Darren Tucker
b2694f0e8a
- markus@cvs.openbsd.org 2004/10/20 11:48:53
...
[packet.c ssh1.h]
disconnect for invalid (out of range) message types.
2004-11-05 20:27:54 +11:00
Darren Tucker
3f9fdc7121
- avsm@cvs.openbsd.org 2004/06/21 17:36:31
...
[auth-rsa.c auth2-gss.c auth2-pubkey.c authfile.c canohost.c channels.c
cipher.c dns.c kex.c monitor.c monitor_fdpass.c monitor_wrap.c
monitor_wrap.h nchan.c packet.c progressmeter.c scp.c sftp-server.c sftp.c
ssh-gss.h ssh-keygen.c ssh.c sshconnect.c sshconnect1.c sshlogin.c
sshpty.c]
make ssh -Wshadow clean, no functional changes
markus@ ok
There are also some portable-specific -Wshadow warnings to be fixed in
monitor.c and montior_wrap.c.
2004-06-22 12:56:01 +10:00
Damien Miller
232711f6db
- djm@cvs.openbsd.org 2004/06/14 01:44:39
...
[channels.c clientloop.c misc.c misc.h packet.c ssh-agent.c ssh-keyscan.c]
[sshd.c]
set_nonblock() instead of fnctl(...,O_NONBLOCK); "looks sane" deraadt@
2004-06-15 10:35:30 +10:00
Darren Tucker
1f8311c836
- deraadt@cvs.openbsd.org 2004/05/11 19:01:43
...
[auth.c auth2-none.c authfile.c channels.c monitor.c monitor_mm.c
packet.c packet.h progressmeter.c session.c openbsd-compat/xmmap.c]
improve some code lint did not like; djm millert ok
2004-05-13 16:39:33 +10:00
Damien Miller
5924ceb22d
- (djm) [packet.c] Shuffle #ifdef to reduce conditionally compiled code
2003-11-22 15:02:42 +11:00
Damien Miller
a8e06cef35
- djm@cvs.openbsd.org 2003/11/21 11:57:03
...
[everything]
unexpand and delete whitespace at EOL; ok markus@
(done locally and RCS IDs synced)
2003-11-21 23:48:55 +11:00
Darren Tucker
3e33cecf71
- markus@cvs.openbsd.org 2003/09/23 20:17:11
...
[Makefile.in auth1.c auth2.c auth.c auth.h auth-krb5.c canohost.c
cleanup.c clientloop.c fatal.c gss-serv.c log.c log.h monitor.c monitor.h
monitor_wrap.c monitor_wrap.h packet.c serverloop.c session.c session.h
ssh-agent.c sshd.c]
replace fatal_cleanup() and linked list of fatal callbacks with static
cleanup_exit() function. re-refine cleanup_exit() where appropriate,
allocate sshd's authctxt eary to allow simpler cleanup in sshd.
tested by many, ok deraadt@
2003-10-02 16:12:36 +10:00
Darren Tucker
aaa56cb804
- markus@cvs.openbsd.org 2003/09/19 11:33:09
...
[packet.c sshd.c]
do not call packet_close on fatal; ok deraadt
2003-09-22 21:13:59 +10:00
Darren Tucker
a8151da5fe
- markus@cvs.openbsd.org 2003/09/19 09:02:02
...
[packet.c]
buffer_dump only if PACKET_DEBUG is defined; Jedi/Sector One; pr 3471
2003-09-22 21:06:46 +10:00
Darren Tucker
81a0b371f4
- markus@cvs.openbsd.org 2003/07/10 14:42:28
...
[packet.c]
the 2^(blocksize*2) rekeying limit is too expensive for 3DES,
blowfish, etc, so enforce a 1GB limit for small blocksizes.
2003-07-14 17:31:06 +10:00
Darren Tucker
502d384b74
- markus@cvs.openbsd.org 2003/06/24 08:23:46
...
[auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h
monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c]
int -> u_int; ok djm@, deraadt@, mouring@
2003-06-28 12:38:01 +10:00
Damien Miller
2b92d32e19
- deraadt@cvs.openbsd.org 2003/06/10 22:20:52
...
[packet.c progressmeter.c]
mostly ansi cleanup; pval ok
2003-06-11 22:05:06 +10:00
Damien Miller
d558092522
- (djm) RCSID sync w/ OpenBSD
2003-05-14 13:40:06 +10:00
Ben Lindstrom
93b6b776ad
- (bal) Bug #541 : return; was dropped by mistake. Reported by
...
furrier@iglou.com
2003-04-27 17:55:33 +00:00
Damien Miller
a0898b8505
- itojun@cvs.openbsd.org 2003/04/08 20:21:29
...
[*.c *.h]
rename log() into logit() to avoid name conflict. markus ok, from
netbsd
- (djm) XXX - Performed locally using:
"perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
- (djm) Fix up missing include for packet.c
2003-04-09 21:05:52 +10:00
Damien Miller
996acd2476
*** empty log message ***
2003-04-09 20:59:48 +10:00
Damien Miller
a5539d2698
- (djm) OpenBSD CVS Sync
...
- markus@cvs.openbsd.org 2003/04/02 09:48:07
[clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
[readconf.h serverloop.c sshconnect2.c]
reapply rekeying chage, tested by henning@, ok djm@
2003-04-09 20:50:06 +10:00
Ben Lindstrom
c8a49d743a
- (bal) if IP_TOS is not found or broken don't try to compile in
...
packet_set_tos() function call. bug #527
2003-04-02 15:18:22 +00:00
Damien Miller
2dc074ef4b
- markus@cvs.openbsd.org 2003/04/01 10:10:23
...
[clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
[readconf.h serverloop.c sshconnect2.c]
rekeying bugfixes and automatic rekeying:
* both client and server rekey _automatically_
(a) after 2^31 packets, because after 2^32 packets
the sequence number for packets wraps
(b) after 2^(blocksize_in_bits/4) blocks
(see: draft-ietf-secsh-newmodes-00.txt)
(a) and (b) are _enabled_ by default, and only disabled for known
openssh versions, that don't support rekeying properly.
* client option 'RekeyLimit'
* do not reply to requests during rekeying
- markus@cvs.openbsd.org 2003/04/01 10:22:21
[clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
[readconf.h serverloop.c sshconnect2.c]
backout rekeying changes (for 3.6.1)
2003-04-01 21:43:39 +10:00
Ben Lindstrom
faa1ea8c20
- markus@cvs.openbsd.org 2002/12/10 19:47:14
...
[packet.c]
static
2002-12-23 02:42:52 +00:00
Ben Lindstrom
a743398d04
- markus@cvs.openbsd.org 2002/12/10 19:26:50
...
[packet.c]
move tos handling to packet_set_tos; ok provos/henning/deraadt
2002-12-23 02:41:41 +00:00
Ben Lindstrom
064496feaa
- markus@cvs.openbsd.org 2002/11/21 22:45:31
...
[cipher.c kex.c packet.c sshconnect.c sshconnect2.c]
debug->debug2, unify debug messages
2002-12-23 02:04:22 +00:00
Ben Lindstrom
9bda7ae4c6
- markus@cvs.openbsd.org 2002/11/04 10:09:51
...
[packet.c]
log before send disconnect; ok djm@
2002-11-09 15:46:24 +00:00
Ben Lindstrom
0cc2a47674
- markus@cvs.openbsd.org 2002/10/23 10:32:13
...
[packet.c]
use %u for u_int
2002-11-09 15:41:39 +00:00
Ben Lindstrom
8b2eecdf9f
- deraadt@cvs.openbsd.org 2002/07/04 08:12:15
...
[channels.c packet.c]
blah blah minor nothing as i read and re-read and re-read...
2002-07-07 22:11:51 +00:00
Ben Lindstrom
3f58474214
- deraadt@cvs.openbsd.org 2002/06/23 21:10:02
...
[packet.c]
packet_get_int() returns unsigned for reason & seqnr
2002-06-23 21:49:25 +00:00
Ben Lindstrom
402c6cc681
- markus@cvs.openbsd.org 2002/06/19 18:01:00
...
[cipher.c monitor.c monitor_wrap.c packet.c packet.h]
make the monitor sync the transfer ssh1 session key;
transfer keycontext only for RC4 (this is still depends on EVP
implementation details and is broken).
2002-06-21 00:43:42 +00:00
Ben Lindstrom
3dca4f55f2
- markus@cvs.openbsd.org 2002/06/04 23:02:06
...
[packet.c]
remove __FUNCTION__
2002-06-06 20:59:25 +00:00
Damien Miller
aa100c546c
- (djm) Bug #180 : Set ToS bits on IPv4-in-IPv6 mapped addresses. Based on
...
patch from openssh@misc.tecq.org
2002-04-26 16:54:34 +10:00
Ben Lindstrom
8b08d8115d
- markus@cvs.openbsd.org 2002/03/24 16:01:13
...
[packet.c]
debug->debug3 for extra padding
2002-03-26 02:09:41 +00:00
Ben Lindstrom
6328ab3989
- markus@cvs.openbsd.org 2002/03/19 10:49:35
...
[auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h packet.c session.c
sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c sshconnect2.c sshd.c
ttymodes.c]
KNF whitespace
2002-03-22 02:54:23 +00:00
Ben Lindstrom
f6027d3407
- markus@cvs.openbsd.org 2002/03/18 17:16:38
...
[packet.c packet.h]
export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep
2002-03-22 01:42:04 +00:00
Damien Miller
3a5b023330
Stupid djm commits experimental code to head instead of branch
...
revert
2002-03-13 13:19:42 +11:00
Damien Miller
646e7cf3d7
Import of Niels Provos' 20020312 ssh-complete.diff
...
PAM, Cygwin and OSF SIA will not work for sure
2002-03-13 12:47:54 +11:00
Ben Lindstrom
733a2351f5
- stevesk@cvs.openbsd.org 2002/02/27 21:23:13
...
[canohost.c channels.c packet.c sshd.c]
remove unneeded casts in [gs]etsockopt(); ok markus@
2002-03-05 01:31:28 +00:00
Ben Lindstrom
4a7714a43a
- markus@cvs.openbsd.org 2002/02/24 16:58:32
...
[packet.c]
make 'cp' unsigned and merge with 'ucp'; ok stevesk@
2002-02-26 18:04:38 +00:00
Damien Miller
963f6b25e2
- markus@cvs.openbsd.org 2002/02/14 23:41:01
...
[authfile.c cipher.c cipher.h kex.c kex.h packet.c]
hide some more implementation details of cipher.[ch] and prepares for move
to EVP, ok deraadt@
2002-02-19 15:21:23 +11:00
Damien Miller
4d007769bf
- stevesk@cvs.openbsd.org 2002/01/24 21:13:23
...
[packet.c]
need misc.h for set_nodelay()
2002-02-05 11:52:54 +11:00
Damien Miller
398e1cfa23
- (djm) OpenBSD CVS Sync
...
- stevesk@cvs.openbsd.org 2002/01/24 21:09:25
[channels.c misc.c misc.h packet.c]
add set_nodelay() to set TCP_NODELAY on a socket (prep for nagle tuning).
no nagle changes just yet; ok djm@ markus@
2002-02-05 11:52:13 +11:00
Damien Miller
4a8ed54361
- stevesk@cvs.openbsd.org 2002/01/18 18:14:17
...
[authfd.c bufaux.c buffer.c cipher.c packet.c ssh-agent.c ssh-keygen.c]
unneeded cast cleanup; ok markus@
2002-01-22 23:33:31 +11:00
Damien Miller
659811f7fc
- markus@cvs.openbsd.org 2002/01/11 10:31:05
...
[packet.c]
handle received SSH2_MSG_UNIMPLEMENTED messages; ok djm@
2002-01-22 23:23:11 +11:00
Damien Miller
708d21c802
- stevesk@cvs.openbsd.org 2001/12/29 21:56:01
...
[authfile.c channels.c compress.c packet.c sftp-server.c ssh-agent.c ssh-keygen.c]
remove unneeded casts and some char->u_char cleanup; ok markus@
2002-01-22 23:18:15 +11:00
Damien Miller
dff5099f13
- markus@cvs.openbsd.org 2001/12/28 14:50:54
...
[auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c]
packet_read* no longer return the packet length, since it's not used.
2002-01-22 23:16:32 +11:00
Damien Miller
76e1e368b5
- markus@cvs.openbsd.org 2001/12/28 14:13:13
...
[bufaux.c bufaux.h packet.c]
buffer_get_bignum: int -> void
2002-01-22 23:15:57 +11:00
Damien Miller
d432ccf740
- markus@cvs.openbsd.org 2001/12/28 13:57:33
...
[auth1.c kexdh.c kexgex.c packet.c packet.h sshconnect1.c sshd.c]
packet_get_bignum* no longer returns a size
2002-01-22 23:14:44 +11:00
Damien Miller
48b03fc546
- markus@cvs.openbsd.org 2001/12/27 20:39:58
...
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
get rid of packet_integrity_check, use packet_done() instead.
2002-01-22 23:11:40 +11:00
Damien Miller
66823cddbe
- markus@cvs.openbsd.org 2001/12/27 20:39:58
...
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
get rid of packet_integrity_check, use packet_done() instead.
2002-01-22 23:11:38 +11:00
Damien Miller
278f907a2d
- djm@cvs.openbsd.org 2001/12/20 22:50:24
...
[auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c]
[dispatch.h kex.c kex.h packet.c packet.h serverloop.c ssh.c]
[sshconnect2.c]
Conformance fix: we should send failing packet sequence number when
responding with a SSH_MSG_UNIMPLEMENTED message. Spotted by
yakk@yakk.dot.net ; ok markus@
2001-12-21 15:00:19 +11:00
Damien Miller
5a6b4fe225
- stevesk@cvs.openbsd.org 2001/12/19 17:16:13
...
[authfile.c bufaux.c bufaux.h buffer.c buffer.h packet.c packet.h ssh.c]
change the buffer/packet interface to use void* vs. char*; ok markus@
2001-12-21 14:56:54 +11:00
Damien Miller
9f0f5c64bc
- deraadt@cvs.openbsd.org 2001/12/19 07:18:56
...
[auth1.c auth2.c auth2-chall.c auth-bsdauth.c auth.c authfile.c auth.h]
[auth-krb4.c auth-rhosts.c auth-skey.c bufaux.c canohost.c channels.c]
[cipher.c clientloop.c compat.c compress.c deattack.c key.c log.c mac.c]
[match.c misc.c nchan.c packet.c readconf.c rijndael.c rijndael.h scard.c]
[servconf.c servconf.h serverloop.c session.c sftp.c sftp-client.c]
[sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c]
[sshconnect1.c sshconnect2.c sshconnect.c sshd.8 sshd.c sshd_config]
[ssh-keygen.c sshlogin.c sshpty.c sshtty.c ttymodes.c uidswap.c]
basic KNF done while i was looking for something else
2001-12-21 14:45:46 +11:00