summaryrefslogtreecommitdiff
path: root/packet.h
diff options
context:
space:
mode:
authorDarren Tucker <dtucker@zip.com.au>2013-05-16 20:28:16 +1000
committerDarren Tucker <dtucker@zip.com.au>2013-05-16 20:28:16 +1000
commitc53c2af173cf67fd1c26f98e7900299b1b65b6ec (patch)
tree1c83d4abcdec31e4be6d8a2955fdad33b985b976 /packet.h
parent64c6fceecd27e1739040b42de8f3759454260b39 (diff)
downloadopenssh-git-c53c2af173cf67fd1c26f98e7900299b1b65b6ec.tar.gz
- dtucker@cvs.openbsd.org 2013/05/16 02:00:34
[ssh_config sshconnect2.c packet.c readconf.h readconf.c clientloop.c ssh_config.5 packet.h] Add an optional second argument to RekeyLimit in the client to allow rekeying based on elapsed time in addition to amount of traffic. with djm@ jmc@, ok djm
Diffstat (limited to 'packet.h')
-rw-r--r--packet.h5
1 files changed, 3 insertions, 2 deletions
diff --git a/packet.h b/packet.h
index 09ba0795..bc548f2b 100644
--- a/packet.h
+++ b/packet.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: packet.h,v 1.57 2012/01/25 19:40:09 markus Exp $ */
+/* $OpenBSD: packet.h,v 1.58 2013/05/16 02:00:34 dtucker Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
@@ -115,7 +115,8 @@ do { \
} while (0)
int packet_need_rekeying(void);
-void packet_set_rekey_limit(u_int32_t);
+void packet_set_rekey_limits(u_int32_t, time_t);
+time_t packet_get_rekey_timeout(void);
void packet_backup_state(void);
void packet_restore_state(void);