summaryrefslogtreecommitdiff
path: root/usr.bin/ssh
AgeCommit message (Expand)Author
2002-01-12undo local changeMarkus Friedl
2002-01-11use snprintf; mouring@Markus Friedl
2002-01-11use snprintf; mouring@Markus Friedl
2002-01-11use _PATH_TTYMarkus Friedl
2002-01-11use strlcpy not strlcat; mouring@Markus Friedl
2002-01-11a single dispatch_protocol_error() that sends a message of type 'UNIMPLEMENTED'Markus Friedl
2002-01-11add defines for msg type rangesMarkus Friedl
2002-01-11handle received SSH2_MSG_UNIMPLEMENTED messages; ok djm@Markus Friedl
2002-01-10more unused code (with channels.c:1.156)Markus Friedl
2002-01-10remove dead code (skip drain)Markus Friedl
2002-01-10handle SSH2_MSG_GLOBAL_REQUEST (just reply with failure); ok djm@Markus Friedl
2002-01-10skip client_alive_check until there are channels; ok beck@Markus Friedl
2002-01-09replace buffer_consume(b, buffer_len(b)) with buffer_clear(b); ok provos@Markus Friedl
2002-01-09merge channel_pre_open_15/channel_pre_open_20; ok provos@Markus Friedl
2002-01-09append \n only for public keysMarkus Friedl
2002-01-05some missing and misplaced periodsKevin Steves
2002-01-05fix hanging x11 channels for rejected cookies (e.g. XAUTHORITY=/dev/null xbiff)Markus Friedl
2002-01-04protocol 2 HostKey code default is now /etc/ssh_host_rsa_key andKevin Steves
2002-01-04remove #ifdef _PATH_XAUTH/#endif; ok markus@Kevin Steves
2002-01-03grammar in commentKevin Steves
2001-12-29remove unneeded casts and some char->u_char cleanup; ok markus@Kevin Steves
2001-12-28document LogLevel DEBUG[123]; ok markus@Kevin Steves
2001-12-28remove plen from the dispatch fn. it's no longer used.Markus Friedl
2001-12-28packet_read* no longer return the packet length, since it's not used.Markus Friedl
2001-12-28buffer_get_bignum: int -> voidMarkus Friedl
2001-12-28packet_get_bignum* no longer returns a sizeMarkus Friedl
2001-12-28s/packet_done/packet_check_eom/ (end-of-message); ok djm@Markus Friedl
2001-12-27get rid of packet_integrity_check, use packet_done() instead.Markus Friedl
2001-12-27auth_rhosts_rsa now accept generic keys.Markus Friedl
2001-12-27always use BN_clear_free instead of BN_freeMarkus Friedl
2001-12-27missing includeMarkus Friedl
2001-12-27clarify -p; ok markus@Kevin Steves
2001-12-27call fatal() for openssl allocation failuresMarkus Friedl
2001-12-27-t is only needed for key generation (unbreaks -i, -e, etc).Markus Friedl
2001-12-25be more carefull on allocationMarkus Friedl
2001-12-25be more careful on allocationMarkus Friedl
2001-12-24try all listed keys.. how did this get broken?Theo de Raadt
2001-12-21remove ifdef for USE_PIPES since fdin != fdout; ok djm@Markus Friedl
2001-12-21Try all standard key files (id_rsa, id_dsa, identity) when invoked withDamien Miller
2001-12-21Avoid interruptable passphrase read; ok markus@Damien Miller
2001-12-21Remove default (rsa1) key type; ok markus@Damien Miller
2001-12-20Conformance fix: we should send failing packet sequence number whenDamien Miller
2001-12-20setup x11 listen socket for just one connect if the client requests so.Markus Friedl
2001-12-19change the buffer/packet interface to use void* vs. char*; ok markus@Kevin Steves
2001-12-19fix race between SIGCHLD and select with an additional pipe. writingMarkus Friedl
2001-12-19handle utsname.nodename case for FamilyLocal X authorization; ok markus@Kevin Steves
2001-12-19basic KNF done while i was looking for something elseTheo de Raadt
2001-12-18log fingerprint on successful public key authentication, simplify usage of ke...Jakob Schlyter
2001-12-18log fingerprint on successful public key authentication; ok markus@Jakob Schlyter
2001-12-18remove auth_rsa_read_key, make hostfile_ready_key non static; ok markus@Jakob Schlyter