summaryrefslogtreecommitdiff
path: root/packet.c
AgeCommit message (Collapse)Author
2003-09-23 - markus@cvs.openbsd.org 2003/09/19 09:02:02Darren Tucker
[packet.c] buffer_dump only if PACKET_DEBUG is defined; Jedi/Sector One; pr 3471
2003-07-14 - markus@cvs.openbsd.org 2003/07/10 14:42:28Darren Tucker
[packet.c] the 2^(blocksize*2) rekeying limit is too expensive for 3DES, blowfish, etc, so enforce a 1GB limit for small blocksizes.
2003-06-28 - markus@cvs.openbsd.org 2003/06/24 08:23:46Darren Tucker
[auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c] int -> u_int; ok djm@, deraadt@, mouring@
2003-06-11 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52Damien Miller
[packet.c progressmeter.c] mostly ansi cleanup; pval ok
2003-05-14 - (djm) RCSID sync w/ OpenBSDDamien Miller
2003-04-27 - (bal) Bug #541: return; was dropped by mistake. Reported byBen Lindstrom
furrier@iglou.com
2003-04-09 - itojun@cvs.openbsd.org 2003/04/08 20:21:29Damien Miller
[*.c *.h] rename log() into logit() to avoid name conflict. markus ok, from netbsd - (djm) XXX - Performed locally using: "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h" - (djm) Fix up missing include for packet.c
2003-04-09*** empty log message ***Damien Miller
2003-04-09 - (djm) OpenBSD CVS SyncDamien Miller
- markus@cvs.openbsd.org 2003/04/02 09:48:07 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c] [readconf.h serverloop.c sshconnect2.c] reapply rekeying chage, tested by henning@, ok djm@
2003-04-02 - (bal) if IP_TOS is not found or broken don't try to compile inBen Lindstrom
packet_set_tos() function call. bug #527
2003-04-01 - markus@cvs.openbsd.org 2003/04/01 10:10:23Damien Miller
[clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c] [readconf.h serverloop.c sshconnect2.c] rekeying bugfixes and automatic rekeying: * both client and server rekey _automatically_ (a) after 2^31 packets, because after 2^32 packets the sequence number for packets wraps (b) after 2^(blocksize_in_bits/4) blocks (see: draft-ietf-secsh-newmodes-00.txt) (a) and (b) are _enabled_ by default, and only disabled for known openssh versions, that don't support rekeying properly. * client option 'RekeyLimit' * do not reply to requests during rekeying - markus@cvs.openbsd.org 2003/04/01 10:22:21 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c] [readconf.h serverloop.c sshconnect2.c] backout rekeying changes (for 3.6.1)
2002-12-23 - markus@cvs.openbsd.org 2002/12/10 19:47:14Ben Lindstrom
[packet.c] static
2002-12-23 - markus@cvs.openbsd.org 2002/12/10 19:26:50Ben Lindstrom
[packet.c] move tos handling to packet_set_tos; ok provos/henning/deraadt
2002-12-23 - markus@cvs.openbsd.org 2002/11/21 22:45:31Ben Lindstrom
[cipher.c kex.c packet.c sshconnect.c sshconnect2.c] debug->debug2, unify debug messages
2002-11-09 - markus@cvs.openbsd.org 2002/11/04 10:09:51Ben Lindstrom
[packet.c] log before send disconnect; ok djm@
2002-11-09 - markus@cvs.openbsd.org 2002/10/23 10:32:13Ben Lindstrom
[packet.c] use %u for u_int
2002-07-07 - deraadt@cvs.openbsd.org 2002/07/04 08:12:15Ben Lindstrom
[channels.c packet.c] blah blah minor nothing as i read and re-read and re-read...
2002-06-23 - deraadt@cvs.openbsd.org 2002/06/23 21:10:02Ben Lindstrom
[packet.c] packet_get_int() returns unsigned for reason & seqnr
2002-06-21 - markus@cvs.openbsd.org 2002/06/19 18:01:00Ben Lindstrom
[cipher.c monitor.c monitor_wrap.c packet.c packet.h] make the monitor sync the transfer ssh1 session key; transfer keycontext only for RC4 (this is still depends on EVP implementation details and is broken).
2002-06-06 - markus@cvs.openbsd.org 2002/06/04 23:02:06Ben Lindstrom
[packet.c] remove __FUNCTION__
2002-04-26 - (djm) Bug #180: Set ToS bits on IPv4-in-IPv6 mapped addresses. Based onDamien Miller
patch from openssh@misc.tecq.org
2002-03-26 - markus@cvs.openbsd.org 2002/03/24 16:01:13Ben Lindstrom
[packet.c] debug->debug3 for extra padding
2002-03-22 - markus@cvs.openbsd.org 2002/03/19 10:49:35Ben Lindstrom
[auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c sshconnect2.c sshd.c ttymodes.c] KNF whitespace
2002-03-22 - markus@cvs.openbsd.org 2002/03/18 17:16:38Ben Lindstrom
[packet.c packet.h] export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep
2002-03-13Stupid djm commits experimental code to head instead of branchDamien Miller
revert
2002-03-13Import of Niels Provos' 20020312 ssh-complete.diffDamien Miller
PAM, Cygwin and OSF SIA will not work for sure
2002-03-05 - stevesk@cvs.openbsd.org 2002/02/27 21:23:13Ben Lindstrom
[canohost.c channels.c packet.c sshd.c] remove unneeded casts in [gs]etsockopt(); ok markus@
2002-02-26 - markus@cvs.openbsd.org 2002/02/24 16:58:32Ben Lindstrom
[packet.c] make 'cp' unsigned and merge with 'ucp'; ok stevesk@
2002-02-19 - markus@cvs.openbsd.org 2002/02/14 23:41:01Damien Miller
[authfile.c cipher.c cipher.h kex.c kex.h packet.c] hide some more implementation details of cipher.[ch] and prepares for move to EVP, ok deraadt@
2002-02-05 - stevesk@cvs.openbsd.org 2002/01/24 21:13:23Damien Miller
[packet.c] need misc.h for set_nodelay()
2002-02-05 - (djm) OpenBSD CVS SyncDamien Miller
- stevesk@cvs.openbsd.org 2002/01/24 21:09:25 [channels.c misc.c misc.h packet.c] add set_nodelay() to set TCP_NODELAY on a socket (prep for nagle tuning). no nagle changes just yet; ok djm@ markus@
2002-01-22 - stevesk@cvs.openbsd.org 2002/01/18 18:14:17Damien Miller
[authfd.c bufaux.c buffer.c cipher.c packet.c ssh-agent.c ssh-keygen.c] unneeded cast cleanup; ok markus@
2002-01-22 - markus@cvs.openbsd.org 2002/01/11 10:31:05Damien Miller
[packet.c] handle received SSH2_MSG_UNIMPLEMENTED messages; ok djm@
2002-01-22 - stevesk@cvs.openbsd.org 2001/12/29 21:56:01Damien Miller
[authfile.c channels.c compress.c packet.c sftp-server.c ssh-agent.c ssh-keygen.c] remove unneeded casts and some char->u_char cleanup; ok markus@
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 14:50:54Damien Miller
[auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c] packet_read* no longer return the packet length, since it's not used.
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 14:13:13Damien Miller
[bufaux.c bufaux.h packet.c] buffer_get_bignum: int -> void
2002-01-22 - markus@cvs.openbsd.org 2001/12/28 13:57:33Damien Miller
[auth1.c kexdh.c kexgex.c packet.c packet.h sshconnect1.c sshd.c] packet_get_bignum* no longer returns a size
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 20:39:58Damien Miller
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c] get rid of packet_integrity_check, use packet_done() instead.
2002-01-22 - markus@cvs.openbsd.org 2001/12/27 20:39:58Damien Miller
[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c] get rid of packet_integrity_check, use packet_done() instead.
2001-12-21 - djm@cvs.openbsd.org 2001/12/20 22:50:24Damien Miller
[auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c] [dispatch.h kex.c kex.h packet.c packet.h serverloop.c ssh.c] [sshconnect2.c] Conformance fix: we should send failing packet sequence number when responding with a SSH_MSG_UNIMPLEMENTED message. Spotted by yakk@yakk.dot.net; ok markus@
2001-12-21 - stevesk@cvs.openbsd.org 2001/12/19 17:16:13Damien Miller
[authfile.c bufaux.c bufaux.h buffer.c buffer.h packet.c packet.h ssh.c] change the buffer/packet interface to use void* vs. char*; ok markus@
2001-12-21 - deraadt@cvs.openbsd.org 2001/12/19 07:18:56Damien Miller
[auth1.c auth2.c auth2-chall.c auth-bsdauth.c auth.c authfile.c auth.h] [auth-krb4.c auth-rhosts.c auth-skey.c bufaux.c canohost.c channels.c] [cipher.c clientloop.c compat.c compress.c deattack.c key.c log.c mac.c] [match.c misc.c nchan.c packet.c readconf.c rijndael.c rijndael.h scard.c] [servconf.c servconf.h serverloop.c session.c sftp.c sftp-client.c] [sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c] [sshconnect1.c sshconnect2.c sshconnect.c sshd.8 sshd.c sshd_config] [ssh-keygen.c sshlogin.c sshpty.c sshtty.c ttymodes.c uidswap.c] basic KNF done while i was looking for something else
2001-12-06 - deraadt@cvs.openbsd.org 2001/12/05 10:06:12Ben Lindstrom
[authfd.c authfile.c bufaux.c channels.c compat.c kex.c kexgex.c key.c misc.c packet.c servconf.c ssh-agent.c sshconnect2.c sshconnect.c sshd.c ssh-dss.c ssh-keygen.c ssh-rsa.c] minor KNF
2001-12-06 - itojun@cvs.openbsd.org 2001/12/05 03:56:39Ben Lindstrom
[auth1.c auth2.c canohost.c channels.c deattack.c packet.c scp.c sshconnect2.c] make it compile with more strict prototype checking
2001-11-12 - markus@cvs.openbsd.org 2001/11/10 13:37:20Damien Miller
[packet.c] remove extra debug()
2001-11-12 - markus@cvs.openbsd.org 2001/11/07 16:03:17Damien Miller
[packet.c packet.h sshconnect2.c] pad using the padding field from the ssh2 packet instead of sending extra ignore messages. tested against several other ssh servers.
2001-10-03 - markus@cvs.openbsd.org 2001/09/27 11:59:37Ben Lindstrom
[packet.c] missing called=1; chombier@mac.com
2001-07-04 - markus@cvs.openbsd.org 2001/06/25 08:25:41Ben Lindstrom
[channels.c channels.h cipher.c clientloop.c compat.c compat.h hostfile.c kex.c kex.h key.c key.h nchan.c packet.c serverloop.c session.c session.h sftp-server.c ssh-add.c ssh-agent.c uuencode.h] update copyright for 2001
2001-06-25 - itojun@cvs.openbsd.org 2001/06/23 15:12:20Ben Lindstrom
[auth1.c auth2.c auth2-chall.c authfd.c authfile.c auth-rhosts.c canohost.c channels.c cipher.c clientloop.c deattack.c dh.c hostfile.c kex.c kexdh.c kexgex.c key.c nchan.c packet.c radix.c readpass.c scp.c servconf.c serverloop.c session.c sftp.c sftp-client.c sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c sshconnect1.c sshconnect2.c sshconnect.c sshd.c ssh-keygen.c ssh-keyscan.c] more strict prototypes. raise warning level in Makefile.inc. markus ok'ed TODO; cleanup headers
2001-06-21 - markus@cvs.openbsd.org 2001/06/20 13:56:39Ben Lindstrom
[channels.c channels.h clientloop.c packet.c serverloop.c] move from channel_stop_listening to channel_free_all, call channel_free_all before calling waitpid() in serverloop. fixes the utmp handling; report from Lutz.Jaenicke@aet.TU-Cottbus.DE