Age | Commit message (Collapse) | Author | |
---|---|---|---|
2000-10-14 | do not send RSA challenge if key is not allowed by key-options; from ↵ | Markus Friedl | |
eivind@ThinkSec.com | |||
2000-10-11 | clear auth options unless auth sucessfull | Markus Friedl | |
2000-10-03 | move fake-auth from auth1.c to individual auth methods, disables s/key in ↵ | Markus Friedl | |
debug-msg | |||
2000-09-07 | some more Copyright fixes | Markus Friedl | |
2000-09-07 | cleanup copyright notices on all files. I have attempted to be accurate with | Theo de Raadt | |
the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate. | |||
2000-07-07 | clean code is good code | Todd T. Fries | |
2000-06-20 | OpenBSD tag | Markus Friedl | |
2000-06-18 | split auth-rsa option parsing into auth-options | Markus Friedl | |
add options support to authorized_keys2 | |||
2000-06-06 | fix match_hostname() logic for auth-rsa: deny access if we have a negative ↵ | Markus Friedl | |
match or no match at all | |||
2000-04-29 | keysize warnings error() -> log() | Markus Friedl | |
2000-04-26 | missing fclose | Markus Friedl | |
2000-04-14 | whitespace cleanup | Markus Friedl | |
2000-04-12 | #include <ssl/foo.h> -> <openssh/foo.h> | Markus Friedl | |
2000-03-23 | initial support for DSA keys. ok deraadt@, niels@ | Markus Friedl | |
2000-02-11 | delay MD5 computation until client sends response, free() early, cleanup. | Markus Friedl | |
2000-01-18 | fix user/1056, sshd keeps restrictions; dbt@meat.net | Markus Friedl | |
1999-12-02 | warn only about mismatch if key is _used_ | Markus Friedl | |
1999-12-02 | warn about keysize-mismatch with log() not error() | Markus Friedl | |
1999-11-24 | KNF, final part 3 | Markus Friedl | |
1999-11-24 | much more KNF | Theo de Raadt | |
1999-11-23 | KNF part 1 | Markus Friedl | |
1999-11-22 | syslog changes: | Markus Friedl | |
* Unified Logmessage for all auth-types, for success and for failed * Standard connections get only ONE line in the LOG when level==LOG: Auth-attempts are logged only, if authentication is: a) successfull or b) with passwd or c) we had more than AUTH_FAIL_LOG failues * many log() became verbose() * old behaviour with level=VERBOSE | |||
1999-11-18 | more %d vs. %s in fmt-strings | Markus Friedl | |
1999-11-15 | the keysize of rsa-parameter 'n' is passed implizit, | Markus Friedl | |
a few more checks and warnings about 'pretended' keysizes. | |||
1999-11-11 | make all access to options via 'extern Options options' | Markus Friedl | |
and 'extern ServerOptions options' respectively; options are no longer passed as arguments: * make options handling more consistent * remove #include "readconf.h" from ssh.h * readconf.h is only included if necessary | |||
1999-11-02 | replace assert() with error, fatal or packet_disconnect | Markus Friedl | |
1999-10-27 | use libssl md5 routines | Theo de Raadt | |
1999-10-18 | the session key is only the least significant 256-bits, mask the rest away | Niels Provos | |
1999-10-11 | make sure ~/.ssh/authorized_keys is not writable for group/world (sshd) | Markus Friedl | |
don't load private keys if they are group/world-{rwx} (ssh,sshd and ssh-add) | |||
1999-09-30 | use libc md5 | Theo de Raadt | |
1999-09-29 | numerous sprintf, strncpy, strcpy cleanups | Theo de Raadt | |
1999-09-28 | convert all uses of gmp to SSL bignum | Niels Provos | |
convert all used of rsa to SSL rsa functions remove all use of randomstate to OpenBSD arc4random() and arc4_stir() all this done at a long long night in Canada. |