewkeys : 1; /* set once we've send/recv'ed MSG_NEWKEYS*/ 55 unsigned sentnewkeys : 1; /* set once we've send MSG_NEWKEYS (will be cleared once we have also received */
56 unsigned recvnewkeys : 1; 56 unsigned recvnewkeys : 1; /* set once we've received MSG_NEWKEYS (cleared once we have also sent */
57 57
58 unsigned donefirstkex : 1; /* Set to 1 after the first kex has completed, 58 unsigned donefirstkex : 1; /* Set to 1 after the first kex has completed,
59 ie the transport layer has been set up */ 59 ie the transport layer has been set up */
60 60
61 time_t lastkextime; /* time of the last kex */ 61 time_t lastkextime; /* time of the last kex */