Commit Graph

1187 Commits

Author SHA1 Message Date
Kevin Steves 12888d1fc8 - (stevesk) sftp.c: handle __progname 2001-03-05 19:50:57 +00:00
Kevin Steves 935aa24bf4 - (stevesk) OpenBSD sync:
- deraadt@cvs.openbsd.org 2001/03/05 08:37:27
     [ssh-keyscan.c]
     skip inlining, why bother
2001-03-05 19:46:37 +00:00
Damien Miller dd97de766c more 2001-03-05 23:33:24 +11:00
Damien Miller 30246a8f2b - (djm) Fix up LOG_AUTHPRIV for systems that have it 2001-03-05 21:23:31 +11:00
Ben Lindstrom 53f11c60b1 Temporary disable AUTHPRIV code until it's fixed. It is broken. =( 2001-03-05 08:18:17 +00:00
Ben Lindstrom 2d9bfb17be - (bal) Fix up logging since it changed. removed log-*.c 2001-03-05 08:16:54 +00:00
Ben Lindstrom 0f68db4e9e - (bal) Put HAVE_PW_CLASS_IN_PASSWD back into pwcopy() 2001-03-05 07:57:09 +00:00
Ben Lindstrom 9727181114 Oops.. Reverted CVS ID. 2001-03-05 07:51:52 +00:00
Ben Lindstrom fd2e05b95e - deraadt@cvs.openbsd.org 2001/03/04 18:21:28
[sshd.8]
     list SSH2 ciphers
2001-03-05 07:48:45 +00:00
Ben Lindstrom 6df8ef4196 - millert@cvs.openbsd.org 2001/03/04 17:42:28
[authfd.c channels.c dh.c log.c readconf.c servconf.c sftp-int.c
      ssh.c sshconnect.c sshd.c]
     log functions should not be passed strings that end in newline as they
     get passed on to syslog() and when logging to stderr, do_log() appends
     its own newline.
2001-03-05 07:47:23 +00:00
Ben Lindstrom fafea18d68 - stevesk@cvs.openbsd.org 2001/03/04 12:54:04
[sshd.8]
     spelling
2001-03-05 07:43:27 +00:00
Ben Lindstrom d9cae22d1a - stevesk@cvs.openbsd.org 2001/03/04 11:16:06
[servconf.c sshd.8]
     kill obsolete RandomSeed; ok markus@ deraadt@
2001-03-05 07:42:03 +00:00
Ben Lindstrom 323c98f4a7 - stevesk@cvs.openbsd.org 2001/03/04 11:04:41
[sshd.8]
     small cleanup and clarify for PermitRootLogin; ok markus@
2001-03-05 07:40:40 +00:00
Ben Lindstrom 3d73a34931 - stevesk@cvs.openbsd.org 2001/03/04 10:57:53
[ssh.c]
     add -m to usage; ok markus@
2001-03-05 07:39:01 +00:00
Ben Lindstrom 9c5324422e - (bal) CVS ID touch up on auth2.c, serverloop.c, session.c & sshd.c 2001-03-05 07:33:14 +00:00
Ben Lindstrom b1131e9329 - markus@cvs.openbsd.org 2001/03/04 00:03:59
[channels.c]
     debug1->2
2001-03-05 07:27:13 +00:00
Ben Lindstrom 8a432f5fe0 - markus@cvs.openbsd.org 2001/03/03 23:59:34
[log.c ssh.c]
     log*.c -> log.c
2001-03-05 07:24:46 +00:00
Ben Lindstrom 46d6e09099 - markus@cvs.openbsd.org 2001/03/03 23:52:22
[sftp.c]
     clean up arg processing. based on work by Christophe_Moret@hp.com
2001-03-05 07:10:47 +00:00
Ben Lindstrom 1addabd491 - deraadt@cvs.openbsd.org 2001/03/03 22:07:50
[sftp-server.c]
     KNF
2001-03-05 07:09:11 +00:00
Ben Lindstrom cb978aa057 - millert@cvs.openbsd.org 2001/03/03 21:41:07
[packet.c]
     Dynamically allocate fd_set; deraadt@ OK
2001-03-05 07:07:49 +00:00
Ben Lindstrom cb80bdf6d5 - millert@cvs.openbsd.org 2001/03/03 21:40:30
[sftp-server.c]
     Dynamically allocate fd_set; deraadt@ OK
2001-03-05 07:06:12 +00:00
Ben Lindstrom c1e0421cb4 - millert@cvs.openbsd.org 2001/03/03 21:19:41
[ssh-keyscan.c]
     Dynamically allocate read_wait and its copies.  Since maxfd is
     based on resource limits it is often (usually?) larger than FD_SETSIZE.
2001-03-05 07:04:38 +00:00
Ben Lindstrom d20b855bc6 - deraadt@cvs.openbsd.org 2001/03/03 06:53:12
[ssh-keyscan.c]
     standard theo sweep
2001-03-05 07:01:18 +00:00
Ben Lindstrom 92a2e38f8e - deraadt@cvs.openbsd.org 2001/03/02 18:54:31
[atomicio.c atomicio.h auth-chall.c auth.c auth2-chall.c crc32.h
      scp.c serverloop.c session.c sftp-server.8 sftp.1 ssh-add.1 ssh-add.c
      ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh.1 sshd.8]
     make copyright lines the same format
2001-03-05 06:59:27 +00:00
Ben Lindstrom d7f5b517d5 - deraadt@cvs.openbsd.org 2001/03/02 09:42:49
[sshd.8]
     doc the dsa/rsa key pair files
2001-03-05 06:57:23 +00:00
Ben Lindstrom 49a098d1b2 - deraadt@cvs.openbsd.org 2001/03/02 06:21:01
[sshd.8]
     explain SIGHUP better
2001-03-05 06:55:18 +00:00
Ben Lindstrom 4040fe10a9 - markus@cvs.openbsd.org 2001/03/01 22:46:37
[ssh.c]
     don't truncate remote ssh-2 commands; from mkubita@securities.cz
     use min, not max for logging, fixes overflow.
2001-03-05 06:52:57 +00:00
Ben Lindstrom b22c2b86af - deraadt@cvs.openbsd.org 2001/03/01 03:38:33
[cli.c cli.h rijndael.h ssh-keyscan.1]
     copyright notices on all source files
2001-03-05 06:50:47 +00:00
Ben Lindstrom 204e48851a - deraadt@cvs.openbsd.org 2001/03/01 02:45:10
[auth-rsa.c auth2.c deattack.c packet.c]
     KNF
2001-03-05 06:47:00 +00:00
Ben Lindstrom 0ab2a01079 - deraadt@cvs.openbsd.org 2001/03/01 02:29:04
[ssh.c]
     shorten usage by a line
2001-03-05 06:45:21 +00:00
Ben Lindstrom cf0da4067b - (bal) CVS ID touch up on uuencode.c 2001-03-05 06:42:58 +00:00
Ben Lindstrom 66e5ecc6b2 - (bal) CVS ID touch up on sftp-int.c 2001-03-05 06:35:29 +00:00
Ben Lindstrom afd3475ddf - deraadt@cvs.openbsd.org 2001/03/01 02:11:25
[authfd.c]
     split line so that p will have an easier time next time around
2001-03-05 06:33:23 +00:00
Ben Lindstrom b40204bf22 - markus@cvs.openbsd.org 2001/02/28 21:31:32
[channels.c]
     typo
2001-03-05 06:29:44 +00:00
Ben Lindstrom e229b25a9e - markus@cvs.openbsd.org 2001/02/28 21:27:48
[channels.c packet.c packet.h serverloop.c]
     use ignore message to simulate a SSH2_MSG_CHANNEL_DATA message
     use random content in ignore messages.
2001-03-05 06:28:06 +00:00
Ben Lindstrom 941ac82e16 - markus@cvs.openbsd.org 2001/02/28 21:21:41
[sshd.c]
     generate a fake session id, too
2001-03-05 06:25:23 +00:00
Ben Lindstrom 4030442d77 - deraadt@cvs.openbsd.org 2001/02/28 17:52:54
[misc.c]
     for completeness, copy pw_gecos too
2001-03-05 06:22:01 +00:00
Ben Lindstrom cc74df79d7 - markus@cvs.openbsd.org 2001/02/28 12:55:07
[channels.c]
     unify debug messages
2001-03-05 06:20:14 +00:00
Ben Lindstrom 5699c5f9ac - markus@cvs.openbsd.org 2001/02/28 09:57:07
[packet.c packet.h sshconnect2.c]
     in ssh protocol v2 use ignore messages for padding (instead of
     trailing \0).
2001-03-05 06:17:49 +00:00
Ben Lindstrom 7fbd455c78 - markus@cvs.openbsd.org 2001/02/28 08:54:55
[channels.c nchan.c nchan.h]
     make sure remote stderr does not get truncated.
     remove closed fd's from the select mask.
2001-03-05 06:16:11 +00:00
Ben Lindstrom e9613cf16d - markus@cvs.openbsd.org 2001/02/28 08:45:39
[clientloop.c]
     fix byte counts for ssh protocol v1
2001-03-05 06:14:02 +00:00
Ben Lindstrom ec19a40b94 - deraadt@cvs.openbsd.org 2001/02/28 05:36:28
[sftp.c]
     do not kill the subprocess on termination (we will see if this helps
     things or hurts things)
2001-03-05 06:12:01 +00:00
Ben Lindstrom 069090128c - deraadt@cvs.openbsd.org 2001/02/28 05:34:28
[misc.c]
     pull in protos
2001-03-05 06:09:31 +00:00
Ben Lindstrom 5de86cc736 - markus@cvs.openbsd.org 2001/02/27 11:00:11
[compat.c]
     support SSH-2.0-2.1 ; from Christophe_Moret@hp.com
2001-03-05 06:08:19 +00:00
Ben Lindstrom 6a5cde0eb7 - markus@cvs.openbsd.org 2001/02/27 10:35:27
[packet.c]
     fix random padding
2001-03-05 06:07:00 +00:00
Ben Lindstrom 4b00c8b40b - deraadt@cvs.openbsd.org 2001/02/24 10:37:26
[sshd_config]
     ssh2 rsa key before dsa key
2001-03-05 06:05:35 +00:00
Ben Lindstrom b00d4fb142 - deraadt@cvs.openbsd.org 2001/02/24 10:37:55
[readconf.c]
     look for id_rsa by default, before id_dsa
2001-03-05 06:03:03 +00:00
Ben Lindstrom eb648a749b - markus@cvs.openbsd.org 2001/02/23 18:15:13
[sshd.c]
     the random session key depends now on the session_key_int
     sent by the 'attacker'
             dig1 = md5(cookie|session_key_int);
             dig2 = md5(dig1|cookie|session_key_int);
             fake_session_key = dig1|dig2;
     this change is caused by a mail from anakin@pobox.com
     patch based on discussions with my german advisor niels@openbsd.org
2001-03-05 06:00:29 +00:00
Ben Lindstrom f4c73112d0 - markus@cvs.openbsd.org 2001/02/23 15:34:53
[serverloop.c]
     debug2->3
2001-03-05 05:58:23 +00:00
Ben Lindstrom 086cf214cf - markus@cvs.openbsd.org 2001/02/22 21:59:44
[auth.c auth.h auth1.c auth2.c misc.c misc.h ssh.c]
     use pwcopy in ssh.c, too
2001-03-05 05:56:40 +00:00