Commit Graph

1769 Commits

Author SHA1 Message Date
Damien Miller
abea8ee1c3 - markus@cvs.openbsd.org 2002/01/13 21:31:20
[channels.h nchan.c]
     add chan_set_[io]state(), order states, state is now an u_int,
     simplifies debugging messages; ok provos@
2002-01-22 23:27:11 +11:00
Damien Miller
0e3b87279c - markus@cvs.openbsd.org 2002/01/13 17:57:37
[auth2.c auth2-chall.c compat.c sshconnect2.c sshd.c]
     use buffer API and avoid static strings of fixed size; ok provos@/mouring@
2002-01-22 23:26:38 +11:00
Damien Miller
1a534ae97f - provos@cvs.openbsd.org 2002/01/13 17:27:07
[ssh-agent.c]
     change to use queue.h macros; okay markus@
2002-01-22 23:26:13 +11:00
Damien Miller
df224031ca - markus@cvs.openbsd.org 2002/01/12 13:10:29
[auth-skey.c]
     undo local change
2002-01-22 23:25:46 +11:00
Damien Miller
73f18346bc - markus@cvs.openbsd.org 2002/01/11 23:26:30
[auth-skey.c]
     use snprintf; mouring@
2002-01-22 23:25:30 +11:00
Damien Miller
209ee4e368 - markus@cvs.openbsd.org 2002/01/11 23:02:51
[auth2-chall.c]
     use snprintf; mouring@
2002-01-22 23:25:08 +11:00
Damien Miller
85830d1dc0 - markus@cvs.openbsd.org 2002/01/11 23:02:18
[readpass.c]
     use _PATH_TTY
2002-01-22 23:24:51 +11:00
Damien Miller
a5ebe0c39d - markus@cvs.openbsd.org 2002/01/11 20:14:11
[auth2-chall.c auth-skey.c]
     use strlcpy not strlcat; mouring@
2002-01-22 23:24:33 +11:00
Damien Miller
7d05339c70 - markus@cvs.openbsd.org 2002/01/11 13:39:36
[auth2.c dispatch.c dispatch.h kex.c]
     a single dispatch_protocol_error() that sends a message of type 'UNIMPLEMENTED'
     dispatch_range(): set handler for a ranges message types
     use dispatch_protocol_ignore() for authentication requests after
     	successful authentication (the drafts requirement).
     serverloop/clientloop now send a 'UNIMPLEMENTED' message instead of exiting.
2002-01-22 23:24:13 +11:00
Damien Miller
84b8ab3eee - markus@cvs.openbsd.org 2002/01/11 13:36:43
[ssh2.h]
     add defines for msg type ranges
2002-01-22 23:23:41 +11:00
Damien Miller
659811f7fc - markus@cvs.openbsd.org 2002/01/11 10:31:05
[packet.c]
     handle received SSH2_MSG_UNIMPLEMENTED messages; ok djm@
2002-01-22 23:23:11 +11:00
Damien Miller
66ac6a43a8 - markus@cvs.openbsd.org 2002/01/10 12:47:59
[nchan.c]
     more unused code (with channels.c:1.156)
2002-01-22 23:22:44 +11:00
Damien Miller
4ce2595259 - markus@cvs.openbsd.org 2002/01/10 12:38:26
[nchan.c]
     remove dead code (skip drain)
2002-01-22 23:22:20 +11:00
Damien Miller
c3fa407073 - markus@cvs.openbsd.org 2002/01/10 11:24:04
[clientloop.c]
     handle SSH2_MSG_GLOBAL_REQUEST (just reply with failure); ok djm@
2002-01-22 23:21:58 +11:00
Damien Miller
056cf73d35 - markus@cvs.openbsd.org 2002/01/10 11:13:29
[serverloop.c]
     skip client_alive_check until there are channels; ok beck@
2002-01-22 23:21:39 +11:00
Damien Miller
76765c0b1a - markus@cvs.openbsd.org 2002/01/09 17:26:35
[channels.c nchan.c]
     replace buffer_consume(b, buffer_len(b)) with buffer_clear(b); ok provos@
2002-01-22 23:21:15 +11:00
Damien Miller
de6987c2b9 - markus@cvs.openbsd.org 2002/01/09 17:16:00
[channels.c]
     merge channel_pre_open_15/channel_pre_open_20; ok provos@
2002-01-22 23:20:40 +11:00
Damien Miller
a1db12bac4 - markus@cvs.openbsd.org 2002/01/09 13:49:27
[ssh-keygen.c]
     append \n only for public keys
2002-01-22 23:20:15 +11:00
Damien Miller
70972eb388 - stevesk@cvs.openbsd.org 2002/01/05 21:51:56
[ssh.1 sshd.8]
     some missing and misplaced periods
2002-01-22 23:19:55 +11:00
Damien Miller
a90fc08b88 - markus@cvs.openbsd.org 2002/01/05 10:43:40
[channels.c]
     fix hanging x11 channels for rejected cookies (e.g. XAUTHORITY=/dev/null xbiff)
     bug #36, based on patch from djast@cs.toronto.edu
2002-01-22 23:19:38 +11:00
Damien Miller
7fc2373f17 - stevesk@cvs.openbsd.org 2002/01/04 18:14:16
[servconf.c sshd.8]
     protocol 2 HostKey code default is now /etc/ssh_host_rsa_key and
     /etc/ssh_host_dsa_key like we have in sshd_config.  ok markus@
2002-01-22 23:19:11 +11:00
Damien Miller
f51b0e1a30 - stevesk@cvs.openbsd.org 2002/01/04 17:59:17
[readconf.c servconf.c]
     remove #ifdef _PATH_XAUTH/#endif; ok markus@
2002-01-22 23:18:49 +11:00
Damien Miller
56ccf41de2 - stevesk@cvs.openbsd.org 2002/01/03 04:11:08
[ssh_config]
     grammar in comment
2002-01-22 23:18:32 +11:00
Damien Miller
708d21c802 - stevesk@cvs.openbsd.org 2001/12/29 21:56:01
[authfile.c channels.c compress.c packet.c sftp-server.c ssh-agent.c ssh-keygen.c]
     remove unneeded casts and some char->u_char cleanup; ok markus@
2002-01-22 23:18:15 +11:00
Damien Miller
dc9e067614 - stevesk@cvs.openbsd.org 2001/12/28 22:37:48
[ssh.1 sshd.8]
     document LogLevel DEBUG[123]; ok markus@
2002-01-22 23:17:51 +11:00
Damien Miller
630d6f4479 - markus@cvs.openbsd.org 2001/12/28 15:06:00
[auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c dispatch.h kex.c kex.h serverloop.c ssh.c sshconnect2.c]
     remove plen from the dispatch fn. it's no longer used.
2002-01-22 23:17:30 +11:00
Damien Miller
dff5099f13 - markus@cvs.openbsd.org 2001/12/28 14:50:54
[auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c]
     packet_read* no longer return the packet length, since it's not used.
2002-01-22 23:16:32 +11:00
Damien Miller
76e1e368b5 - markus@cvs.openbsd.org 2001/12/28 14:13:13
[bufaux.c bufaux.h packet.c]
     buffer_get_bignum: int -> void
2002-01-22 23:15:57 +11:00
Damien Miller
d432ccf740 - markus@cvs.openbsd.org 2001/12/28 13:57:33
[auth1.c kexdh.c kexgex.c packet.c packet.h sshconnect1.c sshd.c]
     packet_get_bignum* no longer returns a size
2002-01-22 23:14:44 +11:00
Damien Miller
29f75f5c25 oops, that last commit was really:
- markus@cvs.openbsd.org 2001/12/28 12:14:27
     [auth1.c auth2.c auth2-chall.c auth-rsa.c channels.c clientloop.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c]
     s/packet_done/packet_check_eom/ (end-of-message); ok djm@

with 47 more patchsets to go, I am not going to back out all the files for
the sake of a commit message...
2002-01-22 23:14:10 +11:00
Damien Miller
48b03fc546 - markus@cvs.openbsd.org 2001/12/27 20:39:58
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
     get rid of packet_integrity_check, use packet_done() instead.
2002-01-22 23:11:40 +11:00
Damien Miller
66823cddbe - markus@cvs.openbsd.org 2001/12/27 20:39:58
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
     get rid of packet_integrity_check, use packet_done() instead.
2002-01-22 23:11:38 +11:00
Damien Miller
d221ca6cc9 - markus@cvs.openbsd.org 2001/12/27 19:54:53
[auth1.c auth.h auth-rh-rsa.c]
     auth_rhosts_rsa now accept generic keys.
2002-01-22 23:11:00 +11:00
Damien Miller
9ef95ddcaf - markus@cvs.openbsd.org 2001/12/27 19:37:23
[dh.c kexdh.c kexgex.c]
     always use BN_clear_free instead of BN_free
2002-01-22 23:10:33 +11:00
Damien Miller
040b64f60a - markus@cvs.openbsd.org 2001/12/27 18:26:13
[authfile.c]
     missing include
2002-01-22 23:10:04 +11:00
Damien Miller
7d1ded4972 - stevesk@cvs.openbsd.org 2001/12/27 18:22:53
[sshd.8]
     clarify -p; ok markus@
2002-01-22 23:09:41 +11:00
Damien Miller
da7551677b - markus@cvs.openbsd.org 2001/12/27 18:22:16
[auth1.c authfile.c auth-rsa.c dh.c kexdh.c kexgex.c key.c rsa.c scard.c ssh-agent.c sshconnect1.c sshd.c ssh-dss.c]
     call fatal() for openssl allocation failures
2002-01-22 23:09:22 +11:00
Damien Miller
154dda73a8 - markus@cvs.openbsd.org 2001/12/27 18:10:29
[ssh-keygen.c]
     -t is only needed for key generation (unbreaks -i, -e, etc).
2002-01-22 23:08:16 +11:00
Damien Miller
aef7a095c8 - markus@cvs.openbsd.org 2001/12/25 18:53:00
[auth1.c]
     be more carefull on allocation
2002-01-22 23:07:52 +11:00
Damien Miller
503761ac45 - markus@cvs.openbsd.org 2001/12/25 18:49:56
[key.c]
     be more careful on allocation
2002-01-22 23:07:21 +11:00
Damien Miller
a055c25d05 - deraadt@cvs.openbsd.org 2001/12/24 07:29:43
[ssh-add.c]
     try all listed keys.. how did this get broken?

(oops - that was me)
2002-01-22 23:07:01 +11:00
Damien Miller
7c31809c4a - markus@cvs.openbsd.org 2001/12/21 12:17:33
[serverloop.c]
     remove ifdef for USE_PIPES since fdin != fdout; ok djm@
2002-01-22 23:06:22 +11:00
Damien Miller
6e1057c2d7 - djm@cvs.openbsd.org 2001/12/21 10:06:43
[ssh-add.1 ssh-add.c]
     Try all standard key files (id_rsa, id_dsa, identity) when invoked with
     no arguments; ok markus@
2002-01-22 23:05:59 +11:00
Damien Miller
f451e22e21 - djm@cvs.openbsd.org 2001/12/21 08:53:45
[readpass.c]
     Avoid interruptable passphrase read; ok markus@
2002-01-22 23:05:31 +11:00
Damien Miller
a41c8b15bd - djm@cvs.openbsd.org 2001/12/21 08:52:22
[ssh-keygen.1 ssh-keygen.c]
     Remove default (rsa1) key type; ok markus@
2002-01-22 23:05:08 +11:00
Damien Miller
ec932376b7 - (djm) autoconf hacking:
- Add OpenSSL sanity check: verify that header version matches version
     reported by library
2002-01-22 22:16:03 +11:00
Damien Miller
c46cc5445d - (djm) Fix some bugs I introduced into ssh-rand-helper yesterday 2002-01-22 21:58:27 +11:00
Damien Miller
6c21c51c48 - (djm) autoconf hacking:
- We don't support --without-zlib currently, so don't allow it.
   - Rework cryptographic random number support detection. We now detect
     whether OpenSSL seeds itself. If it does, then we don't bother with
     the ssh-rand-helper program. You can force the use of ssh-rand-helper
     using the --with-rand-helper configure argument
   - Simplify and clean up ssh-rand-helper configuration
2002-01-22 21:57:53 +11:00
Damien Miller
7b10ef4877 - (djm) Rework ssh-rand-helper:
- Reduce quantity of ifdef code, in preparation for ssh_rand_conf
   - Always seed from system calls, even when doing PRNGd seeding
   - Tidy and comment #define knobs
   - Remove unused facility for multiple runs through command list
   - KNF, cleanup, update copyright
2002-01-21 23:44:12 +11:00
Damien Miller
a234451a70 - (djm) Bug #50 - make autoconf entropy path checks more robust 2002-01-14 19:01:03 +11:00