1/* 2 * Cryptographic attack detector for ssh - Header file 3 * 4 * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. 5 * 6 * All rights reserved. Redistribution and use in source and binary 7 * forms, with or without modification, are permitted provided that 8 * this copyright notice is retained. 9 * 10 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED 11 * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE 12 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR 13 * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS 14 * SOFTWARE. 15 * 16 * Ariel Futoransky <futo@core-sdi.com> 17 * <http://www.core-sdi.com> 18 */ 19 20#ifndef _DEATTACK_H 21#define _DEATTACK_H 22 23/* Return codes */ 24#define DEATTACK_OK 0 25#define DEATTACK_DETECTED 1 26
| 3/* 4 * Cryptographic attack detector for ssh - Header file 5 * 6 * Copyright (c) 1998 CORE SDI S.A., Buenos Aires, Argentina. 7 * 8 * All rights reserved. Redistribution and use in source and binary 9 * forms, with or without modification, are permitted provided that 10 * this copyright notice is retained. 11 * 12 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED 13 * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE 14 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR 15 * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS 16 * SOFTWARE. 17 * 18 * Ariel Futoransky <futo@core-sdi.com> 19 * <http://www.core-sdi.com> 20 */ 21 22#ifndef _DEATTACK_H 23#define _DEATTACK_H 24 25/* Return codes */ 26#define DEATTACK_OK 0 27#define DEATTACK_DETECTED 1 28
|