summaryrefslogtreecommitdiffstats
path: root/crypto/openssh/channels.h
diff options
context:
space:
mode:
authorgreen <green@FreeBSD.org>2001-03-20 02:06:40 +0000
committergreen <green@FreeBSD.org>2001-03-20 02:06:40 +0000
commite1c06db9614adac5dbc0db3be048e6d3bb916b61 (patch)
treefe71e102a08e22c9c3eee0426a45576c1899fff7 /crypto/openssh/channels.h
parent67cc54d757c106c29d0172b918a9dde0ffa3bddf (diff)
downloadFreeBSD-src-e1c06db9614adac5dbc0db3be048e6d3bb916b61.zip
FreeBSD-src-e1c06db9614adac5dbc0db3be048e6d3bb916b61.tar.gz
Make password attacks based on traffic analysis harder by requiring that
"non-echoed" characters are still echoed back in a null packet, as well as pad passwords sent to not give hints to the length otherwise. Obtained from: OpenBSD
Diffstat (limited to 'crypto/openssh/channels.h')
-rw-r--r--crypto/openssh/channels.h2
1 files changed, 2 insertions, 0 deletions
diff --git a/crypto/openssh/channels.h b/crypto/openssh/channels.h
index 0052686..8f23dee 100644
--- a/crypto/openssh/channels.h
+++ b/crypto/openssh/channels.h
@@ -32,6 +32,7 @@
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
+/* RCSID("$FreeBSD$"); */
/* RCSID("$OpenBSD: channels.h,v 1.22 2000/10/27 07:48:22 markus Exp $"); */
#ifndef CHANNELS_H
@@ -73,6 +74,7 @@ struct Channel {
int wfd; /* write fd */
int efd; /* extended fd */
int sock; /* sock fd */
+ int isatty; /* rfd is a tty */
Buffer input; /* data read from socket, to be sent over
* encrypted connection */
Buffer output; /* data received over encrypted connection for
OpenPOWER on IntegriCloud