comparison session.h @ 1676:d5cdc60db08e

ext-info handling for server-sig-algs only client side is handled
author Matt Johnston <matt@ucc.asn.au>
date Tue, 19 May 2020 00:31:41 +0800
parents ae41624c2198
children 435cfb9ec96e
comparison
equal deleted inserted replaced
1675:ae41624c2198 1676:d5cdc60db08e
183 buffer* transkexinit; /* the kexinit packet we send should be kept so we 183 buffer* transkexinit; /* the kexinit packet we send should be kept so we
184 can add it to the hash when generating keys */ 184 can add it to the hash when generating keys */
185 185
186 /* Enables/disables compression */ 186 /* Enables/disables compression */
187 algo_type *compress_algos; 187 algo_type *compress_algos;
188
189 /* Other side allows SSH_MSG_EXT_INFO */
190 int allow_ext_info;
188 191
189 /* a list of queued replies that should be sent after a KEX has 192 /* a list of queued replies that should be sent after a KEX has
190 concluded (ie, while dataallowed was unset)*/ 193 concluded (ie, while dataallowed was unset)*/
191 struct packetlist *reply_queue_head, *reply_queue_tail; 194 struct packetlist *reply_queue_head, *reply_queue_tail;
192 195
311 info request from the server for 314 info request from the server for
312 interactive auth.*/ 315 interactive auth.*/
313 #endif 316 #endif
314 sign_key *lastprivkey; 317 sign_key *lastprivkey;
315 318
316 enum signature_type server_sig_algs[DROPBEAR_SIGNKEY_NUM_NAMED+1]; 319 buffer *server_sig_algs;
317 int server_sig_algs_count;
318 #if DROPBEAR_RSA
319 /* Set to DROPBEAR_SIGNATURE_RSA_SHA256 or DROPBEAR_SIGNATURE_RSA_SHA1
320 if depending which the server accepts */
321 enum signature_type preferred_rsa_sigtype;
322 #endif
323 320
324 int retval; /* What the command exit status was - we emulate it */ 321 int retval; /* What the command exit status was - we emulate it */
325 #if 0 322 #if 0
326 TODO 323 TODO
327 struct AgentkeyList *agentkeys; /* Keys to use for public-key auth */ 324 struct AgentkeyList *agentkeys; /* Keys to use for public-key auth */