summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshconnect2.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* more u_* fixesmarkus2002-02-251-3/+3
|
* signed vs. unsigned: make size arguments u_int, ok stevesk@markus2002-02-241-11/+13
|
* more cross checking if announced vs. used key type; ok stevesk@markus2002-02-031-3/+9
|
* unused includemarkus2002-01-251-9/+1
|
* use buffer API and avoid static strings of fixed size; ok provos@/mouring@markus2002-01-131-10/+11
|
* remove plen from the dispatch fn. it's no longer used.markus2001-12-281-13/+13
|
* packet_read* no longer return the packet length, since it's not used.markus2001-12-281-4/+3
|
* s/packet_done/packet_check_eom/ (end-of-message); ok djm@markus2001-12-281-5/+5
|
* Conformance fix: we should send failing packet sequence number whendjm2001-12-201-13/+13
| | | | | responding with a SSH_MSG_UNIMPLEMENTED message. Spotted by yakk@yakk.dot.net; ok markus@
* basic KNF done while i was looking for something elsederaadt2001-12-191-4/+4
|
* minor KNFderaadt2001-12-051-4/+4
|
* make it compile with more strict prototype checkingitojun2001-12-051-13/+13
|
* pad using the padding field from the ssh2 packet instead of sendingmarkus2001-11-071-3/+3
| | | | extra ignore messages. tested against several other ssh servers.
* hostbased: check for client hostkey before building chostmarkus2001-10-291-14/+15
|
* unify hostkey check error messages, simplify prompt.markus2001-10-061-2/+2
|
* disable kbd-interactive if we don't get SSH2_MSG_USERAUTH_INFO_REQUEST messagesmarkus2001-08-311-1/+13
|
* reorder default sequence of userauth methods to match ssh behaviour:markus2001-07-231-9/+9
| | | | hostbased,publickey,keyboard-interactive,password
* add smartcard support to the client, too (now you can use bothmarkus2001-06-261-1/+6
| | | | the agent and the client).
* prototype cleanup; ok markus@stevesk2001-06-251-3/+4
|
* oops, missing format stringmarkus2001-06-241-3/+3
|
* switch to readpassphrase(3)markus2001-06-241-5/+4
| | | | 2.7/8-stable needs readpassphrase.[ch] from libc
* more strict prototypes. raise warning level in Makefile.inc. markus ok'editojun2001-06-231-19/+19
| | | | TODO; cleanup headers
* get rid of known_hosts2, use it for hostkey lookup, but do not modify.markus2001-06-231-5/+5
|
* change preferredauthentication order tomarkus2001-05-191-5/+5
| | | | | publickey,hostbased,password,keyboard-interactive document that hostbased defaults to no, document order
* improved kbd-interactive support. work by per@appgate.com and memarkus2001-05-181-2/+3
|
* more ssh v2 hostbased-auth interop: ssh.com >= 2.1.0 works nowmarkus2001-04-181-10/+6
| | | | (however the 2.1.0 server seems to work only if debug is enabled...)
* use FDQN with trailing dot in the hostbased auth packets, ok deraadt@markus2001-04-181-3/+6
|
* add HostKeyAlgorithms; based on patch from res@shore.net; ok provos@markus2001-04-171-1/+4
|
* some unused variable and typos; from tomh@po.crl.go.jpmarkus2001-04-151-3/+3
|
* implement HostbasedAuthentication (= RhostRSAAuthentication for ssh v2)markus2001-04-121-3/+108
| | | | | similar to RhostRSAAuthentication unless you enable (the experimental) HostbasedUsesNameFromPacketOnly option. please test. :)
* fix whitespace: unexpand + trailing spaces.markus2001-04-051-3/+3
|
* more robust rekeyingmarkus2001-04-041-2/+2
| | | | don't send channel data after rekeying is started.
* enable server side rekeying + some rekey related clientup.markus2001-04-041-7/+3
| | | | todo: we should not send any non-KEX messages after we send KEXINIT
* don't sent multiple kexinit-requests.markus2001-04-041-3/+3
| | | | | send newkeys, block while waiting for newkeys. fix comments.
* enable client rekeyingmarkus2001-04-041-1/+5
| | | | | | (1) force rekeying with ~R, or (2) if the server requests rekeying. works against ssh-2.0.12/2.0.13/2.1.0/2.2.0/2.3.0/2.3.1/2.4.0
* undo parts of recent my changes: main part of keyexchange does notmarkus2001-04-031-1/+4
| | | | | | | need dispatch-callbacks, since application data is delayed until the keyexchange completes (if i understand the drafts correctly). add some infrastructure for re-keying.
* move kex to kex*.c, used dispatch_set() callbacks for kex. shouldmarkus2001-04-031-381/+28
| | | | make rekeying easier.
* need to set both STOC and CTOS for SSH_BUG_BIGENDIANAES; ok markus@stevesk2001-03-291-4/+5
|
* use recommended defaultsprovos2001-03-291-2/+2
|
* forgot to include min and max params in hash, okay markus@provos2001-03-281-2/+9
|
* make dh group exchange more flexible, allow min and max group size,provos2001-03-271-6/+29
| | | | okay markus@, deraadt@
* simpler key load/save interface, see authfile.hmarkus2001-03-261-14/+8
|
* Compat for OpenSSH with broken Rijndael/AES. ok markus@djm2001-03-231-1/+4
|
* remove old key_fingerprint interface, s/_ex//markus2001-03-121-4/+5
|
* add PreferredAuthenticationsmarkus2001-03-101-77/+55
|
* ignore nonexisting private keys; report rjmooney@mediaone.netmarkus2001-03-101-1/+6
|
* implement client side of SSH2_MSG_USERAUTH_PK_OK (test public key ->markus2001-03-081-57/+215
| | | | | no need to do enter passphrase or do expensive sign operations if the server does not accept key).
* generate a 2*need size (~300 instead of 1024/2048) random privatemarkus2001-03-051-4/+4
| | | | | | | | | | | exponent during the DH key agreement. according to Niels (the great german advisor) this is safe since /etc/primes contains strong primes only. References: P. C. van Oorschot and M. J. Wiener, On Diffie-Hellman key agreement with short exponents, In Advances in Cryptology - EUROCRYPT'96, LNCS 1070, Springer-Verlag, 1996, pp.332-343.
* in ssh protocol v2 use ignore messages for padding (instead of trailing \0).markus2001-02-281-3/+5
|
* genericize password padding function for SSH1 and SSH2.markus2001-02-151-3/+3
| | | | add stylized echo to 2, too.