=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/packet.c,v retrieving revision 1.116.2.2 retrieving revision 1.117 diff -u -r1.116.2.2 -r1.117 --- src/usr.bin/ssh/packet.c 2006/02/03 02:53:44 1.116.2.2 +++ src/usr.bin/ssh/packet.c 2005/06/17 02:44:32 1.117 @@ -37,7 +37,7 @@ */ #include "includes.h" -RCSID("$OpenBSD: packet.c,v 1.116.2.2 2006/02/03 02:53:44 brad Exp $"); +RCSID("$OpenBSD: packet.c,v 1.117 2005/06/17 02:44:32 djm Exp $"); #include @@ -116,12 +116,6 @@ /* Set to true if the connection is interactive. */ static int interactive_mode = 0; -/* Set to true if we are the server side. */ -static int server_side = 0; - -/* Set to true if we are authenticated. */ -static int after_authentication = 0; - /* Session key information for Encryption and MAC */ Newkeys *newkeys[MODE_MAX]; static struct packet_state { @@ -567,7 +561,7 @@ buffer_clear(&outgoing_packet); /* - * Note that the packet is now only buffered in output. It won't be + * Note that the packet is now only buffered in output. It won\'t be * actually sent until packet_write_wait or packet_write_poll is * called. */ @@ -625,9 +619,7 @@ /* Deleting the keys does not gain extra security */ /* memset(enc->iv, 0, enc->block_size); memset(enc->key, 0, enc->key_len); */ - if ((comp->type == COMP_ZLIB || - (comp->type == COMP_DELAYED && after_authentication)) && - comp->enabled == 0) { + if (comp->type != 0 && comp->enabled == 0) { packet_init_compression(); if (mode == MODE_OUT) buffer_compress_init_send(6); @@ -648,35 +640,6 @@ } /* - * Delayed compression for SSH2 is enabled after authentication: - * This happans on the server side after a SSH2_MSG_USERAUTH_SUCCESS is sent, - * and on the client side after a SSH2_MSG_USERAUTH_SUCCESS is received. - */ -static void -packet_enable_delayed_compress(void) -{ - Comp *comp = NULL; - int mode; - - /* - * Remember that we are past the authentication step, so rekeying - * with COMP_DELAYED will turn on compression immediately. - */ - after_authentication = 1; - for (mode = 0; mode < MODE_MAX; mode++) { - comp = &newkeys[mode]->comp; - if (comp && !comp->enabled && comp->type == COMP_DELAYED) { - packet_init_compression(); - if (mode == MODE_OUT) - buffer_compress_init_send(6); - else - buffer_compress_init_recv(); - comp->enabled = 1; - } - } -} - -/* * Finalize packet in SSH2 format (compress, mac, encrypt, enqueue) */ static void @@ -789,8 +752,6 @@ if (type == SSH2_MSG_NEWKEYS) set_newkeys(MODE_OUT); - else if (type == SSH2_MSG_USERAUTH_SUCCESS && server_side) - packet_enable_delayed_compress(); } static void @@ -1133,8 +1094,6 @@ packet_disconnect("Invalid ssh2 packet type: %d", type); if (type == SSH2_MSG_NEWKEYS) set_newkeys(MODE_IN); - else if (type == SSH2_MSG_USERAUTH_SUCCESS && !server_side) - packet_enable_delayed_compress(); #ifdef PACKET_DEBUG fprintf(stderr, "read/plain[%d]:\r\n", type); buffer_dump(&incoming_packet); @@ -1556,16 +1515,4 @@ packet_set_rekey_limit(u_int32_t bytes) { rekey_limit = bytes; -} - -void -packet_set_server(void) -{ - server_side = 1; -} - -void -packet_set_authenticated(void) -{ - after_authentication = 1; }