Commit Graph

2337 Commits

Author SHA1 Message Date
Kevin Steves d760f451a4 remove blank line at end of file 2002-03-30 20:01:48 +00:00
Kevin Steves 117b06dec9 - (stevesk) [configure.ac] remove header check for sys/ttcompat.h
bug 167
2002-03-30 17:55:21 +00:00
Ben Lindstrom b57a4bf93f - mouring@cvs.openbsd.org 2002/03/27 11:45:42
[monitor.c]
     monitor_allowed_key() returns int instead of pointer.  ok markus@
2002-03-27 18:00:59 +00:00
Ben Lindstrom 599717246c - markus@cvs.openbsd.org 2002/03/26 23:14:51
[kex.c]
     generate a new cookie for each SSH2_MSG_KEXINIT message we send out
2002-03-27 17:42:57 +00:00
Ben Lindstrom e1f9e324e9 - markus@cvs.openbsd.org 2002/03/26 23:13:03
[auth-rsa.c]
     disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth)
2002-03-27 17:38:43 +00:00
Ben Lindstrom 57686a82a5 - markus@cvs.openbsd.org 2002/03/26 22:50:39
[channels.h]
     CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too
2002-03-27 17:36:41 +00:00
Ben Lindstrom 43a5e2f70e - rees@cvs.openbsd.org 2002/03/26 18:46:59
[scard.c]
     try_AUT0 in read_pubkey too, for those paranoid few who want to acl 'sh'
2002-03-27 17:33:17 +00:00
Ben Lindstrom 38a69e6b53 - markus@cvs.openbsd.org 2002/03/26 15:58:46
[readpass.c readpass.h sshconnect2.c]
     client side support for PASSWD_CHANGEREQ
2002-03-27 17:28:46 +00:00
Ben Lindstrom cd8bbce80b - markus@cvs.openbsd.org 2002/03/26 15:23:40
[bufaux.c]
     do not talk about packets in bufaux
2002-03-27 17:23:44 +00:00
Ben Lindstrom eb041dca1f - markus@cvs.openbsd.org 2002/03/26 11:37:05
[ssh.c]
     update Copyright
2002-03-27 17:20:38 +00:00
Ben Lindstrom f181384a6b - markus@cvs.openbsd.org 2002/03/26 11:34:49
[ssh.1 sshd.8]
     update to recent drafts
2002-03-27 17:18:31 +00:00
Ben Lindstrom 53f1830d6a - (bal) 'pw' should be 'authctxt->pw' in auth1.c spotted by
kent@lysator.liu.se
2002-03-27 16:50:03 +00:00
Ben Lindstrom 28364ecf45 - stevesk@cvs.openbsd.org 2002/03/26 03:24:01
[monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h]
     $OpenBSD$
2002-03-26 03:42:20 +00:00
Ben Lindstrom cf15944c23 - markus@cvs.openbsd.org 2002/03/25 21:13:51
[channels.c channels.h compat.c compat.h nchan.c]
     don't send stderr data after EOF, accept this from older known (broken)
     sshd servers only, fixes http://bugzilla.mindrot.org/show_bug.cgi?id=179
2002-03-26 03:26:24 +00:00
Ben Lindstrom 4f054607f0 - markus@cvs.openbsd.org 2002/03/25 21:04:02
[ssh.c]
     simplify num_identity_files handling
2002-03-26 03:23:00 +00:00
Ben Lindstrom c861547f34 - stevesk@cvs.openbsd.org 2002/03/25 20:12:10
[monitor_mm.c monitor_wrap.c]
     ssize_t args use "%ld" and cast to (long)
     size_t args use "%lu" and cast to (u_long)
     ok markus@ and thanks millert@
2002-03-26 03:20:45 +00:00
Ben Lindstrom 0936a5bb72 - markus@cvs.openbsd.org 2002/03/25 17:34:27
[scard.c scard.h ssh-agent.c ssh-keygen.c ssh.c]
     change sc_get_key to sc_get_keys and hide smartcard details in scard.c
2002-03-26 03:17:42 +00:00
Ben Lindstrom 5facb2bbc4 - markus@cvs.openbsd.org 2002/03/25 09:25:06
[auth-rh-rsa.c]
     rm bogus comment
2002-03-26 03:08:47 +00:00
Ben Lindstrom f6d367b91a - markus@cvs.openbsd.org 2002/03/25 09:21:13
[auth-rsa.c]
     return 0 (not NULL); tomh@po.crl.go.jp
2002-03-26 02:59:31 +00:00
Ben Lindstrom 2e9d866608 - stevesk@cvs.openbsd.org 2002/03/24 23:20:00
[monitor.c]
     remove "\n" from fatal()
2002-03-26 02:49:34 +00:00
Ben Lindstrom c2c6cbc527 - markus@cvs.openbsd.org 2002/03/24 18:05:29
[scard.c]
     we need to figure out AUT0 for sc_private_encrypt, too
2002-03-26 02:44:44 +00:00
Ben Lindstrom 31ee7aeb15 - stevesk@cvs.openbsd.org 2002/03/24 17:53:16
[monitor_fdpass.c]
     minor cleanup and more error checking; ok markus@
2002-03-26 02:36:29 +00:00
Ben Lindstrom fcad1c92c9 - stevesk@cvs.openbsd.org 2002/03/24 17:27:03
[kexgex.c]
     typo; ok markus@
2002-03-26 02:20:06 +00:00
Ben Lindstrom 8b08d8115d - markus@cvs.openbsd.org 2002/03/24 16:01:13
[packet.c]
     debug->debug3 for extra padding
2002-03-26 02:09:41 +00:00
Ben Lindstrom 3dc40f997b - markus@cvs.openbsd.org 2002/03/24 16:00:27
[serverloop.c]
     remove unused debug
2002-03-26 02:01:30 +00:00
Ben Lindstrom f90f58d846 - stevesk@cvs.openbsd.org 2002/03/23 20:57:26
[sshd.c]
     setproctitle() after preauth child; ok markus@
2002-03-26 01:53:03 +00:00
Kevin Steves 6205a18f55 - (stevesk) import OpenBSD <sys/tree.h> as "openbsd-compat/tree.h" 2002-03-26 00:12:49 +00:00
Kevin Steves b4799a31a5 - (stevesk) [session.c] disable LOGIN_NEEDS_TERM until we are sure
it can be removed. only used on solaris. will no longer compile with
   privsep shuffling.
2002-03-24 23:19:54 +00:00
Kevin Steves 4408c2098f - (stevesk) [LICENCE] OpenBSD sync 2002-03-23 02:20:07 +00:00
Tim Rice f29a6539c0 [cipher.c] fix problem with OpenBSD sync 2002-03-22 13:27:40 -08:00
Kevin Steves 4435a55a4b - (stevesk) [defines.h] #define MAP_ANON MAP_ANONYMOUS for HP-UX; other
platforms may need this--I'm not sure.  mmap() issues will need to be
   addressed further.
2002-03-22 21:08:03 +00:00
Kevin Steves 219bef12c6 - (stevesk) [defines.h] hp-ux 11 has ancillary data style fd passing, but
is missing CMSG_LEN() and CMSG_SPACE() macros.
2002-03-22 20:53:32 +00:00
Kevin Steves 205cc1ef46 - (stevesk) [auth2.c] merge cleanup/sync 2002-03-22 20:43:05 +00:00
Kevin Steves 1adb120779 - (stevesk) [monitor_fdpass.c] support for access rights style file
descriptor passing
2002-03-22 19:32:53 +00:00
Kevin Steves 4846f4ab69 - (stevesk) configure and cpp __FUNCTION__ gymnastics to handle nielsisms 2002-03-22 18:19:53 +00:00
Kevin Steves 7e147607f5 - (stevesk) [monitor.c monitor_wrap.c] #ifdef HAVE_PW_CLASS_IN_PASSWD 2002-03-22 18:07:17 +00:00
Kevin Steves 939c9db9b1 - (stevesk) HAVE_ACCRIGHTS_IN_MSGHDR configure support 2002-03-22 17:23:25 +00:00
Ben Lindstrom 681d932634 - markus@cvs.openbsd.org 2002/03/21 23:07:37
[clientloop.c]
     remove unused, sync w/ cmdline patch in my tree.
2002-03-22 03:53:00 +00:00
Ben Lindstrom ba72d30aa5 - rees@cvs.openbsd.org 2002/03/21 22:44:05
[authfd.c authfd.h ssh-add.c ssh-agent.c ssh.c]
     Add PIN-protection for secret key.
2002-03-22 03:51:06 +00:00
Ben Lindstrom 266ec63eb3 - rees@cvs.openbsd.org 2002/03/21 21:54:34
[scard.c scard.h ssh-keygen.c]
     Add PIN-protection for secret key.
2002-03-22 03:47:38 +00:00
Ben Lindstrom 943481cc77 - markus@cvs.openbsd.org 2002/03/21 21:23:34
[sshd.c]
     add privsep_preauth() and remove 1 goto; ok provos@
2002-03-22 03:43:46 +00:00
Ben Lindstrom fa1336ff47 - markus@cvs.openbsd.org 2002/03/21 20:51:12
[sshd_config]
     add privsep (off)
2002-03-22 03:40:58 +00:00
Ben Lindstrom 818659a163 - rees@cvs.openbsd.org 2002/03/21 18:08:15
[scard.c]
     In sc_put_key(), sc_reader_id should be id.
2002-03-22 03:38:35 +00:00
Ben Lindstrom eda98a728d - markus@cvs.openbsd.org 2002/03/21 16:58:13
[clientloop.c]
     remove unused
2002-03-22 03:35:48 +00:00
Ben Lindstrom 70e3ad8231 - markus@cvs.openbsd.org 2002/03/21 16:57:15
[scard.c]
     remove const
2002-03-22 03:33:43 +00:00
Ben Lindstrom 0b675b1659 - markus@cvs.openbsd.org 2002/03/21 16:38:06
[scard.c]
     make compile w/ openssl 0.9.7
2002-03-22 03:28:11 +00:00
Ben Lindstrom 5589f4b55f - jakob@cvs.openbsd.org 2002/03/21 15:17:26
[clientloop.c ssh.1]
     add built-in command line for adding new port forwardings on the fly.
     based on a patch from brian wellington. ok markus@.
2002-03-22 03:24:32 +00:00
Ben Lindstrom 58b391b1bd - markus@cvs.openbsd.org 2002/03/21 10:21:20
[ssh-add.c]
     ignore errors for nonexisting default keys in ssh-add,
     fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158

Last patch was SUPPOSE to be:
   - stevesk@cvs.openbsd.org 2002/03/20 21:08:08
     [sshd.c]
     strerror() on chdir() fail; ok provos@

But it got co-mingled.  <sigh>  Flog me at will.
2002-03-22 03:21:16 +00:00
Ben Lindstrom 1ee9ec32a3 - markus@cvs.openbsd.org 2002/03/21 10:21:20
[ssh-add.c]
     ignore errors for nonexisting default keys in ssh-add,
     fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
2002-03-22 03:14:45 +00:00
Ben Lindstrom c743134191 - stevesk@cvs.openbsd.org 2002/03/20 19:12:25
[servconf.c servconf.h ssh.h sshd.c]
     for unprivileged user, group do:
     pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw).  ok provos@
2002-03-22 03:11:49 +00:00