Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | free() -> xfree() | 2001-04-03 | 1 | -4/+4 | ||
| | ||||||
* | try to read private f-secure ssh v2 rsa keys. | 2001-03-26 | 1 | -21/+4 | ||
| | ||||||
* | EINTR/EAGAIN handling is required in more cases | 2001-03-06 | 1 | -6/+18 | ||
| | ||||||
* | make copyright lines the same format | 2001-03-02 | 1 | -3/+3 | ||
| | ||||||
* | sync with netbsd tree changes. | 2001-02-08 | 1 | -3/+3 | ||
| | | | | | | - more strict prototypes, include necessary headers - use paths.h/pathnames.h decls - size_t typecase to int -> u_long | |||||
* | handle rsa_private_decrypt failures; helps against the Bleichenbacher pkcs#1 attack | 2001-01-29 | 1 | -3/+4 | ||
| | ||||||
* | call _exit() in signal handler | 2001-01-25 | 1 | -6/+15 | ||
| | ||||||
* | split ssh.h and try to cleanup the #include mess. remove unnecessary #includes. | 2001-01-21 | 1 | -8/+7 | ||
| | | | | rename util.[ch] -> misc.[ch] | |||||
* | fix select overflow, work by deraadt and me. | 2001-01-11 | 1 | -29/+63 | ||
| | ||||||
* | replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned' | 2000-12-19 | 1 | -20/+20 | ||
| | | | | with u_char. | |||||
* | remove() -> unlink() for consistency | 2000-12-19 | 1 | -3/+3 | ||
| | ||||||
* | remove redundant spaces; from stevesk@pobox.com | 2000-12-13 | 1 | -4/+4 | ||
| | ||||||
* | extern int optind; from stevesk@sweden.hp.com | 2000-12-09 | 1 | -2/+3 | ||
| | ||||||
* | agents must not dump core, ok niels@ | 2000-11-30 | 1 | -2/+9 | ||
| | ||||||
* | do not reorder keys if a key is removed | 2000-11-14 | 1 | -6/+12 | ||
| | ||||||
* | add support for RSA to SSH2. please test. | 2000-11-12 | 1 | -71/+64 | ||
| | | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication. | |||||
* | off-by-one when removing a key from the agent | 2000-11-12 | 1 | -4/+8 | ||
| | ||||||
* | bug compat for old ssh.com software | 2000-09-21 | 1 | -3/+8 | ||
| | ||||||
* | check return value for setenv(3) for failure, and deal appropriately | 2000-09-15 | 1 | -4/+7 | ||
| | ||||||
* | cleanup copyright notices on all files. I have attempted to be accurate with | 2000-09-07 | 1 | -3/+28 | ||
| | | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate. | |||||
* | add a flag to SSH2_AGENTC_SIGN_REQUEST for future extensions | 2000-08-31 | 1 | -2/+3 | ||
| | ||||||
* | add SSH2/DSA support to the agent and some other DSA related cleanups. | 2000-08-19 | 1 | -192/+318 | ||
| | | | | (note that we cannot talk to ssh.com's ssh2 agents) | |||||
* | make ssh-add accept dsa keys (the agent does not) | 2000-07-16 | 1 | -3/+6 | ||
| | ||||||
* | keysize warnings error() -> log() | 2000-04-29 | 1 | -3/+3 | ||
| | ||||||
* | Fix memory leak per connection. Report from Andy Spiegl <Andy@Spiegl.de> | 2000-04-21 | 1 | -2/+6 | ||
| | | | | via Debian bug #59926 | |||||
* | pid_t | 2000-04-19 | 1 | -4/+5 | ||
| | ||||||
* | whitespace cleanup | 2000-04-14 | 1 | -5/+5 | ||
| | ||||||
* | #include <ssl/foo.h> -> <openssh/foo.h> | 2000-04-12 | 1 | -3/+3 | ||
| | ||||||
* | -pedantic: signed vs. unsigned, void*-arithm, etc | 2000-03-16 | 1 | -4/+5 | ||
| | ||||||
* | cleanup_exit() for SIGTERM/SIGHUP, too. from fgsch@ and dgaudet@arctic.org | 2000-01-02 | 1 | -2/+4 | ||
| | ||||||
* | keysize warnings talk about identity files | 1999-12-15 | 1 | -3/+3 | ||
| | ||||||
* | KNF, final part 3 | 1999-11-24 | 1 | -13/+20 | ||
| | ||||||
* | much more KNF | 1999-11-24 | 1 | -19/+14 | ||
| | ||||||
* | KNF part 1 | 1999-11-23 | 1 | -564/+517 | ||
| | ||||||
* | only one 'extern char *__progname' | 1999-11-19 | 1 | -5/+4 | ||
| | ||||||
* | more %d vs. %s in fmt-strings | 1999-11-18 | 1 | -3/+3 | ||
| | ||||||
* | the keysize of rsa-parameter 'n' is passed implizit, | 1999-11-15 | 1 | -2/+6 | ||
| | | | | a few more checks and warnings about 'pretended' keysizes. | |||||
* | replace assert() with error, fatal or packet_disconnect | 1999-11-02 | 1 | -3/+8 | ||
| | ||||||
* | call setsid() regardless of argv[] | 1999-10-28 | 1 | -5/+11 | ||
| | ||||||
* | from niklas: Add -c -s and -k support, Create socket early to avoid race, | 1999-10-28 | 1 | -38/+139 | ||
| | | | | Don't let child access std{in,out,err} | |||||
* | ignore sigpipe, do not die if the client (ssh-add, ssh) dies, ok: niklas@ | 1999-10-27 | 1 | -1/+10 | ||
| | ||||||
* | use libssl md5 routines | 1999-10-27 | 1 | -6/+6 | ||
| | ||||||
* | fix old connect() race security-bug for ssh-agent and agent-forwarding | 1999-10-14 | 1 | -57/+7 | ||
| | | | | | | | | | | by removing the connect() junk, with the following restrictions: 1) change the version to "OpenSSH-1.1": agent-forwarding will work only between OpenSSH-1.1 client and OpenSSH-1.1 server 2) renamed the environment variable of OpenSSH-1.1 to "SSH_AUTH_SOCKET", since useing OpenSSH-1.0 ssh-add against the new ssh-agent does not work | |||||
* | You have Mail. Email fuer Dich. Karsten Patzwaldt <kpa@gmx.net> default=no | 1999-10-07 | 1 | -2/+2 | ||
| | ||||||
* | move auth-sockets to private dir | 1999-10-05 | 1 | -23/+29 | ||
| | | | | delete minfd residua | |||||
* | nuke genminfd/AUTH_FD | 1999-10-04 | 1 | -93/+41 | ||
| | ||||||
* | use SHUT_* symbols | 1999-10-03 | 1 | -5/+5 | ||
| | ||||||
* | use libc md5 | 1999-09-30 | 1 | -3/+4 | ||
| | ||||||
* | even smaller | 1999-09-30 | 1 | -3/+3 | ||
| | ||||||
* | do not bother with dinosaur pacification | 1999-09-30 | 1 | -6/+1 | ||
| |