| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
| |
[auth2.c auth2-chall.c compat.c sshconnect2.c sshd.c]
use buffer API and avoid static strings of fixed size; ok provos@/mouring@
|
|
|
|
|
| |
[ssh-agent.c]
change to use queue.h macros; okay markus@
|
|
|
|
|
| |
[auth-skey.c]
undo local change
|
|
|
|
|
| |
[auth-skey.c]
use snprintf; mouring@
|
|
|
|
|
| |
[auth2-chall.c]
use snprintf; mouring@
|
|
|
|
|
| |
[readpass.c]
use _PATH_TTY
|
|
|
|
|
| |
[auth2-chall.c auth-skey.c]
use strlcpy not strlcat; mouring@
|
|
|
|
|
|
|
|
|
| |
[auth2.c dispatch.c dispatch.h kex.c]
a single dispatch_protocol_error() that sends a message of type 'UNIMPLEMENTED'
dispatch_range(): set handler for a ranges message types
use dispatch_protocol_ignore() for authentication requests after
successful authentication (the drafts requirement).
serverloop/clientloop now send a 'UNIMPLEMENTED' message instead of exiting.
|
|
|
|
|
| |
[ssh2.h]
add defines for msg type ranges
|
|
|
|
|
| |
[packet.c]
handle received SSH2_MSG_UNIMPLEMENTED messages; ok djm@
|
|
|
|
|
| |
[nchan.c]
more unused code (with channels.c:1.156)
|
|
|
|
|
| |
[nchan.c]
remove dead code (skip drain)
|
|
|
|
|
| |
[clientloop.c]
handle SSH2_MSG_GLOBAL_REQUEST (just reply with failure); ok djm@
|
|
|
|
|
| |
[serverloop.c]
skip client_alive_check until there are channels; ok beck@
|
|
|
|
|
| |
[channels.c nchan.c]
replace buffer_consume(b, buffer_len(b)) with buffer_clear(b); ok provos@
|
|
|
|
|
| |
[channels.c]
merge channel_pre_open_15/channel_pre_open_20; ok provos@
|
|
|
|
|
| |
[ssh-keygen.c]
append \n only for public keys
|
|
|
|
|
| |
[ssh.1 sshd.8]
some missing and misplaced periods
|
|
|
|
|
|
| |
[channels.c]
fix hanging x11 channels for rejected cookies (e.g. XAUTHORITY=/dev/null xbiff)
bug #36, based on patch from djast@cs.toronto.edu
|
|
|
|
|
|
| |
[servconf.c sshd.8]
protocol 2 HostKey code default is now /etc/ssh_host_rsa_key and
/etc/ssh_host_dsa_key like we have in sshd_config. ok markus@
|
|
|
|
|
| |
[readconf.c servconf.c]
remove #ifdef _PATH_XAUTH/#endif; ok markus@
|
|
|
|
|
| |
[ssh_config]
grammar in comment
|
|
|
|
|
| |
[authfile.c channels.c compress.c packet.c sftp-server.c ssh-agent.c ssh-keygen.c]
remove unneeded casts and some char->u_char cleanup; ok markus@
|
|
|
|
|
| |
[ssh.1 sshd.8]
document LogLevel DEBUG[123]; ok markus@
|
|
|
|
|
| |
[auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c dispatch.h kex.c kex.h serverloop.c ssh.c sshconnect2.c]
remove plen from the dispatch fn. it's no longer used.
|
|
|
|
|
| |
[auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c]
packet_read* no longer return the packet length, since it's not used.
|
|
|
|
|
| |
[bufaux.c bufaux.h packet.c]
buffer_get_bignum: int -> void
|
|
|
|
|
| |
[auth1.c kexdh.c kexgex.c packet.c packet.h sshconnect1.c sshd.c]
packet_get_bignum* no longer returns a size
|
|
|
|
|
|
|
|
|
| |
- markus@cvs.openbsd.org 2001/12/28 12:14:27
[auth1.c auth2.c auth2-chall.c auth-rsa.c channels.c clientloop.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c]
s/packet_done/packet_check_eom/ (end-of-message); ok djm@
with 47 more patchsets to go, I am not going to back out all the files for
the sake of a commit message...
|
|
|
|
|
| |
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
get rid of packet_integrity_check, use packet_done() instead.
|
|
|
|
|
| |
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
get rid of packet_integrity_check, use packet_done() instead.
|
|
|
|
|
| |
[auth1.c auth.h auth-rh-rsa.c]
auth_rhosts_rsa now accept generic keys.
|
|
|
|
|
| |
[dh.c kexdh.c kexgex.c]
always use BN_clear_free instead of BN_free
|
|
|
|
|
| |
[authfile.c]
missing include
|
|
|
|
|
| |
[sshd.8]
clarify -p; ok markus@
|
|
|
|
|
| |
[auth1.c authfile.c auth-rsa.c dh.c kexdh.c kexgex.c key.c rsa.c scard.c ssh-agent.c sshconnect1.c sshd.c ssh-dss.c]
call fatal() for openssl allocation failures
|
|
|
|
|
| |
[ssh-keygen.c]
-t is only needed for key generation (unbreaks -i, -e, etc).
|
|
|
|
|
| |
[auth1.c]
be more carefull on allocation
|
|
|
|
|
| |
[key.c]
be more careful on allocation
|
|
|
|
|
|
|
| |
[ssh-add.c]
try all listed keys.. how did this get broken?
(oops - that was me)
|
|
|
|
|
| |
[serverloop.c]
remove ifdef for USE_PIPES since fdin != fdout; ok djm@
|
|
|
|
|
|
| |
[ssh-add.1 ssh-add.c]
Try all standard key files (id_rsa, id_dsa, identity) when invoked with
no arguments; ok markus@
|
|
|
|
|
| |
[readpass.c]
Avoid interruptable passphrase read; ok markus@
|
|
|
|
|
| |
[ssh-keygen.1 ssh-keygen.c]
Remove default (rsa1) key type; ok markus@
|
| |
|
|
|
|
|
| |
- Add OpenSSL sanity check: verify that header version matches version
reported by library
|
| |
|
|
|
|
|
|
|
|
|
| |
- We don't support --without-zlib currently, so don't allow it.
- Rework cryptographic random number support detection. We now detect
whether OpenSSL seeds itself. If it does, then we don't bother with
the ssh-rand-helper program. You can force the use of ssh-rand-helper
using the --with-rand-helper configure argument
- Simplify and clean up ssh-rand-helper configuration
|
|
|
|
|
|
|
|
| |
- Reduce quantity of ifdef code, in preparation for ssh_rand_conf
- Always seed from system calls, even when doing PRNGd seeding
- Tidy and comment #define knobs
- Remove unused facility for multiple runs through command list
- KNF, cleanup, update copyright
|
| |
|