Age | Commit message (Collapse) | Author |
|
[channels.h nchan.c]
(c) 2002
|
|
[channels.c channels.h nchan.c]
remove function pointers for events, remove chan_init*; ok provos@
|
|
[nchan.c]
remove duplicated code; ok provos@
|
|
[nchan.c]
correct fn names for ssh2, do not switch from closed to closed; ok provos@
|
|
[nchan.c]
merge chan_[io]buf_empty[12]; ok provos@
|
|
[nchan.c]
chan_send_oclose1() no longer calls chan_shutdown_write(); ok provos@
|
|
[channels.h nchan.c]
add chan_set_[io]state(), order states, state is now an u_int,
simplifies debugging messages; ok provos@
|
|
[auth2.c auth2-chall.c compat.c sshconnect2.c sshd.c]
use buffer API and avoid static strings of fixed size; ok provos@/mouring@
|
|
[ssh-agent.c]
change to use queue.h macros; okay markus@
|
|
[auth-skey.c]
undo local change
|
|
[auth-skey.c]
use snprintf; mouring@
|
|
[auth2-chall.c]
use snprintf; mouring@
|
|
[readpass.c]
use _PATH_TTY
|
|
[auth2-chall.c auth-skey.c]
use strlcpy not strlcat; mouring@
|
|
[auth2.c dispatch.c dispatch.h kex.c]
a single dispatch_protocol_error() that sends a message of type 'UNIMPLEMENTED'
dispatch_range(): set handler for a ranges message types
use dispatch_protocol_ignore() for authentication requests after
successful authentication (the drafts requirement).
serverloop/clientloop now send a 'UNIMPLEMENTED' message instead of exiting.
|
|
[ssh2.h]
add defines for msg type ranges
|
|
[packet.c]
handle received SSH2_MSG_UNIMPLEMENTED messages; ok djm@
|
|
[nchan.c]
more unused code (with channels.c:1.156)
|
|
[nchan.c]
remove dead code (skip drain)
|
|
[clientloop.c]
handle SSH2_MSG_GLOBAL_REQUEST (just reply with failure); ok djm@
|
|
[serverloop.c]
skip client_alive_check until there are channels; ok beck@
|
|
[channels.c nchan.c]
replace buffer_consume(b, buffer_len(b)) with buffer_clear(b); ok provos@
|
|
[channels.c]
merge channel_pre_open_15/channel_pre_open_20; ok provos@
|
|
[ssh-keygen.c]
append \n only for public keys
|
|
[ssh.1 sshd.8]
some missing and misplaced periods
|
|
[channels.c]
fix hanging x11 channels for rejected cookies (e.g. XAUTHORITY=/dev/null xbiff)
bug #36, based on patch from djast@cs.toronto.edu
|
|
[servconf.c sshd.8]
protocol 2 HostKey code default is now /etc/ssh_host_rsa_key and
/etc/ssh_host_dsa_key like we have in sshd_config. ok markus@
|
|
[readconf.c servconf.c]
remove #ifdef _PATH_XAUTH/#endif; ok markus@
|
|
[ssh_config]
grammar in comment
|
|
[authfile.c channels.c compress.c packet.c sftp-server.c ssh-agent.c ssh-keygen.c]
remove unneeded casts and some char->u_char cleanup; ok markus@
|
|
[ssh.1 sshd.8]
document LogLevel DEBUG[123]; ok markus@
|
|
[auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c dispatch.h kex.c kex.h serverloop.c ssh.c sshconnect2.c]
remove plen from the dispatch fn. it's no longer used.
|
|
[auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c]
packet_read* no longer return the packet length, since it's not used.
|
|
[bufaux.c bufaux.h packet.c]
buffer_get_bignum: int -> void
|
|
[auth1.c kexdh.c kexgex.c packet.c packet.h sshconnect1.c sshd.c]
packet_get_bignum* no longer returns a size
|
|
- markus@cvs.openbsd.org 2001/12/28 12:14:27
[auth1.c auth2.c auth2-chall.c auth-rsa.c channels.c clientloop.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c]
s/packet_done/packet_check_eom/ (end-of-message); ok djm@
with 47 more patchsets to go, I am not going to back out all the files for
the sake of a commit message...
|
|
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
get rid of packet_integrity_check, use packet_done() instead.
|
|
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
get rid of packet_integrity_check, use packet_done() instead.
|
|
[auth1.c auth.h auth-rh-rsa.c]
auth_rhosts_rsa now accept generic keys.
|
|
[dh.c kexdh.c kexgex.c]
always use BN_clear_free instead of BN_free
|
|
[authfile.c]
missing include
|
|
[sshd.8]
clarify -p; ok markus@
|
|
[auth1.c authfile.c auth-rsa.c dh.c kexdh.c kexgex.c key.c rsa.c scard.c ssh-agent.c sshconnect1.c sshd.c ssh-dss.c]
call fatal() for openssl allocation failures
|
|
[ssh-keygen.c]
-t is only needed for key generation (unbreaks -i, -e, etc).
|
|
[auth1.c]
be more carefull on allocation
|
|
[key.c]
be more careful on allocation
|
|
[ssh-add.c]
try all listed keys.. how did this get broken?
(oops - that was me)
|
|
[serverloop.c]
remove ifdef for USE_PIPES since fdin != fdout; ok djm@
|
|
[ssh-add.1 ssh-add.c]
Try all standard key files (id_rsa, id_dsa, identity) when invoked with
no arguments; ok markus@
|
|
[readpass.c]
Avoid interruptable passphrase read; ok markus@
|