summaryrefslogtreecommitdiff
path: root/usr.bin
AgeCommit message (Collapse)Author
2002-08-17ordered list hereKevin Steves
2002-08-17ForwardAgent has defaulted to no for over 2 years; be more clear here.Kevin Steves
2002-08-15knfTheo de Raadt
2002-08-12more PermitUserEnvironment; ok markus@Kevin Steves
2002-08-12make ssh-agent setgid, disallow ptrace.Markus Friedl
2002-08-12die if FD_SET overruns. (i don't have enough motive to change it to mallocJun-ichiro itojun Hagino
fd_set, rsh should be in graveyard)
2002-08-12Swap args to calloc(3) so they are in the correct order; art@ ok.Aaron Campbell
2002-08-09Get rid of remaining __P usage (except for imported code);Jason Peel
ok millert@, rogue ok pjanzen@
2002-08-09proxy vs. fake displayKevin Steves
2002-08-09use Op for mdoc conformance; from esr@golux.thyrsus.comKevin Steves
ok aaron@
2002-08-09SpellingPaul Janzen
2002-08-09Correct the size arg to memset() so argv will be cleared correctly; art@ ok.Aaron Campbell
2002-08-08typo in commentKevin Steves
2002-08-08implement setenv.Artur Grabowski
2002-08-08Make a good attempt to find the registers for the first frame.Artur Grabowski
2002-08-08Use & to test if bits are set, not &&; markus@ ok.Aaron Campbell
2002-08-08sizeof fname, not sizeof *fnameHakan Olsson
2002-08-083rd arg for open, plus some bounds checking. miod@ ok.Hakan Olsson
2002-08-07dijkstra born, dijkstra diedMichael Shalayeff
2002-08-05dup2() style nit--don't dup2() if oldfd == newfd; espie@ OK.Todd C. Miller
2002-08-05move a few birthdays to the .birthday as pt out by pjanzen@; add a few moreMichael Shalayeff
2002-08-04revoke privs earlierTheo de Raadt
2002-08-04iliya day, no swimming, no-noMichael Shalayeff
2002-08-04now we all know that nautilus was a response to icbm threatMichael Shalayeff
2002-08-04ansi, and revoke privs after opening the ttyTheo de Raadt
2002-08-04ansiTheo de Raadt
2002-08-04spacesTheo de Raadt
2002-08-04only open kvm once between these twoTheo de Raadt
2002-08-04kvm gid revocation earlierTheo de Raadt
2002-08-04move kvm opening to earliest possible placeTheo de Raadt
2002-08-03spell 'debugging' correctly with double 'g' (in comments)Peter Valchev
2002-08-02replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parserMarkus Friedl
for authentication; ok deraadt/djm
2002-08-02diff is u_int (2x); ok deraadt/provosMarkus Friedl
2002-08-02note that .ssh/environment is only read whenMarco S Hyman
allowed (PermitUserEnvironment in sshd_config). OK markus@
2002-08-02Change mm_zalloc() sanity checks to be more in line with whatTodd C. Miller
we do in calloc() and add a check to monitor_mm.c. OK provos@ and markus@
2002-07-31When I got removed the use of atexit() I missed the fact that edit()Todd C. Miller
calls pw_error() which in turn calls exit(). Now edit() returns its status so the temp file gets cleaned up nicely if the user makes no changes or if an error occurred. Problem noticed by deraadt@
2002-07-31use fork, not vfork. seems to fix misterious trapframe trashing on hppa; ↵Michael Shalayeff
deraadt@ ok
2002-07-31Update to correctly deal with link_map.Artur Grabowski
(is link_map really supposed to be so dumb that it doesn't include load offset information?)
2002-07-31unbreak process_getregsArtur Grabowski
2002-07-31Fix error message.Artur Grabowski
2002-07-30add PermitUserEnvironment (off by default!); from dot@dotat.at; ok provos, ↵Markus Friedl
deraadt
2002-07-29print file:lineMarkus Friedl
2002-07-25love, jasonMichael Shalayeff
2002-07-25Obey LDSTATIC when building "generate".Artur Grabowski
2002-07-25use vasprintf() instead of vsnprintf + malloc + vsnprintf hack;idea from deraadtVincent Labrecque
ok art
2002-07-25 replace the ugly and buggy adjustname function by a simple one usingVincent Labrecque
simple APIs. makes mg not crash with 65k filenames... ok art@
2002-07-25this just had to go inHenning Brauer
2002-07-25handle < 0 and such betterTheo de Raadt
2002-07-25FallBackToRsh does not exist anywhere else. Remove it from here. OK deraadt.mouring
2002-07-24print out all known keys for a host if we get a unknown host key,Markus Friedl
see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4 the ssharp mitm tool attacks users in a similar way, so i'd like to pointed out again: A MITM attack is always possible if the ssh client prints: The authenticity of host 'bla' can't be established. (protocol version 2 with pubkey authentication allows you to detect MITM attacks)