with the wrong encryption key ("bad packet length" symptom) while
key exchange was happening.
--HG--
extra : convert_revision : f7d27ec094c4aba2a4289c523c722fcb3c3f58ca
- Better handling of the case where compressing makes the data
larger (possibly only happens when memLevel is adjusted, but better
to be safe)
--HG--
extra : convert_revision : b31879a384d3bf8cbcbe2ed731d7d79d49799b1d
- Share make_mac function for both packet creation and validation
- Split recv/trans parts of key_context into their own structures
--HG--
extra : convert_revision : 043bc598c76ed43625987e6937e32238f7ed6240
Are still advertising 'zlib' for the server, need to allow
delayed-only as an option
--HG--
extra : convert_revision : 319df675cc3c9b35a10b7d8357c94f33fdab1a46
- Try to reduce the frequency of select() timeouts
- Add a max receive window size of 1MB
--HG--
extra : convert_revision : 9aa22036cb511cddb35fbc0e09ad05acb39b64d1
them until afterwards. This could sometimes terminate connections
after 8 hours if (for example) a new TCP forwarded connection
was sent at the KEX timeout.
--HG--
extra : convert_revision : 48426bd66b8f5ba50045f7ba190d1672745132e2
options.h. Increasing RECV_MAX_WINDOW gives big network performance
increases - even with the present buffers (which haven't changed) it
performs a lot better.
Next step is to make the window size a cmdline option.
--HG--
extra : convert_revision : 24c7cb47fb56cf5b82e3bc0859b45ea83038eab0
- Added support for aes256, twofish256 and sha1-96
- Fixed some debugging statements
--HG--
extra : convert_revision : 598835dadaddb1e95d4ac99f8a1be4ba51639000
- buf_burn the unencrypted read/write payload buffers after use to avoid
sensitive contents sitting in memory for too long
--HG--
extra : convert_revision : 19227d63bda554e819ae7df919bfd18911d5b4a0