summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2013-11-09 - (dtucker) [Makefile.in configure.ac] Set MALLOC_OPTIONS per platformDarren Tucker
and pass in TEST_ENV. Unknown options cause stderr to get polluted and the stderr-data test to fail.
2013-11-08 - (dtucker) [openbsd-compat/bsd-poll.c] Add headers to prevent compileDarren Tucker
warnings.
2013-11-08 - (dtucker) [myproposal.h] Conditionally enable CURVE25519_SHA256.Darren Tucker
2013-11-08 - (dtucker) [kex.c] Only enable CURVE25519_SHA256 if we actually haveDarren Tucker
EVP_sha256.
2013-11-08 - (dtucker) [openbsd-compat/openbsd-compat.h] Add null implementation ofDarren Tucker
arc4random_stir for platforms that have arc4random but don't have arc4random_stir (right now this is only OpenBSD -current).
2013-11-08 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]Damien Miller
[contrib/suse/openssh.spec] Update version numbers following release.
2013-11-08 - djm@cvs.openbsd.org 2013/11/08 01:38:11Damien Miller
[version.h] openssh-6.4
2013-11-08 - djm@cvs.openbsd.org 2013/11/08 00:39:15Damien Miller
[auth-options.c auth2-chall.c authfd.c channels.c cipher-3des1.c] [clientloop.c gss-genr.c monitor_mm.c packet.c schnorr.c umac.c] [sftp-client.c sftp-glob.c] use calloc for all structure allocations; from markus@
2013-11-08 - dtucker@cvs.openbsd.org 2013/11/07 11:58:27Damien Miller
[cipher.c cipher.h kex.c kex.h mac.c mac.h servconf.c ssh.c] Output the effective values of Ciphers, MACs and KexAlgorithms when the default has not been overridden. ok markus@
2013-11-08 - dtucker@cvs.openbsd.org 2013/11/08 01:06:14Darren Tucker
[regress/rekey.sh] Rekey less frequently during tests to speed them up
2013-11-07 - (dtucker) [Makefile.in configure.ac] Remove TEST_SSH_SHA256 environmentDarren Tucker
variable. It's no longer used now that we get the supported MACs from ssh -Q.
2013-11-07 - dtucker@cvs.openbsd.org 2013/11/07 04:26:56Darren Tucker
[regress/kextype.sh] trailing space
2013-11-07 - dtucker@cvs.openbsd.org 2013/11/07 03:55:41Darren Tucker
[regress/kextype.sh] Use ssh -Q to get kex types instead of a static list.
2013-11-07 - dtucker@cvs.openbsd.org 2013/11/07 02:48:38Darren Tucker
[regress/integrity.sh regress/cipher-speed.sh regress/try-ciphers.sh] Use ssh -Q instead of hardcoding lists of ciphers or MACs.
2013-11-07 - dtucker@cvs.openbsd.org 2013/11/07 01:12:51Darren Tucker
[regress/rekey.sh] Factor out the data transfer rekey tests
2013-11-07 - dtucker@cvs.openbsd.org 2013/11/07 00:12:05Darren Tucker
[regress/rekey.sh] Test rekeying for every Cipher, MAC and KEX, plus test every KEX with the GCM ciphers.
2013-11-07 - dtucker@cvs.openbsd.org 2013/11/04 12:27:42Darren Tucker
[regress/rekey.sh] Test rekeying with all KexAlgorithms.
2013-11-07 - markus@cvs.openbsd.org 2013/11/02 22:39:53Darren Tucker
[regress/kextype.sh] add curve25519-sha256@libssh.org
2013-11-07 - djm@cvs.openbsd.org 2013/10/09 23:44:14Darren Tucker
[regress/Makefile] (ID sync only) regression test for sftp request white/blacklisting and readonly mode.
2013-11-07 - djm@cvs.openbsd.org 2013/11/06 23:05:59Damien Miller
[ssh-pkcs11.c] from portable: s/true/true_val/ to avoid name collisions on dump platforms RCSID sync only
2013-11-07 - markus@cvs.openbsd.org 2013/11/06 16:52:11Damien Miller
[monitor_wrap.c] fix rekeying for AES-GCM modes; ok deraadt
2013-11-07 - markus@cvs.openbsd.org 2013/11/04 11:51:16Damien Miller
[monitor.c] fix rekeying for KEX_C25519_SHA256; noted by dtucker@ RCSID sync only; I thought this was a merge botch and fixed it already
2013-11-07 - (djm) [configure.ac defines.h] Skip arc4random_stir() calls on platformsDamien Miller
that lack it but have arc4random_uniform()
2013-11-07 - (djm) [regress/modpipe.c regress/rekey.sh] Never intended to commit theseDamien Miller
2013-11-07 - (djm) [Makefile.in monitor.c] Missed chunks of curve25519 KEX diffDamien Miller
2013-11-07 - (djm) [ssh-pkcs11.c] Bring back "non-constant initialiser" fix (rev 1.5)Damien Miller
that got lost in recent merge.
2013-11-04 - (djm) [kexc25519.c kexc25519c.c kexc25519s.c] Import missed files fromDamien Miller
KEX/curve25519 change
2013-11-04 - djm@cvs.openbsd.org 2013/11/03 10:37:19Damien Miller
[roaming_common.c] fix a couple of function definitions foo() -> foo(void) (-Wold-style-definition)
2013-11-04 - markus@cvs.openbsd.org 2013/11/02 22:39:19Damien Miller
[ssh_config.5 sshd_config.5] the default kex is now curve25519-sha256@libssh.org
2013-11-04 - markus@cvs.openbsd.org 2013/11/02 22:34:01Damien Miller
[auth-options.c] no need to include monitor_wrap.h and ssh-gss.h
2013-11-04 - markus@cvs.openbsd.org 2013/11/02 22:24:24Damien Miller
[kexdhs.c kexecdhs.c] no need to include ssh-gss.h
2013-11-04 - markus@cvs.openbsd.org 2013/11/02 22:10:15Damien Miller
[kexdhs.c kexecdhs.c] no need to include monitor_wrap.h
2013-11-04 - markus@cvs.openbsd.org 2013/11/02 21:59:15Damien Miller
[kex.c kex.h myproposal.h ssh-keyscan.c sshconnect2.c sshd.c] use curve25519 for default key exchange (curve25519-sha256@libssh.org); initial patch from Aris Adamantiadis; ok djm@
2013-11-04 - markus@cvs.openbsd.org 2013/11/02 20:03:54Damien Miller
[ssh-pkcs11.c] support pkcs#11 tokes that only provide x509 zerts instead of raw pubkeys; fixes bz#1908; based on patch from Laurent Barbe; ok djm
2013-11-03 - (dtucker) [configure.ac defines.h] Add typedefs for intmax_t and uintmax_tDarren Tucker
for platforms that don't have them.
2013-11-03 - (dtucker) [openbsd-compat/setproctitle.c] Handle error case form the 2ndDarren Tucker
vsnprintf. From eric at openbsd via chl@.
2013-11-03 - (dtucker) [openbsd-compat/bsd-misc.c] Include time.h for nanosleep.Darren Tucker
From OpenSMTPD where it prevents "implicit declaration" warnings (it's a no-op in OpenSSH). From chl at openbsd.
2013-10-30 - jmc@cvs.openbsd.org 2013/10/29 18:49:32Damien Miller
[sshd_config.5] pty(4), not pty(7);
2013-10-30 - djm@cvs.openbsd.org 2013/10/29 09:48:02Damien Miller
[servconf.c servconf.h session.c sshd_config sshd_config.5] shd_config PermitTTY to disallow TTY allocation, mirroring the longstanding no-pty authorized_keys option; bz#2070, patch from Teran McKinney; ok markus@
2013-10-30 - djm@cvs.openbsd.org 2013/10/29 09:42:11Damien Miller
[key.c key.h] fix potential stack exhaustion caused by nested certificates; report by Mateusz Kocielski; ok dtucker@ markus@
2013-10-26 - djm@cvs.openbsd.org 2013/10/25 23:04:51Damien Miller
[ssh.c] fix crash when using ProxyCommand caused by previous commit - was calling freeaddrinfo(NULL); spotted by sthen@ and Tim Ruehsen, patch by sthen@
2013-10-26 - (djm) [ssh-keygen.c ssh-keysign.c sshconnect1.c sshd.c] RemoveDamien Miller
unnecessary arc4random_stir() calls. The only ones left are to ensure that the PRNG gets a different state after fork() for platforms that have broken the API.
2013-10-24 - (tim) [regress/sftp-perm.sh] We need a shell that understands "! somecmd"Tim Rice
2013-10-24 - djm@cvs.openbsd.org 2013/10/24 08:19:36Damien Miller
[ssh.c] fix bug introduced in hostname canonicalisation commit: don't try to resolve hostnames when a ProxyCommand is set unless the user has forced canonicalisation; spotted by Iain Morgan
2013-10-24 - dtucker@cvs.openbsd.org 2013/10/24 00:51:48Damien Miller
[readconf.c servconf.c ssh_config.5 sshd_config.5] Disallow empty Match statements and add "Match all" which matches everything. ok djm, man page help jmc@
2013-10-24 - dtucker@cvs.openbsd.org 2013/10/24 00:49:49Damien Miller
[moduli.c] Periodically print progress and, if possible, expected time to completion when screening moduli for DH groups. ok deraadt djm
2013-10-24 - djm@cvs.openbsd.org 2013/10/23 23:35:32Damien Miller
[sshd.c] include local address and port in "Connection from ..." message (only shown at loglevel>=verbose)
2013-10-24 - dtucker@cvs.openbsd.org 2013/10/23 05:40:58Damien Miller
[servconf.c] fix comment
2013-10-24 - (djm) [auth-krb5.c] bz#2032 - use local username in krb5_kuserok checkDamien Miller
rather than full client name which may be of form user@REALM; patch from Miguel Sanders; ok dtucker@
2013-10-23 - djm@cvs.openbsd.org 2013/10/23 04:16:22Damien Miller
[ssh-keygen.c] Make code match documentation: relative-specified certificate expiry time should be relative to current time and not the validity start time. Reported by Petr Lautrbach; ok deraadt@