summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/ssh-agent.c
AgeCommit message (Collapse)Author
2001-04-03free() -> xfree()Kevin Steves
2001-03-26try to read private f-secure ssh v2 rsa keys.Markus Friedl
2001-03-06EINTR/EAGAIN handling is required in more casesTheo de Raadt
2001-03-02make copyright lines the same formatTheo de Raadt
2001-02-08sync with netbsd tree changes.Jun-ichiro itojun Hagino
- more strict prototypes, include necessary headers - use paths.h/pathnames.h decls - size_t typecase to int -> u_long
2001-01-29handle rsa_private_decrypt failures; helps against the Bleichenbacher pkcs#1 ↵Markus Friedl
attack
2001-01-25call _exit() in signal handlerTheo de Raadt
2001-01-21split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.Markus Friedl
rename util.[ch] -> misc.[ch]
2001-01-11fix select overflow, work by deraadt and me.Markus Friedl
2000-12-19replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'Markus Friedl
with u_char.
2000-12-19remove() -> unlink() for consistencyMarkus Friedl
2000-12-13remove redundant spaces; from stevesk@pobox.comMarkus Friedl
2000-12-09extern int optind; from stevesk@sweden.hp.comMarkus Friedl
2000-11-30agents must not dump core, ok niels@Markus Friedl
2000-11-14do not reorder keys if a key is removedMarkus Friedl
2000-11-12add support for RSA to SSH2. please test.Markus Friedl
there are now 3 types of keys: RSA1 is used by ssh-1 only, RSA and DSA are used by SSH2. you can use 'ssh-keygen -t rsa -f ssh2_rsa_file' to generate RSA keys for SSH2 and use the RSA keys for hostkeys or for user keys. SSH2 RSA or DSA keys are added to .ssh/authorised_keys2 as before. IdentityFile2, HostDsaKey and DSAAuthentication are obsolete. you can use multiple IdentityFile and HostKey for all types of keys. the option DSAAuthentication is replaced by PubkeyAuthetication.
2000-11-12off-by-one when removing a key from the agentMarkus Friedl
2000-09-21bug compat for old ssh.com softwareMarkus Friedl
2000-09-15check return value for setenv(3) for failure, and deal appropriatelyTheo de Raadt
2000-09-07cleanup copyright notices on all files. I have attempted to be accurate withTheo de Raadt
the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
2000-08-31add a flag to SSH2_AGENTC_SIGN_REQUEST for future extensionsMarkus Friedl
2000-08-19add SSH2/DSA support to the agent and some other DSA related cleanups.Markus Friedl
(note that we cannot talk to ssh.com's ssh2 agents)
2000-07-16make ssh-add accept dsa keys (the agent does not)Markus Friedl
2000-04-29keysize warnings error() -> log()Markus Friedl
2000-04-21Fix memory leak per connection. Report from Andy Spiegl <Andy@Spiegl.de>Damien Miller
via Debian bug #59926
2000-04-19pid_tTheo de Raadt
2000-04-14whitespace cleanupMarkus Friedl
2000-04-12#include <ssl/foo.h> -> <openssh/foo.h>Markus Friedl
2000-03-16-pedantic: signed vs. unsigned, void*-arithm, etcMarkus Friedl
2000-01-02cleanup_exit() for SIGTERM/SIGHUP, too. from fgsch@ and dgaudet@arctic.orgMarkus Friedl
1999-12-15keysize warnings talk about identity filesMarkus Friedl
1999-11-24KNF, final part 3Markus Friedl
1999-11-24much more KNFTheo de Raadt
1999-11-23KNF part 1Markus Friedl
1999-11-19only one 'extern char *__progname'Markus Friedl
1999-11-18more %d vs. %s in fmt-stringsMarkus Friedl
1999-11-15the keysize of rsa-parameter 'n' is passed implizit,Markus Friedl
a few more checks and warnings about 'pretended' keysizes.
1999-11-02replace assert() with error, fatal or packet_disconnectMarkus Friedl
1999-10-28call setsid() regardless of argv[]Markus Friedl
1999-10-28from niklas: Add -c -s and -k support, Create socket early to avoid race,Markus Friedl
Don't let child access std{in,out,err}
1999-10-27ignore sigpipe, do not die if the client (ssh-add, ssh) dies, ok: niklas@Markus Friedl
1999-10-27use libssl md5 routinesTheo de Raadt
1999-10-14fix old connect() race security-bug for ssh-agent and agent-forwardingMarkus Friedl
by removing the connect() junk, with the following restrictions: 1) change the version to "OpenSSH-1.1": agent-forwarding will work only between OpenSSH-1.1 client and OpenSSH-1.1 server 2) renamed the environment variable of OpenSSH-1.1 to "SSH_AUTH_SOCKET", since useing OpenSSH-1.0 ssh-add against the new ssh-agent does not work
1999-10-07You have Mail. Email fuer Dich. Karsten Patzwaldt <kpa@gmx.net> default=noMarkus Friedl
1999-10-05move auth-sockets to private dirMarkus Friedl
delete minfd residua
1999-10-04nuke genminfd/AUTH_FDMarkus Friedl
1999-10-03use SHUT_* symbolsTheo de Raadt
1999-09-30use libc md5Theo de Raadt
1999-09-30even smallerTheo de Raadt
1999-09-30do not bother with dinosaur pacificationTheo de Raadt