summaryrefslogtreecommitdiffstats
path: root/servconf.h (unfollow)
Commit message (Collapse)AuthorFilesLines
2013-02-22 - (dtucker) [configure.ac] bz#2073: look for Solaris' differently-namedDarren Tucker2-4/+10
libgss too. Patch from Pierre Ossman, ok djm.
2013-02-22 - (dtucker) [Makefile.in configure.ac] bz#2072: don't link krb5 libs toDarren Tucker3-17/+23
ssh(1) since they're not needed. Patch from Pierre Ossman.
2013-02-21 - (tim) [regress/forward-control.sh] shell portability fix.Tim Rice2-1/+4
2013-02-20 - djm@cvs.openbsd.org 2013/02/20 08:29:27Damien Miller2-1/+4
[regress/modpipe.c] s/Id/OpenBSD/ in RCS tag
2013-02-20 - djm@cvs.openbsd.org 2013/02/20 08:27:50Damien Miller2-7/+25
[regress/integrity.sh regress/modpipe.c] Add an option to modpipe that warns if the modification offset it not reached in it's stream and turn it on for t-integrity. This should catch cases where the session is not fuzzed for being too short (cf. my last "oops" commit)
2013-02-20 - (tim) [krl.c Makefile.in regress/Makefile regress/modpipe.c] remove unneededTim Rice5-12/+14
err.h include from krl.c. Additional portability fixes for modpipe. OK djm
2013-02-19 - (tim) [regress/cipher-speed.sh regress/try-ciphers.sh] shell portability fix.Tim Rice3-2/+5
2013-02-19 - (djm) [regress/integrity.sh] Skip SHA2-based MACs on configurations thatDamien Miller2-3/+7
lack support for SHA2.
2013-02-19 - djm@cvs.openbsd.org 2013/02/19 02:14:09Damien Miller4-4/+38
[integrity.sh] oops, forgot to increase the output of the ssh command to ensure that we actually reach $offset
2013-02-18 - djm@cvs.openbsd.org 2013/02/18 22:26:47Damien Miller2-3/+10
[integrity.sh] crank the offset yet again; it was still fuzzing KEX one of Darren's portable test hosts at 2800
2013-02-18 - djm@cvs.openbsd.org 2013/02/17 23:16:55Damien Miller2-2/+9
[integrity.sh] make the ssh command generates some output to ensure that there are at least offset+tries bytes in the stream.
2013-02-16 - djm@cvs.openbsd.org 2013/02/16 06:08:45Damien Miller2-3/+12
[integrity.sh] make sure the fuzz offset is actually past the end of KEX for all KEX types. diffie-hellman-group-exchange-sha256 requires an offset around 2700. Noticed via test failures in portable OpenSSH on platforms that lack ECC and this the more byte-frugal ECDH KEX algorithms.
2013-02-15 - (dtucker) [openbsd-compat/bsd-misc.c] Handle the case where setpgrp() takesDarren Tucker2-1/+6
an argument. Pointed out by djm.
2013-02-15 - (dtucker) [openbsd-compat/openbsd-compat.h] Add prototype for strtoul,Darren Tucker2-5/+11
group strto* function prototypes together.
2013-02-15 - dtucker@cvs.openbsd.org 2013/02/15 00:21:01Damien Miller2-7/+16
[sshconnect2.c] Warn more loudly if an IdentityFile provided by the user cannot be read. bz #1981, ok djm@
2013-02-15 - (dtucker) [configure.ac openbsd-compat/Makefile.in openbsd-compat/strtoull.cDarren Tucker5-5/+123
openbsd-compat/openbsd-compat.h] Add strtoull to compat library for platforms that don't have it.
2013-02-15spacingDarren Tucker1-1/+2
2013-02-15 - (dtucker) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]Darren Tucker4-3/+24
Use getpgrp() if we don't have getpgid() (old BSDs, maybe others).
2013-02-15 - djm@cvs.openbsd.org 2013/02/14 21:35:59Damien Miller2-3/+8
[auth2-pubkey.c] Correct error message that had a typo and was logging the wrong thing; patch from Petr Lautrbach
2013-02-15 - (djm) [contrib/suse/rc.sshd] Use SSHD_BIN consistently; bz#2056 fromDamien Miller2-4/+8
Iain Morgan
2013-02-14- (djm) [regress/integrity.sh] Start fuzzing from offset 2500 (insteadDamien Miller2-2/+5
of 2300) to avoid clobbering the end of (non-MAC'd) KEX. Verified by Iain Morgan
2013-02-14 - (djm) [regress/krl.sh] typo; found by Iain MorganDamien Miller2-1/+2
2013-02-14 - (djm) [regress/krl.sh] Don't use ecdsa keys in environment that lack ECC.Damien Miller2-2/+11
2013-02-12 - (djm) [regress/try-ciphers.sh] clean up CVS merge botchDamien Miller2-7/+1
2013-02-12 - djm@cvs.openbsd.org 2013/02/11 23:58:51Damien Miller2-11/+4
[try-ciphers.sh] remove acss here too
2013-02-12 - dtucker@cvs.openbsd.org 2013/02/11 21:21:58Damien Miller2-2/+6
[sshd.c] Add openssl version to debug output similar to the client. ok markus@
2013-02-12 - djm@cvs.openbsd.org 2013/02/10 23:35:24Damien Miller2-3/+8
[packet.c] record "Received disconnect" messages at ERROR rather than INFO priority, since they are abnormal and result in a non-zero ssh exit status; patch from Iain Morgan in bz#2057; ok dtucker@
2013-02-12 - djm@cvs.openbsd.org 2013/02/10 23:32:10Damien Miller2-2/+7
[ssh-keygen.c] append to moduli file when screening candidates rather than overwriting. allows resumption of interrupted screen; patch from Christophe Garault in bz#1957; ok dtucker@
2013-02-12 - markus@cvs.openbsd.org 2013/02/10 21:19:34Damien Miller2-2/+5
[version.h] openssh 6.2
2013-02-12 - djm@cvs.openbsd.org 2013/02/08 00:41:12Damien Miller2-2/+7
[sftp.c] fix NULL deref when built without libedit and control characters entered as command; debugging and patch from Iain Morgan an Loganaden Velvindron in bz#1956
2013-02-12 - dtucker@cvs.openbsd.org 2013/02/06 00:22:21Damien Miller2-2/+5
[auth.c] Fix comment, from jfree.e1 at gmail
2013-02-12 - dtucker@cvs.openbsd.org 2013/02/06 00:20:42Damien Miller4-9/+15
[servconf.c sshd_config sshd_config.5] Change default of MaxStartups to 10:30:100 to start doing random early drop at 10 connections up to 100 connections. This will make it harder to DoS as CPUs have come a long way since the original value was set back in 2000. Prompted by nion at debian org, ok markus@
2013-02-12 - djm@cvs.openbsd.org 2013/01/27 10:06:12Damien Miller2-2/+5
[krl.c] actually use the xrealloc() return value; spotted by xi.wang AT gmail.com
2013-02-12 - djm@cvs.openbsd.org 2013/01/26 06:11:05Damien Miller7-421/+11
[Makefile.in acss.c acss.h cipher-acss.c cipher.c] [openbsd-compat/openssl-compat.h] remove ACSS, now that it is gone from libcrypto too
2013-02-12 - djm@cvs.openbsd.org 2013/01/25 10:22:19Damien Miller2-3/+11
[krl.c] redo last commit without the vi-vomit that snuck in: skip serial lookup when cert's serial number is zero (now with 100% better comment)
2013-02-12 - krw@cvs.openbsd.org 2013/01/25 05:00:27Damien Miller2-2/+6
[krl.c] Revert last. Breaks due to likely typo. Let djm@ fix later. ok djm@ via dlg@
2013-02-12 - djm@cvs.openbsd.org 2013/01/24 22:08:56Damien Miller2-2/+5
[krl.c] skip serial lookup when cert's serial number is zero
2013-02-12 - (djm) OpenBSD CVS SyncDamien Miller2-2/+8
- djm@cvs.openbsd.org 2013/01/24 21:45:37 [krl.c] fix handling of (unused) KRL signatures; skip string in correct buffer
2013-02-11 - (djm) [configure.ac openbsd-compat/openssl-compat.h] Repair build on oldDamien Miller3-4/+26
libcrypto that lacks EVP_CIPHER_CTX_ctrl
2013-02-08 - (dtucker) [configure.ac openbsd-compat/sys-tree.h] Test if compiler allowsDarren Tucker3-2/+21
__attribute__ on return values and work around if necessary. ok djm@
2013-02-08 - (djm) [contrib/redhat/sshd.init] treat RETVAL as an integer;Damien Miller2-5/+9
patch from Iain Morgan in bz#2059
2013-02-07 - (djm) [configure.ac] Don't probe seccomp capability of running kernelDamien Miller2-5/+9
at configure time; the seccomp sandbox will fall back to rlimit at runtime anyway. Patch from plautrba AT redhat.com in bz#2011
2013-01-20 - (djm) [regress/krl.sh] replacement for jot; most platforms lack itDamien Miller2-0/+5
2013-01-20 - (djm) [openbsd-compat/sys-tree.h] Sync with OpenBSD. krl.c needs newerDamien Miller3-21/+94
version.
2013-01-20 - markus@cvs.openbsd.org 2013/01/19 12:34:55Damien Miller2-2/+5
[krl.c] RB_INSERT does not remove existing elments; ok djm@
2013-01-20 - jmc@cvs.openbsd.org 2013/01/19 07:13:25Damien Miller2-3/+6
[ssh-keygen.1] fix some formatting; ok djm
2013-01-20 - jmc@cvs.openbsd.org 2013/01/18 21:48:43Damien Miller2-8/+11
[ssh-keygen.1] command-line (adj.) -> command line (n.);
2013-01-20 - jmc@cvs.openbsd.org 2013/01/18 08:39:04Damien Miller2-1/+6
[ssh-keygen.1] add -Q to the options list; ok djm
2013-01-20 - jmc@cvs.openbsd.org 2013/01/18 08:00:49Damien Miller2-3/+6
[sshd_config.5] tweak previous;
2013-01-20 - jmc@cvs.openbsd.org 2013/01/18 07:59:46Damien Miller2-2/+5
[ssh-keygen.c] -u before -V in usage();