Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | make this -Wsign-compare clean; ok avsm@ markus@ | 2005-06-17 | 1 | -16/+17 | ||
| | ||||||
* | make ssh -Wshadow clean, no functional changes | 2004-06-21 | 1 | -5/+5 | ||
| | | | | markus@ ok | |||||
* | implement diffie-hellman-group14-sha1 kex method (trivial extension to | 2004-06-13 | 1 | -1/+3 | ||
| | | | | existing diffie-hellman-group1-sha1); ok markus@ | |||||
* | don't overwrite what we are trying to compute | 2004-05-09 | 1 | -2/+2 | ||
| | ||||||
* | kill some more tiny files; ok deraadt@ | 2004-05-09 | 1 | -1/+34 | ||
| | ||||||
* | unexpand and delete whitespace at EOL; ok markus@ | 2003-11-21 | 1 | -3/+3 | ||
| | ||||||
* | bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@; tested by ho@ and myself | 2003-04-01 | 1 | -2/+3 | ||
| | ||||||
* | split kex into client and server code, no need to link | 2003-02-16 | 1 | -16/+7 | ||
| | | | | server code into the client; ok provos@ | |||||
* | add support for key exchange guesses; based on work by | 2003-02-02 | 1 | -4/+37 | ||
| | | | | avraham.fraenkel@commatch.com; fixes bug #148; ok deraadt@ | |||||
* | debug->debug2, unify debug messages | 2002-11-21 | 1 | -3/+3 | ||
| | ||||||
* | cat to (void) when output from buffer_get_X is ignored | 2002-06-24 | 1 | -3/+3 | ||
| | ||||||
* | 'monitor' variable clashes with at least one lame platform (NeXT). Renamed | 2002-05-15 | 1 | -2/+2 | ||
| | | | | to 'pmonitor'. provos@ | |||||
* | generate a new cookie for each SSH2_MSG_KEXINIT message we send out | 2002-03-26 | 1 | -8/+22 | ||
| | ||||||
* | integrate privilege separated openssh; its turned off by default for now. | 2002-03-18 | 1 | -1/+7 | ||
| | | | | work done by me and markus@ | |||||
* | add some const EVP_MD for openssl-0.9.7 | 2002-02-28 | 1 | -2/+2 | ||
| | ||||||
* | don't allow garbage after payload. | 2002-02-23 | 1 | -1/+2 | ||
| | ||||||
* | hide some more implementation details of cipher.[ch] and prepares for move | 2002-02-14 | 1 | -7/+8 | ||
| | | | | to EVP, ok deraadt@ | |||||
* | restore kexinit handler if we reset the dispatcher, this unbreaks rekeying | 2002-02-11 | 1 | -5/+5 | ||
| | | | | s/kex_clear_dispatch/kex_reset_dispatch/ | |||||
* | use EVP_MD_size(evp_md) and not evp_md->md_size; ok steveks@ | 2002-01-25 | 1 | -2/+2 | ||
| | ||||||
* | a single dispatch_protocol_error() that sends a message of type 'UNIMPLEMENTED' | 2002-01-11 | 1 | -6/+3 | ||
| | | | | | | | dispatch_range(): set handler for a ranges message types use dispatch_protocol_ignore() for authentication requests after successful authentication (the drafts requirement). serverloop/clientloop now send a 'UNIMPLEMENTED' message instead of exiting. | |||||
* | remove plen from the dispatch fn. it's no longer used. | 2001-12-28 | 1 | -4/+4 | ||
| | ||||||
* | packet_read* no longer return the packet length, since it's not used. | 2001-12-28 | 1 | -4/+2 | ||
| | ||||||
* | s/packet_done/packet_check_eom/ (end-of-message); ok djm@ | 2001-12-28 | 1 | -2/+2 | ||
| | ||||||
* | Conformance fix: we should send failing packet sequence number when | 2001-12-20 | 1 | -3/+3 | ||
| | | | | | responding with a SSH_MSG_UNIMPLEMENTED message. Spotted by yakk@yakk.dot.net; ok markus@ | |||||
* | minor KNF | 2001-12-05 | 1 | -3/+3 | ||
| | ||||||
* | update copyright for 2001 | 2001-06-25 | 1 | -2/+2 | ||
| | ||||||
* | more strict prototypes. raise warning level in Makefile.inc. markus ok'ed | 2001-06-23 | 1 | -16/+17 | ||
| | | | | TODO; cleanup headers | |||||
* | allow interop with weaker key generation used by ssh-2.0.x, x < 10 | 2001-04-30 | 1 | -3/+5 | ||
| | ||||||
* | fix whitespace: unexpand + trailing spaces. | 2001-04-05 | 1 | -4/+4 | ||
| | ||||||
* | clear+free keys,iv for rekeying. | 2001-04-04 | 1 | -1/+4 | ||
| | | | | + fix DH mem leaks. ok niels@ | |||||
* | parse full kexinit packet. | 2001-04-04 | 1 | -1/+11 | ||
| | | | | make server-side more robust, too. | |||||
* | more robust rekeying | 2001-04-04 | 1 | -18/+28 | ||
| | | | | don't send channel data after rekeying is started. | |||||
* | enable server side rekeying + some rekey related clientup. | 2001-04-04 | 1 | -9/+22 | ||
| | | | | todo: we should not send any non-KEX messages after we send KEXINIT | |||||
* | don't sent multiple kexinit-requests. | 2001-04-04 | 1 | -11/+11 | ||
| | | | | | send newkeys, block while waiting for newkeys. fix comments. | |||||
* | undo parts of recent my changes: main part of keyexchange does not | 2001-04-03 | 1 | -36/+49 | ||
| | | | | | | | need dispatch-callbacks, since application data is delayed until the keyexchange completes (if i understand the drafts correctly). add some infrastructure for re-keying. | |||||
* | move kex to kex*.c, used dispatch_set() callbacks for kex. should | 2001-04-03 | 1 | -194/+192 | ||
| | | | | make rekeying easier. | |||||
* | prepare for rekeying: move DH code to dh.c | 2001-03-29 | 1 | -109/+1 | ||
| | ||||||
* | forgot to include min and max params in hash, okay markus@ | 2001-03-28 | 1 | -3/+9 | ||
| | ||||||
* | add PreferredAuthentications | 2001-03-10 | 1 | -45/+8 | ||
| | ||||||
* | generate a 2*need size (~300 instead of 1024/2048) random private | 2001-03-05 | 1 | -4/+22 | ||
| | | | | | | | | | | | exponent during the DH key agreement. according to Niels (the great german advisor) this is safe since /etc/primes contains strong primes only. References: P. C. van Oorschot and M. J. Wiener, On Diffie-Hellman key agreement with short exponents, In Advances in Cryptology - EUROCRYPT'96, LNCS 1070, Springer-Verlag, 1996, pp.332-343. | |||||
* | 1) clean up the MAC support for SSH-2 | 2001-02-11 | 1 | -11/+6 | ||
| | | | | | | | 2) allow you to specify the MAC with 'ssh -m' 3) or the 'MACs' keyword in ssh(d)_config 4) add hmac-{md5,sha1}-96 ok stevesk@, provos@ | |||||
* | sync with netbsd tree changes. | 2001-02-08 | 1 | -1/+3 | ||
| | | | | | | - more strict prototypes, include necessary headers - use paths.h/pathnames.h decls - size_t typecase to int -> u_long | |||||
* | unexpand and remove end-of-line whitespace; ok markus@ | 2001-02-04 | 1 | -6/+6 | ||
| | ||||||
* | split ssh.h and try to cleanup the #include mess. remove unnecessary #includes. | 2001-01-21 | 1 | -12/+9 | ||
| | | | | rename util.[ch] -> misc.[ch] | |||||
* | missing free; thanks stevesk@pobox.com | 2001-01-08 | 1 | -1/+2 | ||
| | ||||||
* | fix prototypes; from stevesk@pobox.com | 2000-12-20 | 1 | -2/+2 | ||
| | ||||||
* | replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned' | 2000-12-19 | 1 | -12/+12 | ||
| | | | | with u_char. | |||||
* | compute diffie-hellman in parallel between server and client. okay markus@ | 2000-12-15 | 1 | -5/+9 | ||
| | ||||||
* | add support for RSA to SSH2. please test. | 2000-11-12 | 1 | -5/+7 | ||
| | | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication. | |||||
* | new cipher framework | 2000-10-11 | 1 | -28/+8 | ||
| |