summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh-agent.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* free() -> xfree()stevesk2001-04-031-4/+4
|
* try to read private f-secure ssh v2 rsa keys.markus2001-03-261-21/+4
|
* EINTR/EAGAIN handling is required in more casesderaadt2001-03-061-6/+18
|
* make copyright lines the same formatderaadt2001-03-021-3/+3
|
* sync with netbsd tree changes.itojun2001-02-081-3/+3
| | | | | | - more strict prototypes, include necessary headers - use paths.h/pathnames.h decls - size_t typecase to int -> u_long
* handle rsa_private_decrypt failures; helps against the Bleichenbacher pkcs#1 attackmarkus2001-01-291-3/+4
|
* call _exit() in signal handlerderaadt2001-01-251-6/+15
|
* split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.markus2001-01-211-8/+7
| | | | rename util.[ch] -> misc.[ch]
* fix select overflow, work by deraadt and me.markus2001-01-111-29/+63
|
* replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'markus2000-12-191-20/+20
| | | | with u_char.
* remove() -> unlink() for consistencymarkus2000-12-191-3/+3
|
* remove redundant spaces; from stevesk@pobox.commarkus2000-12-131-4/+4
|
* extern int optind; from stevesk@sweden.hp.commarkus2000-12-091-2/+3
|
* agents must not dump core, ok niels@markus2000-11-301-2/+9
|
* do not reorder keys if a key is removedmarkus2000-11-141-6/+12
|
* add support for RSA to SSH2. please test.markus2000-11-121-71/+64
| | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
* off-by-one when removing a key from the agentmarkus2000-11-121-4/+8
|
* bug compat for old ssh.com softwaremarkus2000-09-211-3/+8
|
* check return value for setenv(3) for failure, and deal appropriatelyderaadt2000-09-151-4/+7
|
* cleanup copyright notices on all files. I have attempted to be accurate withderaadt2000-09-071-3/+28
| | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
* add a flag to SSH2_AGENTC_SIGN_REQUEST for future extensionsmarkus2000-08-311-2/+3
|
* add SSH2/DSA support to the agent and some other DSA related cleanups.markus2000-08-191-192/+318
| | | | (note that we cannot talk to ssh.com's ssh2 agents)
* make ssh-add accept dsa keys (the agent does not)markus2000-07-161-3/+6
|
* keysize warnings error() -> log()markus2000-04-291-3/+3
|
* Fix memory leak per connection. Report from Andy Spiegl <Andy@Spiegl.de>djm2000-04-211-2/+6
| | | | via Debian bug #59926
* pid_tderaadt2000-04-191-4/+5
|
* whitespace cleanupmarkus2000-04-141-5/+5
|
* #include <ssl/foo.h> -> <openssh/foo.h>markus2000-04-121-3/+3
|
* -pedantic: signed vs. unsigned, void*-arithm, etcmarkus2000-03-161-4/+5
|
* cleanup_exit() for SIGTERM/SIGHUP, too. from fgsch@ and dgaudet@arctic.orgmarkus2000-01-021-2/+4
|
* keysize warnings talk about identity filesmarkus1999-12-151-3/+3
|
* KNF, final part 3markus1999-11-241-13/+20
|
* much more KNFderaadt1999-11-241-19/+14
|
* KNF part 1markus1999-11-231-564/+517
|
* only one 'extern char *__progname'markus1999-11-191-5/+4
|
* more %d vs. %s in fmt-stringsmarkus1999-11-181-3/+3
|
* the keysize of rsa-parameter 'n' is passed implizit,markus1999-11-151-2/+6
| | | | a few more checks and warnings about 'pretended' keysizes.
* replace assert() with error, fatal or packet_disconnectmarkus1999-11-021-3/+8
|
* call setsid() regardless of argv[]markus1999-10-281-5/+11
|
* from niklas: Add -c -s and -k support, Create socket early to avoid race,markus1999-10-281-38/+139
| | | | Don't let child access std{in,out,err}
* ignore sigpipe, do not die if the client (ssh-add, ssh) dies, ok: niklas@markus1999-10-271-1/+10
|
* use libssl md5 routinesderaadt1999-10-271-6/+6
|
* fix old connect() race security-bug for ssh-agent and agent-forwardingmarkus1999-10-141-57/+7
| | | | | | | | | | by removing the connect() junk, with the following restrictions: 1) change the version to "OpenSSH-1.1": agent-forwarding will work only between OpenSSH-1.1 client and OpenSSH-1.1 server 2) renamed the environment variable of OpenSSH-1.1 to "SSH_AUTH_SOCKET", since useing OpenSSH-1.0 ssh-add against the new ssh-agent does not work
* You have Mail. Email fuer Dich. Karsten Patzwaldt <kpa@gmx.net> default=nomarkus1999-10-071-2/+2
|
* move auth-sockets to private dirmarkus1999-10-051-23/+29
| | | | delete minfd residua
* nuke genminfd/AUTH_FDmarkus1999-10-041-93/+41
|
* use SHUT_* symbolsderaadt1999-10-031-5/+5
|
* use libc md5deraadt1999-09-301-3/+4
|
* even smallerderaadt1999-09-301-3/+3
|
* do not bother with dinosaur pacificationderaadt1999-09-301-6/+1
|