version 1.302, 2021/11/13 21:14:13 |
version 1.303, 2021/11/25 23:02:24 |
|
|
int r, crypt_type; |
int r, crypt_type; |
const char *dir = mode == MODE_OUT ? "out" : "in"; |
const char *dir = mode == MODE_OUT ? "out" : "in"; |
|
|
debug2("set_newkeys: mode %d", mode); |
debug2_f("mode %d", mode); |
|
|
if (mode == MODE_OUT) { |
if (mode == MODE_OUT) { |
ccp = &state->send_context; |
ccp = &state->send_context; |
|
|
return r; |
return r; |
} |
} |
mac->enabled = 1; |
mac->enabled = 1; |
DBG(debug_f("cipher_init_context: %s", dir)); |
DBG(debug_f("cipher_init: %s", dir)); |
cipher_free(*ccp); |
cipher_free(*ccp); |
*ccp = NULL; |
*ccp = NULL; |
if ((r = cipher_init(ccp, enc->cipher, enc->key, enc->key_len, |
if ((r = cipher_init(ccp, enc->cipher, enc->key, enc->key_len, |
|
|
struct session_state *state = ssh->state; |
struct session_state *state = ssh->state; |
|
|
if (state->set_maxsize_called) { |
if (state->set_maxsize_called) { |
logit("packet_set_maxsize: called twice: old %d new %d", |
logit_f("called twice: old %d new %d", |
state->max_packet_size, s); |
state->max_packet_size, s); |
return -1; |
return -1; |
} |
} |
if (s < 4 * 1024 || s > 1024 * 1024) { |
if (s < 4 * 1024 || s > 1024 * 1024) { |
logit("packet_set_maxsize: bad size %d", s); |
logit_f("bad size %d", s); |
return -1; |
return -1; |
} |
} |
state->set_maxsize_called = 1; |
state->set_maxsize_called = 1; |
debug("packet_set_maxsize: setting to %d", s); |
debug_f("setting to %d", s); |
state->max_packet_size = s; |
state->max_packet_size = s; |
return s; |
return s; |
} |
} |