summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshconnect2.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* 1) clean up the MAC support for SSH-2markus2001-02-111-3/+7
| | | | | | | 2) allow you to specify the MAC with 'ssh -m' 3) or the 'MACs' keyword in ssh(d)_config 4) add hmac-{md5,sha1}-96 ok stevesk@, provos@
* remove some linesmarkus2001-02-101-12/+5
|
* partial success: debug->log; "Permission denied" if no more auth methodsmarkus2001-02-091-3/+3
|
* do not free twice, thanks to /etc/malloc.confmarkus2001-02-091-2/+2
|
* %.30s is too short for IPv6 numeric address. use %.128s for now. markus okitojun2001-02-081-2/+2
|
* do not ask for passphrase in batch mode; report from ejb@ql.orgmarkus2001-02-061-5/+8
|
* unexpand and remove end-of-line whitespace; ok markus@stevesk2001-02-041-11/+11
|
* unusedmarkus2001-01-311-2/+1
|
* rename skey -> challenge response.markus2001-01-221-1/+4
| | | | auto-enable kbd-interactive for ssh2 if challenge-reponse is enabled.
* fix memory leaks in SSH2 key exchange; ok markus@stevesk2001-01-221-1/+7
|
* split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.markus2001-01-211-5/+6
| | | | rename util.[ch] -> misc.[ch]
* dh_new_group() does not return NULL. ok markus@stevesk2001-01-201-3/+2
|
* handle SSH2_MSG_USERAUTH_BANNER; fixes bug when connecting to a server that prints a banner (e.g. /etc/issue.net)markus2001-01-041-2/+16
|
* typomarkus2000-12-271-2/+2
|
* fix prototypes; from stevesk@pobox.commarkus2000-12-201-3/+3
|
* replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'markus2000-12-191-21/+21
| | | | with u_char.
* compute diffie-hellman in parallel between server and client. okay markus@provos2000-12-151-1/+4
|
* support f-secure/ssh.com 2.0.12; ok niels@markus2000-12-031-7/+14
|
* complain about invalid ciphers for ssh1/ssh2, fall back to reasonable defaultsmarkus2000-11-231-9/+4
|
* add support for RSA to SSH2. please test.markus2000-11-121-34/+43
| | | | | | | | | | | | | | | there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
* don't reference freed memory. okay deraadt@provos2000-10-191-7/+8
|
* OpenSSH_2.3; note that is is not complete, but the version number needs to be changed for interoperability reasonsmarkus2000-10-141-5/+5
|
* enable DES in SSH-1 clients onlymarkus2000-10-121-1/+3
|
* new cipher frameworkmarkus2000-10-111-11/+9
|
* add support for s/key (kbd-interactive) to ssh2, based on work by mkiernan@avantgo.com and memarkus2000-10-111-24/+138
|
* First rough implementation of the diffie-hellman group exchange. Theprovos2000-10-111-56/+243
| | | | | | client can ask the server for bigger groups to perform the diffie-hellman in, thus increasing the attack complexity when using ciphers with longer keys. University of Windsor provided network, T the company.
* use key_type()markus2000-09-271-3/+3
|
* change login logic in ssh2, allows plugin of other auth methodsmarkus2000-09-211-120/+319
|
* fix DEBUG_KEXDHmarkus2000-09-171-5/+8
|
* cleanup copyright notices on all files. I have attempted to be accurate withderaadt2000-09-071-6/+1
| | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
* add SSH2/DSA support to the agent and some other DSA related cleanups.markus2000-08-191-11/+67
| | | | (note that we cannot talk to ssh.com's ssh2 agents)
* make ssh-add accept dsa keys (the agent does not)markus2000-07-161-30/+43
|
* missing free; nuke old commentmarkus2000-06-211-3/+4
|
* make userauth+pubkey interop with ssh.com-2.2.0markus2000-06-191-4/+11
|
* teach protocol v2 to count login failures properly and also enable antodd2000-06-021-2/+5
| | | | | explanation of why the password prompt comes up again like v1; this is NOT crypto
* typo, unusedmarkus2000-05-311-2/+1
|
* split kexinit/kexdh, factor out common codemarkus2000-05-251-80/+57
|
* bug compat w/ ssh-2.0.13 x11, split out bugsmarkus2000-05-081-3/+18
|
* complain about invalid ciphers in SSH1 (e.g. arcfour is SSH2 only)markus2000-05-081-7/+8
|
* make x11-fwd interop w/ ssh-2.0.13markus2000-05-071-2/+2
|
* add DSAAuthetication option to ssh/sshd, document SSH2 in sshd.8markus2000-05-061-2/+2
|
* respect number_of_password_promptsmarkus2000-05-031-1/+5
|
* check whether file exists before asking for passphrasemarkus2000-05-011-3/+8
|
* less debug, respect .ssh/configmarkus2000-04-271-9/+8
|
* xfree DSA blobsmarkus2000-04-271-1/+3
|
* remove debugmarkus2000-04-261-3/+1
|
* split auth/sshconnect in one file per protocol versionmarkus2000-04-261-0/+450