summaryrefslogtreecommitdiff
path: root/ChangeLog
AgeCommit message (Collapse)Author
2002-01-22 - markus@cvs.openbsd.org 2002/01/09 17:26:35Damien Miller
[channels.c nchan.c] replace buffer_consume(b, buffer_len(b)) with buffer_clear(b); ok provos@
2002-01-22 - markus@cvs.openbsd.org 2002/01/09 17:16:00Damien Miller
[channels.c] merge channel_pre_open_15/channel_pre_open_20; ok provos@
2002-01-22 - markus@cvs.openbsd.org 2002/01/09 13:49:27Damien Miller
[ssh-keygen.c] append \n only for public keys
2002-01-22 - stevesk@cvs.openbsd.org 2002/01/05 21:51:56Damien Miller
[ssh.1 sshd.8] some missing and misplaced periods
2002-01-22 - markus@cvs.openbsd.org 2002/01/05 10:43:40Damien Miller
[channels.c] fix hanging x11 channels for rejected cookies (e.g. XAUTHORITY=/dev/null xbiff) bug #36, based on patch from djast@cs.toronto.edu
2002-01-22 - stevesk@cvs.openbsd.org 2002/01/04 18:14:16Damien Miller
[servconf.c sshd.8] protocol 2 HostKey code default is now /etc/ssh_host_rsa_key and /etc/ssh_host_dsa_key like we have in sshd_config. ok markus@
2002-01-22 - stevesk@cvs.openbsd.org 2002/01/04 17:59:17Damien Miller
[readconf.c servconf.c] remove #ifdef _PATH_XAUTH/#endif; ok markus@
2002-01-22 - stevesk@cvs.openbsd.org 2002/01/03 04:11:08Damien Miller
[ssh_config] grammar in comment
2002-01-22 - stevesk@cvs.openbsd.org 2001/12/29 21:56:01Damien Miller
[authfile.c channels.c compress.c packet.c sftp-server.c ssh-agent.c ssh-keygen.c] remove unneeded casts and some char->u_char cleanup; ok markus@
2002-01-22 - stevesk@cvs.openbsd.org 2001/12/28 22:37:48Damien Miller
[ssh.1 sshd.8] document LogLevel DEBUG[123]; ok markus@
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 15:06:00Damien Miller
[auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c dispatch.h kex.c kex.h serverloop.c ssh.c sshconnect2.c] remove plen from the dispatch fn. it's no longer used.
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 14:50:54Damien Miller
[auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c] packet_read* no longer return the packet length, since it's not used.
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 14:13:13Damien Miller
[bufaux.c bufaux.h packet.c] buffer_get_bignum: int -> void
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 13:57:33Damien Miller
[auth1.c kexdh.c kexgex.c packet.c packet.h sshconnect1.c sshd.c] packet_get_bignum* no longer returns a size
2002-01-22oops, that last commit was really:Damien Miller
- markus@cvs.openbsd.org 2001/12/28 12:14:27 [auth1.c auth2.c auth2-chall.c auth-rsa.c channels.c clientloop.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c] s/packet_done/packet_check_eom/ (end-of-message); ok djm@ with 47 more patchsets to go, I am not going to back out all the files for the sake of a commit message...
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 20:39:58Damien Miller
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c] get rid of packet_integrity_check, use packet_done() instead.
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 20:39:58Damien Miller
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c] get rid of packet_integrity_check, use packet_done() instead.
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 19:54:53Damien Miller
[auth1.c auth.h auth-rh-rsa.c] auth_rhosts_rsa now accept generic keys.
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 19:37:23Damien Miller
[dh.c kexdh.c kexgex.c] always use BN_clear_free instead of BN_free
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 18:26:13Damien Miller
[authfile.c] missing include
2002-01-22 - stevesk@cvs.openbsd.org 2001/12/27 18:22:53Damien Miller
[sshd.8] clarify -p; ok markus@
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 18:22:16Damien Miller
[auth1.c authfile.c auth-rsa.c dh.c kexdh.c kexgex.c key.c rsa.c scard.c ssh-agent.c sshconnect1.c sshd.c ssh-dss.c] call fatal() for openssl allocation failures
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 18:10:29Damien Miller
[ssh-keygen.c] -t is only needed for key generation (unbreaks -i, -e, etc).
2002-01-22 - markus@cvs.openbsd.org 2001/12/25 18:53:00Damien Miller
[auth1.c] be more carefull on allocation
2002-01-22 - markus@cvs.openbsd.org 2001/12/25 18:49:56Damien Miller
[key.c] be more careful on allocation
2002-01-22 - deraadt@cvs.openbsd.org 2001/12/24 07:29:43Damien Miller
[ssh-add.c] try all listed keys.. how did this get broken? (oops - that was me)
2002-01-22 - markus@cvs.openbsd.org 2001/12/21 12:17:33Damien Miller
[serverloop.c] remove ifdef for USE_PIPES since fdin != fdout; ok djm@
2002-01-22 - djm@cvs.openbsd.org 2001/12/21 10:06:43Damien Miller
[ssh-add.1 ssh-add.c] Try all standard key files (id_rsa, id_dsa, identity) when invoked with no arguments; ok markus@
2002-01-22 - djm@cvs.openbsd.org 2001/12/21 08:53:45Damien Miller
[readpass.c] Avoid interruptable passphrase read; ok markus@
2002-01-22 - djm@cvs.openbsd.org 2001/12/21 08:52:22Damien Miller
[ssh-keygen.1 ssh-keygen.c] Remove default (rsa1) key type; ok markus@
2002-01-22 - (djm) autoconf hacking:Damien Miller
- Add OpenSSL sanity check: verify that header version matches version reported by library
2002-01-22 - (djm) Fix some bugs I introduced into ssh-rand-helper yesterdayDamien Miller
2002-01-22 - (djm) autoconf hacking:Damien Miller
- We don't support --without-zlib currently, so don't allow it. - Rework cryptographic random number support detection. We now detect whether OpenSSL seeds itself. If it does, then we don't bother with the ssh-rand-helper program. You can force the use of ssh-rand-helper using the --with-rand-helper configure argument - Simplify and clean up ssh-rand-helper configuration
2002-01-21 - (djm) Rework ssh-rand-helper:Damien Miller
- Reduce quantity of ifdef code, in preparation for ssh_rand_conf - Always seed from system calls, even when doing PRNGd seeding - Tidy and comment #define knobs - Remove unused facility for multiple runs through command list - KNF, cleanup, update copyright
2002-01-14 - (djm) Bug #50 - make autoconf entropy path checks more robustDamien Miller
2002-01-08 - (stevesk) defines.h: use "/var/spool/sockets/X11/%u" for HP-UX. doesKevin Steves
not depend on transition links. from Lutz Jaenicke.
2002-01-08 - (djm) Merge Cygwin copy_environment with do_pam_environment, removingDamien Miller
fixed env var size limit in the process. Report from Corinna Vinschen <vinschen@redhat.com>
2002-01-06 - (stevesk) defines.h: determine _PATH_UNIX_X; currently "/tmp/.X11-unix/X%u"Kevin Steves
for all platforms except HP-UX, which is "/usr/spool/sockets/X11/%u".
2002-01-05 - (stevesk) fix spurious ; from NCR change.Kevin Steves
2002-01-05 - (bal) NCR requies use_pipes to operate correctly.Ben Lindstrom
2002-01-03 - (djm) Use bigcrypt() on systems with SCO_PROTECTED_PW. Patch fromDamien Miller
Roger Cornelius <rac@tenzing.org>
2001-12-31test openssh-commits listDamien Miller
2001-12-31testing againDamien Miller
2001-12-29 - (djm) Typo in contrib/cygwin/README Fix from Corinna VinschenDamien Miller
<vinschen@redhat.com>
2001-12-29 - (djm) Apply Cygwin pointer deref fix from Corinna VinschenDamien Miller
<vinschen@redhat.com> Could be abused to guess valid usernames
2001-12-28 - (djm) Remove recommendation to use GNU make, we should support mostDamien Miller
make programs.
2001-12-25 - (stevesk) [Makefile.in ssh-rand-helper.c]Kevin Steves
portable lib and __progname support for ssh-rand-helper; ok djm@
2001-12-24 - (bal) Removed contrib/chroot.diff and noted in contrib/README that itBen Lindstrom
was not being maintained.
2001-12-24 - (djm) Ignore fix & patchlevel in OpenSSL version check. Patch fromDamien Miller
solar@openwall.com - (djm) Rework entropy code. If the OpenSSL PRNG is has not been internally seeded, execute a subprogram "ssh-rand-helper" to obtain some entropy for us. Rewrite the old in-process entropy collecter as an example ssh-rand-helper. - (djm) Always perform ssh_prng_cmds path lookups in configure, even if we don't end up using ssh_prng_cmds (so we always get a valid file)
2001-12-21 - djm@cvs.openbsd.org 2001/12/20 22:50:24Damien Miller
[auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c] [dispatch.h kex.c kex.h packet.c packet.h serverloop.c ssh.c] [sshconnect2.c] Conformance fix: we should send failing packet sequence number when responding with a SSH_MSG_UNIMPLEMENTED message. Spotted by yakk@yakk.dot.net; ok markus@