summaryrefslogtreecommitdiff
path: root/packet.h
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2021-07-16 09:00:23 +0000
committerDamien Miller <djm@mindrot.org>2021-07-16 19:21:04 +1000
commit073f45c236550f158c9a94003e4611c07dea5279 (patch)
tree28b6063b16e538dedb76516ba6db5fd5e6ae2d98 /packet.h
parentef7c4e52d5d840607f9ca3a302a4cbb81053eccf (diff)
downloadopenssh-git-073f45c236550f158c9a94003e4611c07dea5279.tar.gz
upstream: Explicitly check for and start time-based rekeying in the
client and server mainloops. Previously the rekey timeout could expire but rekeying would not start until a packet was sent or received. This could cause us to spin in select() on the rekey timeout if the connection was quiet. ok markus@ OpenBSD-Commit-ID: 4356cf50d7900f3df0a8f2117d9e07c91b9ff987
Diffstat (limited to 'packet.h')
-rw-r--r--packet.h3
1 files changed, 2 insertions, 1 deletions
diff --git a/packet.h b/packet.h
index c2544bd9..2ad0e70c 100644
--- a/packet.h
+++ b/packet.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: packet.h,v 1.92 2020/03/06 18:11:10 markus Exp $ */
+/* $OpenBSD: packet.h,v 1.93 2021/07/16 09:00:23 djm Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
@@ -105,6 +105,7 @@ void ssh_packet_clear_keys(struct ssh *);
void ssh_clear_newkeys(struct ssh *, int);
int ssh_packet_is_rekeying(struct ssh *);
+int ssh_packet_check_rekey(struct ssh *);
void ssh_packet_set_protocol_flags(struct ssh *, u_int);
u_int ssh_packet_get_protocol_flags(struct ssh *);
void ssh_packet_set_tos(struct ssh *, int);