summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshconnect1.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* check for key!=NULL, thanks to costamarkus2001-04-171-2/+2
|
* implement HostbasedAuthentication (= RhostRSAAuthentication for ssh v2)markus2001-04-121-10/+10
| | | | | similar to RhostRSAAuthentication unless you enable (the experimental) HostbasedUsesNameFromPacketOnly option. please test. :)
* simpler key load/save interface, see authfile.hmarkus2001-03-261-15/+15
|
* implement client side of SSH2_MSG_USERAUTH_PK_OK (test public key ->markus2001-03-081-2/+3
| | | | | no need to do enter passphrase or do expensive sign operations if the server does not accept key).
* genericize password padding function for SSH1 and SSH2.markus2001-02-151-17/+3
| | | | add stylized echo to 2, too.
* fix xmalloc(0), ok dugsong@markus2001-02-121-2/+2
|
* mitigate SSH1 traffic analysis - from Solar Designer <solar@openwall.com>, ok provos@dugsong2001-02-081-3/+17
|
* sync with netbsd tree changes.itojun2001-02-081-5/+5
| | | | | | - more strict prototypes, include necessary headers - use paths.h/pathnames.h decls - size_t typecase to int -> u_long
* %.30s is too short for IPv6 numeric address. use %.128s for now. markus okitojun2001-02-081-2/+2
|
* make ReverseMappingCheck optional in sshd_config; ok djm@,dugsong@markus2001-02-031-4/+4
|
* handle rsa_private_decrypt failures; helps against the Bleichenbacher pkcs#1 attackmarkus2001-01-291-4/+7
|
* rename skey -> challenge response.markus2001-01-221-9/+9
| | | | auto-enable kbd-interactive for ssh2 if challenge-reponse is enabled.
* only AFS needs radix.[ch]markus2001-01-221-2/+2
|
* split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.markus2001-01-211-5/+15
| | | | rename util.[ch] -> misc.[ch]
* move ssh1 definitions to ssh1.h, pathnames to pathnames.hmarkus2001-01-191-1/+2
|
* 1) removes fake skey from sshd, since this will be muchmarkus2001-01-181-2/+3
| | | | | | | harder with /usr/libexec/auth/login_XXX 2) share/unify code used in ssh-1 and ssh-2 authentication (server side) 3) make addition of BSD_AUTH and other challenge reponse methods easier.
* indentderaadt2001-01-161-4/+4
|
* more cleanups and fixes from stevesk@pobox.com:markus2001-01-081-2/+5
| | | | | | | | 1) try_agent_authentication() for loop will overwrite key just allocated with key_new(); don't alloc 2) call ssh_close_authentication_connection() before exit try_agent_authentication() 3) free mem on bad passphrase in try_rsa_authentication()
* replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'markus2000-12-191-16/+16
| | | | with u_char.
* always request new challenge for skey/tis-auth, fixes interop withmarkus2000-12-101-26/+30
| | | | other implementations; report from roth@feep.net
* reorder check for illegal ciphers, bugreport from espie@markus2000-11-251-5/+5
|
* complain about invalid ciphers for ssh1/ssh2, fall back to reasonable defaultsmarkus2000-11-231-2/+3
|
* add support for RSA to SSH2. please test.markus2000-11-121-6/+7
| | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
* enable DES in SSH-1 clients onlymarkus2000-10-121-2/+2
|
* new cipher frameworkmarkus2000-10-111-10/+3
|
* cleanup copyright notices on all files. I have attempted to be accurate withderaadt2000-09-071-2/+6
| | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
* add SSH2/DSA support to the agent and some other DSA related cleanups.markus2000-08-191-21/+19
| | | | (note that we cannot talk to ssh.com's ssh2 agents)
* make ssh-add accept dsa keys (the agent does not)markus2000-07-161-2/+2
|
* complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)markus2000-05-081-4/+8
|
* replace broken uuencode w/ libc b64_ntopmarkus2000-05-041-3/+3
|
* split auth/sshconnect in one file per protocol versionmarkus2000-04-261-0/+1020