Commit Graph

3604 Commits

Author SHA1 Message Date
Darren Tucker 442a383418 - (dtucker) [contrib/findssh.sh] Clean up on interrupt; from
amarendra.godbole at ge com.
2004-12-13 18:08:32 +11:00
Darren Tucker f0f90989fa - dtucker@cvs.openbsd.org 2004/12/11 01:48:56
[auth-rsa.c auth2-pubkey.c authfile.c misc.c misc.h]
     Fix debug call in error path of authorized_keys processing and fix related
     warnings; ok djm@
2004-12-11 13:39:50 +11:00
Darren Tucker 596dcfa21f - fgsch@cvs.openbsd.org 2004/12/10 03:10:42
[sftp.c]
     - fix globbed ls for paths the same lenght as the globbed path when
       we have a unique matching.
     - fix globbed ls in case of a directory when we have a unique matching.
     - as a side effect, if the path does not exist error (used to silently
       ignore).
     - don't do extra do_lstat() if we only have one matching file.
     djm@ ok
2004-12-11 13:37:22 +11:00
Darren Tucker 56c9598e5e - (dtucker) OpenBSD CVS Sync
- markus@cvs.openbsd.org 2004/12/06 16:00:43
     [bufaux.c]
     use 0x00 not \0 since buf[] is a bignum
2004-12-11 13:34:56 +11:00
Tim Rice 0f83d2907c [configure.ac] Comment some non obvious platforms in the target-specific
case statement. Suggested and OK by dtucker@
2004-12-08 18:29:58 -08:00
Darren Tucker 641b34c72b - (dtucker) [regress/scp.sh] Use portable-friendly $DIFFOPTs in new test. 2004-12-07 11:26:15 +11:00
Darren Tucker d028fea13a - dtucker@cvs.openbsd.org 2004/12/06 10:49:56
[test-exec.sh]
     Check if TEST_SSH_SSHD is a full path to sshd before searching; ok markus@
2004-12-06 23:16:29 +11:00
Darren Tucker cc0603d4b6 - dtucker@cvs.openbsd.org 2004/11/25 09:39:27
[test-exec.sh]
     Remove obsolete RhostsAuthentication from test config; ok markus@
2004-12-06 23:13:50 +11:00
Darren Tucker 79ec66e980 - djm@cvs.openbsd.org 2004/11/07 00:32:41
[multiplex.sh]
     regression tests for new multiplex commands
2004-12-06 23:12:15 +11:00
Darren Tucker 124f58ecba - djm@cvs.openbsd.org 2004/10/29 23:59:22
[Makefile added brokenkeys.sh]
     regression test for handling of corrupt keys in authorized_keys file
2004-12-06 23:07:37 +11:00
Darren Tucker 71b5643598 - djm@cvs.openbsd.org 2004/10/08 02:01:50
[reexec.sh]
     shrink and tidy; ok dtucker@
2004-12-06 23:05:52 +11:00
Darren Tucker 3206e57e93 - david@cvs.openbsd.org 2004/07/09 19:45:43
[Makefile]
     add a missing CLEANFILES used in the re-exec test
2004-12-06 23:04:57 +11:00
Darren Tucker ccf0779185 - dtucker@cvs.openbsd.org 2004/07/08 12:59:35
[scp.sh]
     Regress test for bz #863 (scp double-error), requires $SUDO.  ok markus@
2004-12-06 23:03:27 +11:00
Darren Tucker a372960fa9 - djm@cvs.openbsd.org 2004/06/26 06:16:07
[reexec.sh]
     don't change the name of the copied sshd for the reexec fallback test,
     makes life simpler for portable
2004-12-06 23:00:27 +11:00
Darren Tucker 22cc741096 - dtucker@cvs.openbsd.org 2004/12/06 11:41:03
[auth-rsa.c auth2-pubkey.c authfile.c misc.c misc.h ssh.h sshd.8]
     Discard over-length authorized_keys entries rather than complaining when
     they don't decode.  bz #884, with & ok djm@
2004-12-06 22:47:41 +11:00
Darren Tucker 16e254d179 - jaredy@cvs.openbsd.org 2004/12/05 23:55:07
[sftp.1]
     - explain that patterns can be used as arguments in get/put/ls/etc
       commands (prodded by Michael Knudsen)
     - describe ls flags as a list
     - other minor improvements
     ok jmc, djm
2004-12-06 22:46:45 +11:00
Darren Tucker e2f189a841 - djm@cvs.openbsd.org 2004/11/29 07:41:24
[sftp-client.h sftp.c]
     Some small fixes from moritz@jodeit.org. ok deraadt@
2004-12-06 22:45:53 +11:00
Darren Tucker 0133a727ac - jmc@cvs.openbsd.org 2004/11/29 00:05:17
[sftp.1]
     missing full stop;
2004-12-06 22:44:32 +11:00
Darren Tucker cd516efea1 - (dtucker) OpenBSD CVS Sync
- markus@cvs.openbsd.org 2004/11/25 22:22:14
     [sftp-client.c sftp.c]
     leak; from mpech
2004-12-06 22:43:43 +11:00
Darren Tucker ba2abb3699 - (dtucker) [TODO WARNING.RNG] Update to reflect current reality. ok djm@ 2004-12-06 22:40:10 +11:00
Darren Tucker c13866719f - (dtucker) [auth1.c auth2.c] If the user successfully authenticates but is
subsequently denied by the PAM auth stack, send the PAM message to the
   user via packet_disconnect (Protocol 1) or userauth_banner (Protocol 2).
   ok djm@
2004-12-03 14:33:47 +11:00
Darren Tucker 9c6bf325c0 - jmc@cvs.openbsd.org 2004/11/07 17:57:30
[ssh.c]
     usage():
     - add -O
     - sync -S w/ manpage
     - remove -h
2004-12-03 14:10:19 +11:00
Darren Tucker e04644c162 - (dtucker) OpenBSD CVS Sync
- jmc@cvs.openbsd.org 2004/11/07 17:42:36
     [ssh.1]
     options sort, and whitespace;
2004-12-03 14:08:45 +11:00
Darren Tucker 16bcc1c92e - (dtucker) [INSTALL Makefile.in configure.ac] Add --with-libedit configure
option and supporting makefile bits and documentation.
2004-11-07 20:14:34 +11:00
Darren Tucker 7ebfc10884 - djm@cvs.openbsd.org 2004/11/07 00:01:46
[clientloop.c clientloop.h ssh.1 ssh.c]
     add basic control of a running multiplex master connection; including the
     ability to check its status and request it to exit; ok markus@
2004-11-07 20:06:19 +11:00
Darren Tucker 2d963d8721 - djm@cvs.openbsd.org 2004/11/05 12:19:56
[sftp.c]
     command editing and history support via libedit; ok markus@
     thanks to hshoexer@ and many testers on tech@ too
2004-11-07 20:04:10 +11:00
Darren Tucker 08d04faf24 - djm@cvs.openbsd.org 2004/10/29 23:57:05
[key.c]
     use new buffer API to avoid fatal errors on corrupt keys in authorized_keys
     files; ok markus@
2004-11-05 20:42:28 +11:00
Darren Tucker 50dbe8314b - djm@cvs.openbsd.org 2004/10/29 23:56:17
[bufaux.c bufaux.h buffer.c buffer.h]
     introduce a new buffer API that returns an error rather than fatal()ing
     when presented with bad data; ok markus@
2004-11-05 20:41:24 +11:00
Darren Tucker ce327b62ac - djm@cvs.openbsd.org 2004/10/29 22:53:56
[clientloop.c misc.h readpass.c ssh-agent.c]
     factor out common permission-asking code to separate function; ok markus@
2004-11-05 20:38:03 +11:00
Darren Tucker 5d78de6283 - djm@cvs.openbsd.org 2004/10/29 21:47:15
[channels.c channels.h clientloop.c]
     fix some window size change bugs for multiplexed connections: windows sizes
     were not being updated if they had changed after ~^Z suspends and SIGWINCH
     was not being processed unless the first connection had requested a tty;
     ok markus
2004-11-05 20:35:44 +11:00
Darren Tucker b2694f0e8a - markus@cvs.openbsd.org 2004/10/20 11:48:53
[packet.c ssh1.h]
     disconnect for invalid (out of range) message types.
2004-11-05 20:27:54 +11:00
Darren Tucker 1dee8683fb - djm@cvs.openbsd.org 2004/10/07 10:12:36
[ssh-agent.c]
     don't unlink agent socket when bind() fails, spotted by rich AT
     rich-paul.net, ok markus@
2004-11-05 20:26:49 +11:00
Darren Tucker 636ca90247 - djm@cvs.openbsd.org 2004/10/07 10:10:24
[scp.1 sftp.1 ssh.1 ssh_config.5]
     document KbdInteractiveDevices; ok markus@
2004-11-05 20:22:00 +11:00
Darren Tucker 3269b13817 - djm@cvs.openbsd.org 2004/09/25 03:45:14
[sshd.c]
     these printf args are no longer double; ok deraadt@ markus@
2004-11-05 20:20:59 +11:00
Darren Tucker 39207a46b4 - djm@cvs.openbsd.org 2004/09/23 13:00:04
[ssh.c]
     correctly honour -n in multiplex client mode; spotted by sturm@ ok markus@
2004-11-05 20:19:51 +11:00
Darren Tucker f30e1acc62 - deraadt@cvs.openbsd.org 2004/09/15 18:46:04
[scp.c]
     scratch that do { } while (0) wrapper in this case
2004-11-05 20:10:02 +11:00
Darren Tucker 178fa66a64 - mickey@cvs.openbsd.org 2004/09/15 18:42:27
[sshd.c]
     use less doubles in daemons; markus@ ok
2004-11-05 20:09:09 +11:00
Darren Tucker 7cc5c23817 - jaredy@cvs.openbsd.org 2004/09/15 03:25:41
[sshd_config.5]
     mention PrintLastLog only prints last login time for interactive
     sessions, like PrintMotd mentions.
     From Michael Knudsen, with wording changed slightly to match the
     PrintMotd description.
     ok djm
2004-11-05 20:06:59 +11:00
Darren Tucker e9bf98412e - deraadt@cvs.openbsd.org 2004/09/15 00:46:01
[ssh.c]
     /* fallthrough */ is something a programmer understands.  But
     /* FALLTHROUGH */ is also understood by lint, so that is better.
2004-11-05 20:05:32 +11:00
Darren Tucker 07336dae94 - djm@cvs.openbsd.org 2004/09/07 23:41:30
[clientloop.c ssh.c]
     cleanup multiplex control socket on SIGHUP too, spotted by sturm@
     ok markus@ deraadt@
2004-11-05 20:02:16 +11:00
Darren Tucker 4e4fe0052c - jmc@cvs.openbsd.org 2004/08/30 21:22:49
[ssh-add.1 ssh.1]
     .Xsession -> .xsession;
     originally from a pr from f at obiit dot org, but missed by myself;
     ok markus@ matthieu@
2004-11-05 20:01:03 +11:00
Darren Tucker c016134588 - markus@cvs.openbsd.org 2004/08/30 09:18:08
[LICENCE]
     s/keygen/keyscan/
2004-11-05 20:00:03 +11:00
Darren Tucker a56f191ef1 - (dtucker) [configure.ac includes.h] Bug #947: Fix compile error on HP-UX
10.x by testing for conflicts in shadow.h and undef'ing _INCLUDE__STDC__
   only if a conflict is detected.
2004-11-02 20:30:54 +11:00
Darren Tucker 35beaddc7e - (dtucker) [uidswap.c] Don't test dropping of gids for the root user or
on Cygwin.  Cygwin parts from vinschen at redhat com; ok djm@
2004-10-19 16:33:33 +10:00
Damien Miller 0e035d816a that was "ok dtucker@" 2004-10-16 18:53:28 +10:00
Damien Miller daffc6a115 - (djm) [auth-pam.c] snprintf->strl*, fix server message length calculations 2004-10-16 18:52:44 +10:00
Darren Tucker dbc2296e2c - (dtucker) [monitor_mm.c openbsd-compat/xmmap.c] Bug #940: cast constants
to void * to appease picky compilers (eg Tru64's "cc -std1").
2004-10-06 23:15:44 +10:00
Darren Tucker b7d55e3eb5 - (dtucker) [README.privsep] Bug #939: update info about HP-UX Trusted Mode
and other PAM platforms.
2004-10-06 20:09:32 +10:00
Darren Tucker 59f79c4014 - (dtucker) [configure.ac] Set AC_PACKAGE_NAME. ok djm@ 2004-09-30 21:17:08 +10:00
Darren Tucker 4127f559ad - (dtucker) [openbsd-compat/bsd-snprintf.c] Previous change was off by one,
which could have caused the justification to be wrong.  ok djm@
2004-09-23 21:35:09 +10:00