summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshconnect2.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* 64 bit cleanups; markus okderaadt2003-08-241-2/+4
|
* remove support for "kerberos-2@ssh.com"markus2003-08-221-99/+1
|
* support GSS API user authentication; patches from Simon Wilkinson,markus2003-08-221-1/+251
| | | | stripped down and tested by Jakob and myself.
* int -> u_int; ok djm@, deraadt@, mouring@markus2003-06-241-3/+3
|
* cleanup unregister of per-method packet handlers; ok djm@markus2003-05-151-15/+10
|
* implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@markus2003-05-141-1/+100
| | | | server interops with commercial client; ok jakob@ djm@
* for pubkey authentication try the user keys in the following order:markus2003-05-121-146/+190
| | | | | | | | 1. agent keys that are found in the config file 2. other agent keys 3. keys that are only listed in the config file this helps when an agent has many keys, where the server might close the connection before the correct key is used. report & ok pb@
* rename log() into logit() to avoid name conflict. markus ok, from netbsditojun2003-04-081-7/+7
|
* reapply rekeying chage, tested by henning@, ok djm@markus2003-04-021-1/+4
|
* backout rekeying changes (for 3.6.1)markus2003-04-011-4/+1
|
* rekeying bugfixes and automatic rekeying:markus2003-04-011-1/+4
| | | | | | | | | | | | * both client and server rekey _automatically_ (a) after 2^31 packets, because after 2^32 packets the sequence number for packets wraps (b) after 2^(blocksize_in_bits/4) blocks (see: http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt) (a) and (b) are _enabled_ by default, and only disabled for known openssh versions, that don't support rekeying properly. * client option 'RekeyLimit' * do not reply to requests during rekeying
* fix memory leaks; from dlheine@suif.Stanford.EDU/CLOUSEAU; ok djm@markus2003-03-051-1/+2
|
* split kex into client and server code, no need to linkmarkus2003-02-161-1/+3
| | | | server code into the client; ok provos@
* s/msg_send/ssh_msg_send/ to avoid namespace clashes in portable; ok markus@djm2002-12-191-3/+3
|
* cleanup debug messages, more useful information for the client user.markus2002-12-131-13/+12
|
* debug->debug2, unify debug messagesmarkus2002-11-211-8/+6
|
* for compression=yes, we fallback to no-compression if the server doesmarkus2002-07-011-3/+3
| | | | not support compression, vice versa for compression=no. ok mouring@
* minor KNFderaadt2002-06-301-2/+2
|
* various KNF and %d for unsignedderaadt2002-06-231-5/+8
|
* KNF done automatically while reading....deraadt2002-06-191-8/+8
|
* extent ssh-keysign protocol:markus2002-05-311-5/+8
| | | | | | pass # of socket-fd to ssh-keysign, keysign verfies locally used ip-address using this socket-fd, restricts fake local hostnames to actual local hostnames; ok stevesk@
* execlp->execl; from steveskmarkus2002-05-251-2/+2
|
* stat ssh-keysign first, print error if stat fails;markus2002-05-241-14/+15
| | | | some debug->error; fix comment
* add /usr/libexec/ssh-keysign: a setuid helper program for hostbased authenticationmarkus2002-05-231-10/+85
| | | | in protocol v2 (needs to access the hostkeys).
* client side support for PASSWD_CHANGEREQmarkus2002-03-261-2/+75
| | | | based on work by johan.andersson@appgate.com; ok provos@
* KNF whitespacemarkus2002-03-191-2/+2
|
* more u_* fixesmarkus2002-02-251-3/+3
|
* signed vs. unsigned: make size arguments u_int, ok stevesk@markus2002-02-241-11/+13
|
* more cross checking if announced vs. used key type; ok stevesk@markus2002-02-031-3/+9
|
* unused includemarkus2002-01-251-9/+1
|
* use buffer API and avoid static strings of fixed size; ok provos@/mouring@markus2002-01-131-10/+11
|
* remove plen from the dispatch fn. it's no longer used.markus2001-12-281-13/+13
|
* packet_read* no longer return the packet length, since it's not used.markus2001-12-281-4/+3
|
* s/packet_done/packet_check_eom/ (end-of-message); ok djm@markus2001-12-281-5/+5
|
* Conformance fix: we should send failing packet sequence number whendjm2001-12-201-13/+13
| | | | | responding with a SSH_MSG_UNIMPLEMENTED message. Spotted by yakk@yakk.dot.net; ok markus@
* basic KNF done while i was looking for something elsederaadt2001-12-191-4/+4
|
* minor KNFderaadt2001-12-051-4/+4
|
* make it compile with more strict prototype checkingitojun2001-12-051-13/+13
|
* pad using the padding field from the ssh2 packet instead of sendingmarkus2001-11-071-3/+3
| | | | extra ignore messages. tested against several other ssh servers.
* hostbased: check for client hostkey before building chostmarkus2001-10-291-14/+15
|
* unify hostkey check error messages, simplify prompt.markus2001-10-061-2/+2
|
* disable kbd-interactive if we don't get SSH2_MSG_USERAUTH_INFO_REQUEST messagesmarkus2001-08-311-1/+13
|
* reorder default sequence of userauth methods to match ssh behaviour:markus2001-07-231-9/+9
| | | | hostbased,publickey,keyboard-interactive,password
* add smartcard support to the client, too (now you can use bothmarkus2001-06-261-1/+6
| | | | the agent and the client).
* prototype cleanup; ok markus@stevesk2001-06-251-3/+4
|
* oops, missing format stringmarkus2001-06-241-3/+3
|
* switch to readpassphrase(3)markus2001-06-241-5/+4
| | | | 2.7/8-stable needs readpassphrase.[ch] from libc
* more strict prototypes. raise warning level in Makefile.inc. markus ok'editojun2001-06-231-19/+19
| | | | TODO; cleanup headers
* get rid of known_hosts2, use it for hostkey lookup, but do not modify.markus2001-06-231-5/+5
|
* change preferredauthentication order tomarkus2001-05-191-5/+5
| | | | | publickey,hostbased,password,keyboard-interactive document that hostbased defaults to no, document order