summaryrefslogtreecommitdiffstats
path: root/crypto/openssh/sshconnect.h
diff options
context:
space:
mode:
authorgreen <green@FreeBSD.org>2001-03-20 02:06:40 +0000
committergreen <green@FreeBSD.org>2001-03-20 02:06:40 +0000
commite1c06db9614adac5dbc0db3be048e6d3bb916b61 (patch)
treefe71e102a08e22c9c3eee0426a45576c1899fff7 /crypto/openssh/sshconnect.h
parent67cc54d757c106c29d0172b918a9dde0ffa3bddf (diff)
downloadFreeBSD-src-e1c06db9614adac5dbc0db3be048e6d3bb916b61.zip
FreeBSD-src-e1c06db9614adac5dbc0db3be048e6d3bb916b61.tar.gz
Make password attacks based on traffic analysis harder by requiring that
"non-echoed" characters are still echoed back in a null packet, as well as pad passwords sent to not give hints to the length otherwise. Obtained from: OpenBSD
Diffstat (limited to 'crypto/openssh/sshconnect.h')
-rw-r--r--crypto/openssh/sshconnect.h2
1 files changed, 2 insertions, 0 deletions
diff --git a/crypto/openssh/sshconnect.h b/crypto/openssh/sshconnect.h
index 0b0287e..b2e70d5 100644
--- a/crypto/openssh/sshconnect.h
+++ b/crypto/openssh/sshconnect.h
@@ -38,4 +38,6 @@ ssh_userauth(const char* local_user, const char* server_user, char *host,
void ssh_kex2(char *host, struct sockaddr *hostaddr);
void ssh_userauth2(const char *server_user, char *host);
+void ssh_put_password(char *password);
+
#endif
OpenPOWER on IntegriCloud