Lines Matching defs:packets
135 u_int32_t packets;
375 * Causes any further packets to be encrypted using the given key. The same
577 p_send.packets = p_send.blocks = 0;
582 p_read.packets = p_read.blocks = 0;
632 * - and we never send more than 2^32 SSH packets using the same keys.
633 * The recommendation of 2^31 packets is not enforced here but in
635 * packet_send2_wrapped() that we don't send more than 2^32 packets.
826 /* increment sequence number for outgoing packets */
835 * 2**32 packets before rekeying again."
839 * (AES) is 16 bytes we can't reach 2^32 SSH packets encrypted with the
842 if (++p_send.packets == 0)
844 fatal("too many packets encrypted with same key");
864 * fork() until both SSH2_MSG_NEWKEYS packets were processed. Until this is done
865 * we must queue all packets so that they can be encrypted with the new keys and
904 /* after rekex is done we can process the queue of plain packets */
952 /* Since we are blocking, ensure that all written packets have been sent. */
1206 if (++p_read.packets == 0)
1208 fatal("too many packets with same key");
1723 (p_send.packets > MAX_PACKETS) ||
1724 (p_read.packets > MAX_PACKETS) ||
1759 * For SSHv1 the monitor does not process any SSHv1 packets, only
1760 * ALTPRIVSEP packets. We take advantage of that here to keep changes
1764 * packets as SSHv2 we force compat20 == 1 here.