summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh-agent.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.markus2001-01-211-8/+7
| | | | rename util.[ch] -> misc.[ch]
* fix select overflow, work by deraadt and me.markus2001-01-111-29/+63
|
* replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'markus2000-12-191-20/+20
| | | | with u_char.
* remove() -> unlink() for consistencymarkus2000-12-191-3/+3
|
* remove redundant spaces; from stevesk@pobox.commarkus2000-12-131-4/+4
|
* extern int optind; from stevesk@sweden.hp.commarkus2000-12-091-2/+3
|
* agents must not dump core, ok niels@markus2000-11-301-2/+9
|
* do not reorder keys if a key is removedmarkus2000-11-141-6/+12
|
* add support for RSA to SSH2. please test.markus2000-11-121-71/+64
| | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
* off-by-one when removing a key from the agentmarkus2000-11-121-4/+8
|
* bug compat for old ssh.com softwaremarkus2000-09-211-3/+8
|
* check return value for setenv(3) for failure, and deal appropriatelyderaadt2000-09-151-4/+7
|
* cleanup copyright notices on all files. I have attempted to be accurate withderaadt2000-09-071-3/+28
| | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
* add a flag to SSH2_AGENTC_SIGN_REQUEST for future extensionsmarkus2000-08-311-2/+3
|
* add SSH2/DSA support to the agent and some other DSA related cleanups.markus2000-08-191-192/+318
| | | | (note that we cannot talk to ssh.com's ssh2 agents)
* make ssh-add accept dsa keys (the agent does not)markus2000-07-161-3/+6
|
* keysize warnings error() -> log()markus2000-04-291-3/+3
|
* Fix memory leak per connection. Report from Andy Spiegl <Andy@Spiegl.de>djm2000-04-211-2/+6
| | | | via Debian bug #59926
* pid_tderaadt2000-04-191-4/+5
|
* whitespace cleanupmarkus2000-04-141-5/+5
|
* #include <ssl/foo.h> -> <openssh/foo.h>markus2000-04-121-3/+3
|
* -pedantic: signed vs. unsigned, void*-arithm, etcmarkus2000-03-161-4/+5
|
* cleanup_exit() for SIGTERM/SIGHUP, too. from fgsch@ and dgaudet@arctic.orgmarkus2000-01-021-2/+4
|
* keysize warnings talk about identity filesmarkus1999-12-151-3/+3
|
* KNF, final part 3markus1999-11-241-13/+20
|
* much more KNFderaadt1999-11-241-19/+14
|
* KNF part 1markus1999-11-231-564/+517
|
* only one 'extern char *__progname'markus1999-11-191-5/+4
|
* more %d vs. %s in fmt-stringsmarkus1999-11-181-3/+3
|
* the keysize of rsa-parameter 'n' is passed implizit,markus1999-11-151-2/+6
| | | | a few more checks and warnings about 'pretended' keysizes.
* replace assert() with error, fatal or packet_disconnectmarkus1999-11-021-3/+8
|
* call setsid() regardless of argv[]markus1999-10-281-5/+11
|
* from niklas: Add -c -s and -k support, Create socket early to avoid race,markus1999-10-281-38/+139
| | | | Don't let child access std{in,out,err}
* ignore sigpipe, do not die if the client (ssh-add, ssh) dies, ok: niklas@markus1999-10-271-1/+10
|
* use libssl md5 routinesderaadt1999-10-271-6/+6
|
* fix old connect() race security-bug for ssh-agent and agent-forwardingmarkus1999-10-141-57/+7
| | | | | | | | | | by removing the connect() junk, with the following restrictions: 1) change the version to "OpenSSH-1.1": agent-forwarding will work only between OpenSSH-1.1 client and OpenSSH-1.1 server 2) renamed the environment variable of OpenSSH-1.1 to "SSH_AUTH_SOCKET", since useing OpenSSH-1.0 ssh-add against the new ssh-agent does not work
* You have Mail. Email fuer Dich. Karsten Patzwaldt <kpa@gmx.net> default=nomarkus1999-10-071-2/+2
|
* move auth-sockets to private dirmarkus1999-10-051-23/+29
| | | | delete minfd residua
* nuke genminfd/AUTH_FDmarkus1999-10-041-93/+41
|
* use SHUT_* symbolsderaadt1999-10-031-5/+5
|
* use libc md5deraadt1999-09-301-3/+4
|
* even smallerderaadt1999-09-301-3/+3
|
* do not bother with dinosaur pacificationderaadt1999-09-301-6/+1
|
* numerous sprintf, strncpy, strcpy cleanupsderaadt1999-09-291-5/+5
|
* test for RSA in the ssl library, real early onderaadt1999-09-291-1/+11
|
* convert all uses of gmp to SSL bignumprovos1999-09-281-62/+95
| | | | | | convert all used of rsa to SSL rsa functions remove all use of randomstate to OpenBSD arc4random() and arc4_stir() all this done at a long long night in Canada.
* i bet a lot of people didn't know what ssh 1.2.16 had a nice license.deraadt1999-09-261-0/+629
well, except for the patent issues. someone in sweden (forget their name at the moment) cleaned out most of the patented code, and now this code removes rsa code. when this is done, it will link against libssl, but the work isn't completely done yet. then we need to bring this up to modern days, featurewise.