diff options
author | green <green@FreeBSD.org> | 2001-03-20 02:06:40 +0000 |
---|---|---|
committer | green <green@FreeBSD.org> | 2001-03-20 02:06:40 +0000 |
commit | e1c06db9614adac5dbc0db3be048e6d3bb916b61 (patch) | |
tree | fe71e102a08e22c9c3eee0426a45576c1899fff7 /crypto/openssh/sshconnect.h | |
parent | 67cc54d757c106c29d0172b918a9dde0ffa3bddf (diff) | |
download | FreeBSD-src-e1c06db9614adac5dbc0db3be048e6d3bb916b61.zip FreeBSD-src-e1c06db9614adac5dbc0db3be048e6d3bb916b61.tar.gz |
Make password attacks based on traffic analysis harder by requiring that
"non-echoed" characters are still echoed back in a null packet, as well
as pad passwords sent to not give hints to the length otherwise.
Obtained from: OpenBSD
Diffstat (limited to 'crypto/openssh/sshconnect.h')
-rw-r--r-- | crypto/openssh/sshconnect.h | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/crypto/openssh/sshconnect.h b/crypto/openssh/sshconnect.h index 0b0287e..b2e70d5 100644 --- a/crypto/openssh/sshconnect.h +++ b/crypto/openssh/sshconnect.h @@ -38,4 +38,6 @@ ssh_userauth(const char* local_user, const char* server_user, char *host, void ssh_kex2(char *host, struct sockaddr *hostaddr); void ssh_userauth2(const char *server_user, char *host); +void ssh_put_password(char *password); + #endif |