summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
* allow some additional control over the use of ssh-askpassdjm2020-07-141-1/+6
| | | | | via $SSH_ASKPASS_REQUIRE, including force-enable/disable. bz#69 ok markus@
* move client/server SSH-* banners to buffers under ssh->kex and factordjm2018-12-271-1/+5
| | | | | | | | | | | out the banner exchange. This eliminates some common code from the client and server. Also be more strict about handling \r characters - these should only be accepted immediately before \n (pointed out by Jann Horn). Inspired by a patch from Markus Schmidt. (lots of) feedback and ok markus@
* switch config file parsing to getline(3) as this avoids static limitsmarkus2018-06-061-8/+1
| | | | noted by gerhard@; ok dtucker@, djm@
* Refuse RSA keys <1024 bits in length. Improve reporting for keys thatdjm2017-05-071-4/+1
| | | | do not meet this requirement. ok markus@
* remove miscellaneous SSH1 leftovers; ok markus@naddy2017-05-031-2/+2
|
* exterminate the -1 flag from scpdjm2017-04-301-2/+2
| | | | ok markus@
* remove KEY_RSA1djm2017-04-301-2/+2
| | | | ok markus@
* use SSH_MAX_PUBKEY_BYTES consistently as buffer size when reading keydjm2015-12-111-2/+2
| | | | files. Increase it to match the size of the buffers already being used.
* add ssh_config CertificateFile option to explicitly listdjm2015-09-241-1/+7
| | | | a certificate; patch from Meghana Bhat on bz#2436; ok markus@
* backout SSH_RSA_MINIMUM_MODULUS_SIZE increase for this release;djm2015-08-041-2/+2
| | | | problems spotted by sthen@ ok deraadt@ markus@
* refuse to generate or accept RSA keys smaller than 1024 bits;djm2015-07-031-2/+2
| | | | feedback and ok dtucker@
* bz#1327: remove hardcoded limit of 100 permitopen clauses and portdjm2010-06-251-4/+1
| | | | forwards per direction; ok markus@ stevesk@
* almost entirely get rid of the culture of ".h files that include .h files"deraadt2006-08-031-6/+1
| | | | | ok djm, sort of ok stevesk makes the pain stop in one easy step
* standardise spacing in $OpenBSD$ tags; requested by deraadt@djm2006-03-251-1/+1
|
* Discard over-length authorized_keys entries rather than complaining whendtucker2004-12-061-1/+8
| | | | they don't decode. bz #884, with & ok djm@
* use SSH_LISTEN_BACKLOG (=128) in listen(2).markus2003-12-021-1/+4
|
* rm whitespacemarkus2003-09-011-2/+1
|
* remove (already disabled) KRB4/AFS support, re-enable -k in ssh(1);markus2003-07-221-4/+1
| | | | test+ok henning@
* deal with typing of write vs read in atomicioderaadt2003-06-281-1/+2
|
* correct commentstevesk2002-06-221-3/+3
|
* compatiblity -> compatibilityderaadt2002-06-031-2/+2
| | | | | | decriptor -> descriptor authentciated -> authenticated transmition -> transmission
* typo in commentstevesk2002-05-111-2/+2
|
* move to sshd.sshd insteadderaadt2002-05-081-2/+2
|
* use ssh uidderaadt2002-05-071-2/+2
|
* make RSA modulus minimum #define; ok markus@stevesk2002-03-291-1/+4
|
* for unprivileged user, group do:stevesk2002-03-201-1/+8
| | | | pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
* $OpenBSD$ and RCSID() cleanup: don't use RCSID() in .h files; addstevesk2002-03-041-2/+2
| | | | | missing RCSID() to .c files and remove dup /*$OpenBSD$*/ from .c files. ok markus@
* don't perform escape processing when ``EscapeChar none''; ok markus@stevesk2001-05-241-1/+4
|
* nuke commentmarkus2001-01-231-4/+1
|
* split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.markus2001-01-211-266/+3
| | | | rename util.[ch] -> misc.[ch]
* move ssh1 definitions to ssh1.h, pathnames to pathnames.hmarkus2001-01-191-161/+4
|
* only auth-chall.c needs #ifdef SKEYmarkus2001-01-191-7/+1
|
* log() is at pri=LOG_INFO, since LOG_NOTICE goes to /dev/console on many systemsmarkus2001-01-181-2/+2
|
* rename SYSLOG_LEVEL_INFO->SYSLOG_LEVEL_NOTICEmarkus2001-01-071-2/+2
| | | | | | syslog priority changes: fatal() LOG_ERR -> LOG_CRIT log() LOG_INFO -> LOG_NOTICE
* replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'markus2000-12-191-5/+5
| | | | with u_char.
* print keytype when generating a key.markus2000-11-251-1/+2
| | | | reasonable defaults for RSA1/RSA/DSA keys.
* new cipher frameworkmarkus2000-10-111-9/+1
|
* add support for s/key (kbd-interactive) to ssh2, based on work by mkiernan@avantgo.com and memarkus2000-10-111-2/+2
|
* First rough implementation of the diffie-hellman group exchange. Theprovos2000-10-111-1/+2
| | | | | | client can ask the server for bigger groups to perform the diffie-hellman in, thus increasing the attack complexity when using ciphers with longer keys. University of Windsor provided network, T the company.
* multiple debug levelsmarkus2000-09-121-2/+6
|
* cleanup copyright notices on all files. I have attempted to be accurate withderaadt2000-09-071-7/+6
| | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
* support for ~. in ssh2markus2000-08-191-2/+2
|
* allow multiple whitespace but only one '=' between tokens, bug report fromprovos2000-07-131-1/+4
| | | | Ralf S. Engelschall <rse@engelschall.com> but different fix. okay deraadt@
* OpenBSD tagmarkus2000-06-201-1/+1
|
* enable nonblocking IO for sshd w/ proto 1, too; split out common codemarkus2000-05-171-1/+7
|
* complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)markus2000-05-081-1/+2
|
* replace broken uuencode w/ libc b64_ntopmarkus2000-05-041-2/+2
|
* s/DsaKey/HostDSAKey/, document optionmarkus2000-05-031-2/+2
|
* default DSA key file ~/.ssh/id_dsamarkus2000-05-021-1/+2
|
* host key becomes /etc/ssh_host_dsa_keyderaadt2000-04-261-2/+2
|