]>
andersk Git - openssh.git/log
djm [Sat, 22 Apr 2006 11:26:08 +0000 (11:26 +0000)]
- (djm) [Makefile.in configure.ac session.c sshpty.c]
[contrib/redhat/sshd.init openbsd-compat/Makefile.in]
[openbsd-compat/openbsd-compat.h openbsd-compat/port-linux.c]
[openbsd-compat/port-linux.h] Add support for SELinux, setting
the execution and TTY contexts. based on patch from Daniel Walsh,
bz #880; ok dtucker@
djm [Tue, 18 Apr 2006 05:13:16 +0000 (05:13 +0000)]
- (djm) Reorder IP options check so that it isn't broken by
mapped addresses; bz #1179 reported by markw wtech-llc.com;
ok dtucker@
djm [Fri, 31 Mar 2006 12:14:57 +0000 (12:14 +0000)]
- djm@cvs.openbsd.org 2006/03/31 09:13:56
[ssh_config.5]
remote user escape is %r not %h; spotted by jmc@
djm [Fri, 31 Mar 2006 12:14:41 +0000 (12:14 +0000)]
- jmc@cvs.openbsd.org 2006/03/31 09:09:30
[ssh_config.5]
kill trailing whitespace;
djm [Fri, 31 Mar 2006 12:14:23 +0000 (12:14 +0000)]
- dtucker@cvs.openbsd.org 2006/03/30 11:40:21
[auth.c monitor.c]
Prevent duplicate log messages when privsep=yes; ok djm@
djm [Fri, 31 Mar 2006 12:13:35 +0000 (12:13 +0000)]
- dtucker@cvs.openbsd.org 2006/03/30 11:05:17
[ssh-keygen.c]
Correctly handle truncated files while converting keys; ok djm@
djm [Fri, 31 Mar 2006 12:13:21 +0000 (12:13 +0000)]
- djm@cvs.openbsd.org 2006/03/30 10:41:25
[ssh.c ssh_config.5]
add percent escape chars to the IdentityFile option, bz #1159 based
on a patch by imaging AT math.ualberta.ca; feedback and ok dtucker@
djm [Fri, 31 Mar 2006 12:13:02 +0000 (12:13 +0000)]
- djm@cvs.openbsd.org 2006/03/30 09:58:16
[authfd.c bufaux.c deattack.c gss-serv.c mac.c misc.c misc.h]
[monitor_wrap.c msg.c packet.c sftp-client.c sftp-server.c ssh-agent.c]
replace {GET,PUT}_XXBIT macros with functionally similar functions,
silencing a heap of lint warnings. also allows them to use
__bounded__ checking which can't be applied to macros; requested
by and feedback from deraadt@
djm [Fri, 31 Mar 2006 12:11:44 +0000 (12:11 +0000)]
- djm@cvs.openbsd.org 2006/03/30 09:41:25
[channels.c]
ARGSUSED for dispatch table-driven functions
djm [Fri, 31 Mar 2006 12:11:28 +0000 (12:11 +0000)]
- deraadt@cvs.openbsd.org 2006/03/28 01:53:43
[ssh-agent.c]
use strtonum() to parse the pid from the file, and range check it
better; ok djm
djm [Fri, 31 Mar 2006 12:11:07 +0000 (12:11 +0000)]
- deraadt@cvs.openbsd.org 2006/03/28 01:52:28
[channels.c]
do not accept unreasonable X ports numbers; ok djm
djm [Fri, 31 Mar 2006 12:10:51 +0000 (12:10 +0000)]
- deraadt@cvs.openbsd.org 2006/03/28 00:12:31
[README.tun ssh.c]
spacing
djm [Fri, 31 Mar 2006 12:10:31 +0000 (12:10 +0000)]
- djm@cvs.openbsd.org 2006/03/27 23:15:46
[sftp.c]
always use a format string for addargs; spotted by mouring@
djm [Fri, 31 Mar 2006 12:09:41 +0000 (12:09 +0000)]
- deraadt@cvs.openbsd.org 2006/03/27 13:03:54
[dh.c]
use strtonum() instead of atoi(), limit dhg size to 64k; ok djm
djm [Fri, 31 Mar 2006 12:09:17 +0000 (12:09 +0000)]
- OpenBSD CVS Sync
- deraadt@cvs.openbsd.org 2006/03/27 01:21:18
[xmalloc.c]
we can do the size & nmemb check before the integer overflow check;
evol
djm [Sun, 26 Mar 2006 03:30:33 +0000 (03:30 +0000)]
- deraadt@cvs.openbsd.org 2006/03/26 01:31:48
[uuencode.c]
typo
djm [Sun, 26 Mar 2006 03:30:00 +0000 (03:30 +0000)]
- djm@cvs.openbsd.org 2006/03/25 22:22:43
[atomicio.h auth-options.h auth.h auth2-gss.c authfd.h authfile.h]
[bufaux.h buffer.h canohost.h channels.h cipher.h clientloop.h]
[compat.h compress.h crc32.c crc32.h deattack.h dh.h dispatch.h]
[dns.c dns.h getput.h groupaccess.h gss-genr.c gss-serv-krb5.c]
[gss-serv.c hostfile.h includes.h kex.h key.h log.h mac.h match.h]
[misc.h monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h msg.h]
[myproposal.h packet.h pathnames.h progressmeter.h readconf.h rsa.h]
[scard.h servconf.h serverloop.h session.h sftp-common.h sftp.h]
[ssh-gss.h ssh.h ssh1.h ssh2.h sshconnect.h sshlogin.h sshpty.h]
[ttymodes.h uidswap.h uuencode.h xmalloc.h]
standardise spacing in $OpenBSD$ tags; requested by deraadt@
djm [Sun, 26 Mar 2006 03:29:06 +0000 (03:29 +0000)]
- deraadt@cvs.openbsd.org 2006/03/25 18:58:10
[channels.c]
delete cast not required
djm [Sun, 26 Mar 2006 03:28:50 +0000 (03:28 +0000)]
- deraadt@cvs.openbsd.org 2006/03/25 18:56:55
[bufaux.c channels.c packet.c]
remove (char *) casts to a function that accepts void * for the arg
djm [Sun, 26 Mar 2006 03:28:32 +0000 (03:28 +0000)]
- deraadt@cvs.openbsd.org 2006/03/25 18:43:30
[channels.c]
use strtonum() instead of atoi() [limit X screens to 400, sorry]
djm [Sun, 26 Mar 2006 03:28:14 +0000 (03:28 +0000)]
- deraadt@cvs.openbsd.org 2006/03/25 18:41:45
[ssh-agent.c]
mark two more signal handlers ARGSUSED
djm [Sun, 26 Mar 2006 03:27:57 +0000 (03:27 +0000)]
- deraadt@cvs.openbsd.org 2006/03/25 18:40:14
[ssh-keygen.c]
cast strtonum() result to right type
djm [Sun, 26 Mar 2006 03:27:35 +0000 (03:27 +0000)]
- deraadt@cvs.openbsd.org 2006/03/25 18:36:15
[sshlogin.c sshlogin.h]
nicer size_t and time_t types
djm [Sun, 26 Mar 2006 03:25:37 +0000 (03:25 +0000)]
- deraadt@cvs.openbsd.org 2006/03/25 18:30:55
[clientloop.c serverloop.c]
spacing
djm [Sun, 26 Mar 2006 03:25:19 +0000 (03:25 +0000)]
- deraadt@cvs.openbsd.org 2006/03/25 18:29:35
[auth-rsa.c authfd.c packet.c]
needed casts (always will be needed)
djm [Sun, 26 Mar 2006 03:25:05 +0000 (03:25 +0000)]
oops, rewrap
djm [Sun, 26 Mar 2006 03:24:48 +0000 (03:24 +0000)]
- djm@cvs.openbsd.org 2006/03/25 13:17:03
[atomicio.c auth-bsdauth.c auth-chall.c auth-options.c auth-passwd.c]
[auth-rh-rsa.c auth-rhosts.c auth-rsa.c auth-skey.c auth.c auth1.c]
[auth2-chall.c auth2-hostbased.c auth2-kbdint.c auth2-none.c]
[auth2-passwd.c auth2-pubkey.c auth2.c authfd.c authfile.c bufaux.c]
[buffer.c canohost.c channels.c cipher-3des1.c cipher-bf1.c]
[cipher-ctr.c cipher.c cleanup.c clientloop.c compat.c compress.c]
[deattack.c dh.c dispatch.c fatal.c groupaccess.c hostfile.c kex.c]
[kexdh.c kexdhc.c kexdhs.c kexgex.c kexgexc.c kexgexs.c key.c log.c]
[mac.c match.c md-sha256.c misc.c monitor.c monitor_fdpass.c]
[monitor_mm.c monitor_wrap.c msg.c nchan.c packet.c progressmeter.c]
[readconf.c readpass.c rsa.c scard.c scp.c servconf.c serverloop.c]
[session.c sftp-client.c sftp-common.c sftp-glob.c sftp-server.c]
[sftp.c ssh-add.c ssh-agent.c ssh-dss.c ssh-keygen.c ssh-keyscan.c]
[ssh-keysign.c ssh-rsa.c ssh.c sshconnect.c sshconnect1.c]
[sshconnect2.c sshd.c sshlogin.c sshpty.c sshtty.c ttymodes.c]
[uidswap.c uuencode.c xmalloc.c]
Put $OpenBSD$ tags back (as comments) to replace the RCSID()s that
Theo nuked - our scripts to sync -portable need them in the files
djm [Sun, 26 Mar 2006 03:23:17 +0000 (03:23 +0000)]
- djm@cvs.openbsd.org 2006/03/25 01:30:23
[sftp.c]
"abormally" is a perfectly cromulent word, but "abnormally" is better
djm [Sun, 26 Mar 2006 03:22:47 +0000 (03:22 +0000)]
- djm@cvs.openbsd.org 2006/03/25 01:13:23
[buffer.c channels.c deattack.c misc.c scp.c session.c sftp-client.c]
[sftp-server.c ssh-agent.c ssh-rsa.c xmalloc.c xmalloc.h auth-pam.c]
[uidswap.c]
change OpenSSH's xrealloc() function from being xrealloc(p, new_size)
to xrealloc(p, new_nmemb, new_itemsize).
realloc is particularly prone to integer overflows because it is
almost always allocating "n * size" bytes, so this is a far safer
API; ok deraadt@
djm [Sun, 26 Mar 2006 03:19:21 +0000 (03:19 +0000)]
- djm@cvs.openbsd.org 2006/03/25 00:05:41
[auth-bsdauth.c auth-skey.c auth.c auth2-chall.c channels.c]
[clientloop.c deattack.c gss-genr.c kex.c key.c misc.c moduli.c]
[monitor.c monitor_wrap.c packet.c scard.c sftp-server.c ssh-agent.c]
[ssh-keyscan.c ssh.c sshconnect.c sshconnect2.c sshd.c uuencode.c]
[xmalloc.c xmalloc.h]
introduce xcalloc() and xasprintf() failure-checked allocations
functions and use them throughout openssh
xcalloc is particularly important because malloc(nmemb * size) is a
dangerous idiom (subject to integer overflow) and it is time for it
to die
feedback and ok deraadt@
djm [Sun, 26 Mar 2006 03:11:39 +0000 (03:11 +0000)]
- djm@cvs.openbsd.org 2006/03/22 21:27:15
[deattack.c deattack.h packet.c]
remove IV support from the CRC attack detector, OpenSSH has never used
it - it only applied to IDEA-CFB, which we don't support.
prompted by NetBSD Coverity report via elad AT netbsd.org;
feedback markus@ "nuke it" deraadt@
djm [Sun, 26 Mar 2006 03:10:34 +0000 (03:10 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 21:11:53
[ttymodes.c]
spacing
djm [Sun, 26 Mar 2006 03:10:14 +0000 (03:10 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 18:48:34
[channels.c fatal.c kex.c packet.c serverloop.c]
spacing
djm [Sun, 26 Mar 2006 03:09:54 +0000 (03:09 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 18:42:27
[canohost.c match.c ssh.c sshconnect.c]
be strict with tolower() casting
djm [Sun, 26 Mar 2006 03:09:09 +0000 (03:09 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 18:41:43
[dns.c]
cast xstrdup to propert u_char *
djm [Sun, 26 Mar 2006 03:08:10 +0000 (03:08 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 18:35:12
[channels.c]
x11_fake_data is only ever used as u_char *
djm [Sun, 26 Mar 2006 03:07:52 +0000 (03:07 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 18:27:50
[monitor.c]
spacing
djm [Sun, 26 Mar 2006 03:07:26 +0000 (03:07 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 18:26:55
[channels.c monitor.c session.c session.h ssh-agent.c ssh-keygen.c]
[ssh-rsa.c ssh.c sshlogin.c]
annoying spacing fixes getting in the way of real diffs
djm [Sun, 26 Mar 2006 03:05:20 +0000 (03:05 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 18:17:20
[auth1.c auth2.c sshd.c]
sprinkle some ARGSUSED for table driven functions (which sometimes
must ignore their args)
djm [Sun, 26 Mar 2006 03:05:02 +0000 (03:05 +0000)]
rewrap
djm [Sun, 26 Mar 2006 03:04:36 +0000 (03:04 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 18:14:02
[channels.c clientloop.c monitor_wrap.c monitor_wrap.h serverloop.c]
[ssh.c sshpty.c sshpty.h]
sprinkle u_int throughout pty subsystem, ok markus
djm [Sun, 26 Mar 2006 03:03:21 +0000 (03:03 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 17:17:23
[ssh-rsa.c]
in a switch (), break after return or goto is stupid
djm [Sun, 26 Mar 2006 03:03:03 +0000 (03:03 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 17:13:16
[key.c]
djm did a typo
djm [Sun, 26 Mar 2006 03:02:35 +0000 (03:02 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 17:10:19
[auth.c key.c misc.c packet.c ssh-add.c]
in a switch (), break after return or goto is stupid
djm [Sun, 26 Mar 2006 03:02:16 +0000 (03:02 +0000)]
- djm@cvs.openbsd.org 2006/03/20 11:38:46
[key.c]
(really) last of the Coverity diffs: avoid possible NULL deref in
key_free. via elad AT netbsd.org; markus@ ok
djm [Sun, 26 Mar 2006 03:01:54 +0000 (03:01 +0000)]
- djm@cvs.openbsd.org 2006/03/20 04:09:44
[monitor.c]
memory leaks detected by Coverity via elad AT netbsd.org;
deraadt@ ok
that should be all of them now
djm [Sun, 26 Mar 2006 03:00:31 +0000 (03:00 +0000)]
- deraadt@cvs.openbsd.org 2006/03/19 18:59:09
[authfile.c]
whoever thought that break after return was a good idea needs to
get their head examimed
djm [Sun, 26 Mar 2006 02:59:59 +0000 (02:59 +0000)]
- deraadt@cvs.openbsd.org 2006/03/19 18:59:30
[ssh.c]
spacing
djm [Sun, 26 Mar 2006 02:59:38 +0000 (02:59 +0000)]
- deraadt@cvs.openbsd.org 2006/03/19 18:59:49
[ssh-keyscan.c]
please lint
djm [Sun, 26 Mar 2006 02:59:20 +0000 (02:59 +0000)]
- deraadt@cvs.openbsd.org 2006/03/19 18:56:41
[clientloop.c progressmeter.c serverloop.c sshd.c]
ARGSUSED for signal handlers
djm [Sun, 26 Mar 2006 02:58:55 +0000 (02:58 +0000)]
- deraadt@cvs.openbsd.org 2006/03/19 18:53:12
[kex.c kex.h monitor.c myproposal.h session.c]
spacing
djm [Sun, 26 Mar 2006 02:57:41 +0000 (02:57 +0000)]
- deraadt@cvs.openbsd.org 2006/03/19 18:52:11
[auth1.c authfd.c channels.c]
spacing
djm [Sun, 26 Mar 2006 02:57:07 +0000 (02:57 +0000)]
id sync
djm [Sun, 26 Mar 2006 02:54:37 +0000 (02:54 +0000)]
- dtucker@cvs.openbsd.org 2006/03/19 11:51:52
[servconf.c]
Correct strdelim null test; ok djm@
djm [Sun, 26 Mar 2006 02:54:03 +0000 (02:54 +0000)]
- djm@cvs.openbsd.org 2006/03/19 07:41:30
[sshconnect2.c]
memory leaks detected by Coverity via elad AT netbsd.org;
deraadt@ ok
djm [Sun, 26 Mar 2006 02:53:32 +0000 (02:53 +0000)]
- djm@cvs.openbsd.org 2006/03/19 02:24:05
[dh.c readconf.c servconf.c]
potential NULL pointer dereferences detected by Coverity
via elad AT netbsd.org; ok deraadt@
djm [Sun, 26 Mar 2006 02:52:20 +0000 (02:52 +0000)]
- djm@cvs.openbsd.org 2006/03/19 02:23:26
[hostfile.c]
FILE* leak detected by Coverity via elad AT netbsd.org;
ok deraadt@
djm [Sun, 26 Mar 2006 02:51:44 +0000 (02:51 +0000)]
- djm@cvs.openbsd.org 2006/03/19 02:22:56
[sftp.c]
more memory leaks detected by Coverity via elad AT netbsd.org;
deraadt@ ok
djm [Sun, 26 Mar 2006 02:51:08 +0000 (02:51 +0000)]
- djm@cvs.openbsd.org 2006/03/19 02:22:32
[serverloop.c]
memory leaks detected by Coverity via elad AT netbsd.org;
ok deraadt@ dtucker@
djm [Sun, 26 Mar 2006 02:50:37 +0000 (02:50 +0000)]
- djm@cvs.openbsd.org 2006/03/17 22:31:11
[authfd.c]
unreachanble statement, found by lint
djm [Sun, 26 Mar 2006 02:50:14 +0000 (02:50 +0000)]
- djm@cvs.openbsd.org 2006/03/17 22:31:50
[authfd.c]
another unreachable found by lint
djm [Sun, 26 Mar 2006 02:49:43 +0000 (02:49 +0000)]
- biorn@cvs.openbsd.org 2006/03/16 10:31:45
[scp.c]
Try to display errormessage even if remout == -1
ok djm@, markus@
djm [Sun, 26 Mar 2006 02:48:01 +0000 (02:48 +0000)]
- OpenBSD CVS Sync
- jakob@cvs.openbsd.org 2006/03/15 08:46:44
[ssh-keygen.c]
if no key file are given when printing the DNS host record, use the
host key file(s) as default. ok djm@
djm [Sat, 25 Mar 2006 13:11:46 +0000 (13:11 +0000)]
[deattack.c deattack.h]
remove IV support from the CRC attack detector, OpenSSH has never used
it - it only applied to IDEA-CFB, which we don't support.
prompted by NetBSD Coverity report via elad AT netbsd.org;
feedback markus@ "nuke it" deraadt@
djm [Sat, 25 Mar 2006 13:07:02 +0000 (13:07 +0000)]
- jakob@cvs.openbsd.org 2006/03/22 21:16:24
[ssh.1]
simplify SSHFP example; ok jmc@
djm [Sat, 25 Mar 2006 13:06:48 +0000 (13:06 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 18:41:43
[dns.c]
cast xstrdup to propert u_char *
djm [Sat, 25 Mar 2006 13:06:32 +0000 (13:06 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 18:26:55
[session.h]
annoying spacing fixes getting in the way of real diffs
djm [Sat, 25 Mar 2006 13:06:14 +0000 (13:06 +0000)]
- deraadt@cvs.openbsd.org 2006/03/20 18:14:02
[monitor_wrap.h sshpty.h]
sprinkle u_int throughout pty subsystem, ok markus
djm [Sat, 25 Mar 2006 13:05:44 +0000 (13:05 +0000)]
- djm@cvs.openbsd.org 2006/03/20 04:08:18
[gss-serv.c]
last lot of GSSAPI related leaks detected by Coverity via
elad AT netbsd.org; reviewed by simon AT sxw.org.uk; deraadt@ ok
djm [Sat, 25 Mar 2006 13:05:23 +0000 (13:05 +0000)]
- djm@cvs.openbsd.org 2006/03/20 04:07:49
[gss-genr.c]
more GSSAPI related leaks detected by Coverity via elad AT netbsd.org;
reviewed by simon AT sxw.org.uk; deraadt@ ok
djm [Sat, 25 Mar 2006 13:04:53 +0000 (13:04 +0000)]
- djm@cvs.openbsd.org 2006/03/20 04:07:22
[auth2-gss.c]
GSSAPI related leaks detected by Coverity via elad AT netbsd.org;
reviewed by simon AT sxw.org.uk; deraadt@ ok
djm [Sat, 25 Mar 2006 13:04:32 +0000 (13:04 +0000)]
- deraadt@cvs.openbsd.org 2006/03/19 18:53:12
[kex.h myproposal.h]
spacing
djm [Sat, 25 Mar 2006 13:03:21 +0000 (13:03 +0000)]
- deraadt@cvs.openbsd.org 2006/03/19 18:51:18
[atomicio.c auth-bsdauth.c auth-chall.c auth-krb5.c auth-options.c]
[auth-pam.c auth-passwd.c auth-rh-rsa.c auth-rhosts.c auth-rsa.c]
[auth-shadow.c auth-skey.c auth.c auth1.c auth2-chall.c]
[auth2-hostbased.c auth2-kbdint.c auth2-none.c auth2-passwd.c]
[auth2-pubkey.c auth2.c authfd.c authfile.c bufaux.c buffer.c]
[canohost.c channels.c cipher-3des1.c cipher-acss.c cipher-aes.c]
[cipher-bf1.c cipher-ctr.c cipher.c cleanup.c clientloop.c compat.c]
[compress.c deattack.c dh.c dispatch.c dns.c entropy.c fatal.c]
[groupaccess.c hostfile.c includes.h kex.c kexdh.c kexdhc.c]
[kexdhs.c kexgex.c kexgexc.c kexgexs.c key.c log.c loginrec.c]
[loginrec.h logintest.c mac.c match.c md-sha256.c md5crypt.c misc.c]
[monitor.c monitor_fdpass.c monitor_mm.c monitor_wrap.c msg.c]
[nchan.c packet.c progressmeter.c readconf.c readpass.c rsa.c]
[scard.c scp.c servconf.c serverloop.c session.c sftp-client.c]
[sftp-common.c sftp-glob.c sftp-server.c sftp.c ssh-add.c]
[ssh-agent.c ssh-dss.c ssh-keygen.c ssh-keyscan.c ssh-keysign.c]
[ssh-rand-helper.c ssh-rsa.c ssh.c sshconnect.c sshconnect1.c]
[sshconnect2.c sshd.c sshlogin.c sshpty.c sshtty.c ttymodes.c]
[uidswap.c uuencode.c xmalloc.c openbsd-compat/bsd-arc4random.c]
[openbsd-compat/bsd-closefrom.c openbsd-compat/bsd-cygwin_util.c]
[openbsd-compat/bsd-getpeereid.c openbsd-compat/bsd-misc.c]
[openbsd-compat/bsd-nextstep.c openbsd-compat/bsd-snprintf.c]
[openbsd-compat/bsd-waitpid.c openbsd-compat/fake-rfc2553.c]
RCSID() can die
djm [Sat, 25 Mar 2006 12:39:29 +0000 (12:39 +0000)]
- djm@cvs.openbsd.org 2006/03/16 04:24:42
[ssh.1]
Add RFC4419 (Diffie-Hellman group exchange KEX) to the list of SSH RFCs
that OpenSSH supports
dtucker [Sat, 18 Mar 2006 13:07:07 +0000 (13:07 +0000)]
- (dtucker) [openbsd-compat/bsd-snprintf.c] Bug #1173: make fmtint() take
a LLONG rather than a long. Fixes scp'ing of large files on platforms
with missing/broken snprintfs. Patch from e.borovac at bom.gov.au.
djm [Sat, 18 Mar 2006 12:04:49 +0000 (12:04 +0000)]
- (djm) [auth-pam.c] Fix memleak in error path, from Coverity via
elad AT NetBSD.org
djm [Thu, 16 Mar 2006 07:22:18 +0000 (07:22 +0000)]
- (djm) [kex.c] Slightly more clean deactivation of dhgex-sha256 on old
OpenSSL; ok tim
tim [Thu, 16 Mar 2006 04:17:05 +0000 (04:17 +0000)]
- (tim) [kex.c myproposal.h md-sha256.c openbsd-compat/sha2.c,h] Disable
sha256 when openssl < 0.9.7. Patch from djm@. Corrections/testing by me.
dtucker [Wed, 15 Mar 2006 21:14:34 +0000 (21:14 +0000)]
- (dtucker) [configure.ac md-sha256.c] NetBSD has sha2.h in
/usr/include/crypto. Hint from djm@.
dtucker [Wed, 15 Mar 2006 20:21:35 +0000 (20:21 +0000)]
- (dtucker) [entropy.c] Add headers for WIFEXITED and friends.
dtucker [Wed, 15 Mar 2006 11:28:17 +0000 (11:28 +0000)]
- (dtucker) [configure.ac] login_cap.h requires sys/types.h on NetBSD.
dtucker [Wed, 15 Mar 2006 11:25:54 +0000 (11:25 +0000)]
- (dtucker) [openbsd-compat/openbsd-compat.h] AIX (at least) needs
sys/ioctl.h for struct winsize.
djm [Wed, 15 Mar 2006 10:48:54 +0000 (10:48 +0000)]
- (djm) [includes.h] Put back paths.h, it is needed in defines.h
dtucker [Wed, 15 Mar 2006 10:31:39 +0000 (10:31 +0000)]
- (dtucker) [configure.ac] Fix glob test conversion to AC_TRY_COMPILE
tim [Wed, 15 Mar 2006 06:09:50 +0000 (06:09 +0000)]
- (tim) [openssh/sshpty.c openssh/openbsd-compat/port-tun.c] put in some
includes removed from includes.h
tim [Wed, 15 Mar 2006 05:04:18 +0000 (05:04 +0000)]
- (tim) [includes.h] put sys/stat.h back in to quiet some "macro redefined:"
warnings.
djm [Wed, 15 Mar 2006 03:42:54 +0000 (03:42 +0000)]
- (djm) [auth-pam.c clientloop.c includes.h monitor.c session.c]
[sftp-client.c ssh-keysign.c ssh.c sshconnect.c sshconnect2.c]
[sshd.c openbsd-compat/bsd-misc.c openbsd-compat/bsd-openpty.c]
[openbsd-compat/glob.c openbsd-compat/mktemp.c]
[openbsd-compat/readpassphrase.c] Lots of include fixes for
OpenSolaris
djm [Wed, 15 Mar 2006 03:36:55 +0000 (03:36 +0000)]
- (djm) [openbsd-compat/sha2.h openbsd-compat/sha2.c] Comment out
SHA384, which we don't need and doesn't compile without tweaks
djm [Wed, 15 Mar 2006 03:03:06 +0000 (03:03 +0000)]
- (djm) [ssh-agent.c] Restore dropped stat.h
djm [Wed, 15 Mar 2006 03:02:36 +0000 (03:02 +0000)]
- (djm) [ssh-rand-helper.c] Needs a bunch of headers
djm [Wed, 15 Mar 2006 03:02:01 +0000 (03:02 +0000)]
- (djm) [openbsd-compat/sha2.h] Avoid include macro clash with
system sha2.h
djm [Wed, 15 Mar 2006 03:01:11 +0000 (03:01 +0000)]
- (djm) [loginrec.c] Need stat.h
djm [Wed, 15 Mar 2006 02:13:27 +0000 (02:13 +0000)]
- (djm) [regress/.cvsignore] Ignore Makefile here
djm [Wed, 15 Mar 2006 02:12:41 +0000 (02:12 +0000)]
- (djm) [md-sha256.c configure.ac] md-sha256.c needs sha2.h if present
djm [Wed, 15 Mar 2006 02:09:18 +0000 (02:09 +0000)]
- (djm) [Makefile.in openbsd-compat/Makefile.in] Add added files
djm [Wed, 15 Mar 2006 02:07:48 +0000 (02:07 +0000)]
- (djm) [includes.h] Restore accidentally dropped netinet/in.h
djm [Wed, 15 Mar 2006 02:02:28 +0000 (02:02 +0000)]
- (djm) [configure.ac defines.h kex.c md-sha256.c]
[openbsd-compat/sha2.h openbsd-compat/openbsd-compat.h]
[openbsd-compat/sha2.c] First stab at portability glue for SHA256
KEX support, should work with libc SHA256 support or OpenSSL
EVP_sha256 if present
djm [Wed, 15 Mar 2006 01:08:28 +0000 (01:08 +0000)]
- djm@cvs.openbsd.org 2006/03/07 09:07:40
[kex.c kex.h monitor.c myproposal.h ssh-keyscan.c sshconnect2.c sshd.c]
Implement the diffie-hellman-group-exchange-sha256 key exchange method
using the SHA256 code in libc (and wrapper to make it into an OpenSSL
EVP), interop tested against CVS PuTTY
NB. no portability bits committed yet
djm [Wed, 15 Mar 2006 01:06:55 +0000 (01:06 +0000)]
- markus@cvs.openbsd.org 2006/03/14 16:32:48
[ssh_config.5 sshd_config.5]
*AliveCountMax applies to protcol v2 only; ok dtucker, djm
djm [Wed, 15 Mar 2006 01:06:41 +0000 (01:06 +0000)]
- djm@cvs.openbsd.org 2006/03/14 00:15:39
[canohost.c]
log the originating address and not just the name when a reverse
mapping check fails, requested by linux AT linuon.com
This page took 0.13278 seconds and 4 git commands to generate.