[auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h]
[serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c]
get rid of packet_integrity_check, use packet_done() instead.
+ - markus@cvs.openbsd.org 2001/12/28 12:14:27
+ [auth1.c auth2.c auth2-chall.c auth-rsa.c channels.c clientloop.c]
+ [kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c]
+ [ssh.c sshconnect1.c sshconnect2.c sshd.c]
+ s/packet_done/packet_check_eom/ (end-of-message); ok djm@
+ - markus@cvs.openbsd.org 2001/12/28 13:57:33
+ [auth1.c kexdh.c kexgex.c packet.c packet.h sshconnect1.c sshd.c]
+ packet_get_bignum* no longer returns a size
+ - markus@cvs.openbsd.org 2001/12/28 14:13:13
+ [bufaux.c bufaux.h packet.c]
+ buffer_get_bignum: int -> void
+ - markus@cvs.openbsd.org 2001/12/28 14:50:54
+ [auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c]
+ [packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c]
+ [sshconnect2.c sshd.c]
+ packet_read* no longer return the packet length, since it's not used.
+ - markus@cvs.openbsd.org 2001/12/28 15:06:00
+ [auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c]
+ [dispatch.h kex.c kex.h serverloop.c ssh.c sshconnect2.c]
+ remove plen from the dispatch fn. it's no longer used.
+ - stevesk@cvs.openbsd.org 2001/12/28 22:37:48
+ [ssh.1 sshd.8]
+ document LogLevel DEBUG[123]; ok markus@
+ - stevesk@cvs.openbsd.org 2001/12/29 21:56:01
+ [authfile.c channels.c compress.c packet.c sftp-server.c]
+ [ssh-agent.c ssh-keygen.c]
+ remove unneeded casts and some char->u_char cleanup; ok markus@
+ - stevesk@cvs.openbsd.org 2002/01/03 04:11:08
+ [ssh_config]
+ grammar in comment
+ - stevesk@cvs.openbsd.org 2002/01/04 17:59:17
+ [readconf.c servconf.c]
+ remove #ifdef _PATH_XAUTH/#endif; ok markus@
+ - stevesk@cvs.openbsd.org 2002/01/04 18:14:16
+ [servconf.c sshd.8]
+ protocol 2 HostKey code default is now /etc/ssh_host_rsa_key and
+ /etc/ssh_host_dsa_key like we have in sshd_config. ok markus@
+ - markus@cvs.openbsd.org 2002/01/05 10:43:40
+ [channels.c]
+ fix hanging x11 channels for rejected cookies (e.g.
+ XAUTHORITY=/dev/null xbiff) bug #36, based on patch from
+ djast@cs.toronto.edu
+ - stevesk@cvs.openbsd.org 2002/01/05 21:51:56
+ [ssh.1 sshd.8]
+ some missing and misplaced periods
+ - markus@cvs.openbsd.org 2002/01/09 13:49:27
+ [ssh-keygen.c]
+ append \n only for public keys
+ - markus@cvs.openbsd.org 2002/01/09 17:16:00
+ [channels.c]
+ merge channel_pre_open_15/channel_pre_open_20; ok provos@
+ - markus@cvs.openbsd.org 2002/01/09 17:26:35
+ [channels.c nchan.c]
+ replace buffer_consume(b, buffer_len(b)) with buffer_clear(b);
+ ok provos@
+ - markus@cvs.openbsd.org 2002/01/10 11:13:29
+ [serverloop.c]
+ skip client_alive_check until there are channels; ok beck@
+ - markus@cvs.openbsd.org 2002/01/10 11:24:04
+ [clientloop.c]
+ handle SSH2_MSG_GLOBAL_REQUEST (just reply with failure); ok djm@
+ - markus@cvs.openbsd.org 2002/01/10 12:38:26
+ [nchan.c]
+ remove dead code (skip drain)
+ - markus@cvs.openbsd.org 2002/01/10 12:47:59
+ [nchan.c]
+ more unused code (with channels.c:1.156)
+ - markus@cvs.openbsd.org 2002/01/11 10:31:05
+ [packet.c]
+ handle received SSH2_MSG_UNIMPLEMENTED messages; ok djm@
+ - markus@cvs.openbsd.org 2002/01/11 13:36:43
+ [ssh2.h]
+ add defines for msg type ranges
+ - markus@cvs.openbsd.org 2002/01/11 13:39:36
+ [auth2.c dispatch.c dispatch.h kex.c]
+ a single dispatch_protocol_error() that sends a message of
+ type 'UNIMPLEMENTED'
+ dispatch_range(): set handler for a ranges message types
+ use dispatch_protocol_ignore() for authentication requests after
+ successful authentication (the drafts requirement).
+ serverloop/clientloop now send a 'UNIMPLEMENTED' message instead
+ of exiting.
+ - markus@cvs.openbsd.org 2002/01/11 20:14:11
+ [auth2-chall.c auth-skey.c]
+ use strlcpy not strlcat; mouring@
+ - markus@cvs.openbsd.org 2002/01/11 23:02:18
+ [readpass.c]
+ use _PATH_TTY
+ - markus@cvs.openbsd.org 2002/01/11 23:02:51
+ [auth2-chall.c]
+ use snprintf; mouring@
+ - markus@cvs.openbsd.org 2002/01/11 23:26:30
+ [auth-skey.c]
+ use snprintf; mouring@
+
20020121
- (djm) Rework ssh-rand-helper: