Commit Graph

4134 Commits

Author SHA1 Message Date
Darren Tucker 8686ed7508 - (dtucker) [ssh-rand-helper.c] Fall back to command-based seeding if reading
from prngd is enabled at compile time but fails at run time, eg because
   prngd is not running.  Note that if you have prngd running when OpenSSH is
   built, OpenSSL will consider itself internally seeded and rand-helper won't
   be built at all unless explicitly enabled via --with-rand-helper.  ok djm@
2004-12-20 12:05:08 +11:00
Darren Tucker 442a383418 - (dtucker) [contrib/findssh.sh] Clean up on interrupt; from
amarendra.godbole at ge com.
2004-12-13 18:08:32 +11:00
Darren Tucker f0f90989fa - dtucker@cvs.openbsd.org 2004/12/11 01:48:56
[auth-rsa.c auth2-pubkey.c authfile.c misc.c misc.h]
     Fix debug call in error path of authorized_keys processing and fix related
     warnings; ok djm@
2004-12-11 13:39:50 +11:00
Darren Tucker 596dcfa21f - fgsch@cvs.openbsd.org 2004/12/10 03:10:42
[sftp.c]
     - fix globbed ls for paths the same lenght as the globbed path when
       we have a unique matching.
     - fix globbed ls in case of a directory when we have a unique matching.
     - as a side effect, if the path does not exist error (used to silently
       ignore).
     - don't do extra do_lstat() if we only have one matching file.
     djm@ ok
2004-12-11 13:37:22 +11:00
Darren Tucker 56c9598e5e - (dtucker) OpenBSD CVS Sync
- markus@cvs.openbsd.org 2004/12/06 16:00:43
     [bufaux.c]
     use 0x00 not \0 since buf[] is a bignum
2004-12-11 13:34:56 +11:00
Tim Rice 0f83d2907c [configure.ac] Comment some non obvious platforms in the target-specific
case statement. Suggested and OK by dtucker@
2004-12-08 18:29:58 -08:00
Darren Tucker 641b34c72b - (dtucker) [regress/scp.sh] Use portable-friendly $DIFFOPTs in new test. 2004-12-07 11:26:15 +11:00
Darren Tucker d028fea13a - dtucker@cvs.openbsd.org 2004/12/06 10:49:56
[test-exec.sh]
     Check if TEST_SSH_SSHD is a full path to sshd before searching; ok markus@
2004-12-06 23:16:29 +11:00
Darren Tucker cc0603d4b6 - dtucker@cvs.openbsd.org 2004/11/25 09:39:27
[test-exec.sh]
     Remove obsolete RhostsAuthentication from test config; ok markus@
2004-12-06 23:13:50 +11:00
Darren Tucker 79ec66e980 - djm@cvs.openbsd.org 2004/11/07 00:32:41
[multiplex.sh]
     regression tests for new multiplex commands
2004-12-06 23:12:15 +11:00
Darren Tucker 124f58ecba - djm@cvs.openbsd.org 2004/10/29 23:59:22
[Makefile added brokenkeys.sh]
     regression test for handling of corrupt keys in authorized_keys file
2004-12-06 23:07:37 +11:00
Darren Tucker 71b5643598 - djm@cvs.openbsd.org 2004/10/08 02:01:50
[reexec.sh]
     shrink and tidy; ok dtucker@
2004-12-06 23:05:52 +11:00
Darren Tucker 3206e57e93 - david@cvs.openbsd.org 2004/07/09 19:45:43
[Makefile]
     add a missing CLEANFILES used in the re-exec test
2004-12-06 23:04:57 +11:00
Darren Tucker ccf0779185 - dtucker@cvs.openbsd.org 2004/07/08 12:59:35
[scp.sh]
     Regress test for bz #863 (scp double-error), requires $SUDO.  ok markus@
2004-12-06 23:03:27 +11:00
Darren Tucker a372960fa9 - djm@cvs.openbsd.org 2004/06/26 06:16:07
[reexec.sh]
     don't change the name of the copied sshd for the reexec fallback test,
     makes life simpler for portable
2004-12-06 23:00:27 +11:00
Darren Tucker c0dc1c9bfa Resync Ids 2004-12-06 22:58:11 +11:00
Darren Tucker 22cc741096 - dtucker@cvs.openbsd.org 2004/12/06 11:41:03
[auth-rsa.c auth2-pubkey.c authfile.c misc.c misc.h ssh.h sshd.8]
     Discard over-length authorized_keys entries rather than complaining when
     they don't decode.  bz #884, with & ok djm@
2004-12-06 22:47:41 +11:00
Darren Tucker 16e254d179 - jaredy@cvs.openbsd.org 2004/12/05 23:55:07
[sftp.1]
     - explain that patterns can be used as arguments in get/put/ls/etc
       commands (prodded by Michael Knudsen)
     - describe ls flags as a list
     - other minor improvements
     ok jmc, djm
2004-12-06 22:46:45 +11:00
Darren Tucker e2f189a841 - djm@cvs.openbsd.org 2004/11/29 07:41:24
[sftp-client.h sftp.c]
     Some small fixes from moritz@jodeit.org. ok deraadt@
2004-12-06 22:45:53 +11:00
Darren Tucker 0133a727ac - jmc@cvs.openbsd.org 2004/11/29 00:05:17
[sftp.1]
     missing full stop;
2004-12-06 22:44:32 +11:00
Darren Tucker cd516efea1 - (dtucker) OpenBSD CVS Sync
- markus@cvs.openbsd.org 2004/11/25 22:22:14
     [sftp-client.c sftp.c]
     leak; from mpech
2004-12-06 22:43:43 +11:00
Darren Tucker ba2abb3699 - (dtucker) [TODO WARNING.RNG] Update to reflect current reality. ok djm@ 2004-12-06 22:40:10 +11:00
Darren Tucker c13866719f - (dtucker) [auth1.c auth2.c] If the user successfully authenticates but is
subsequently denied by the PAM auth stack, send the PAM message to the
   user via packet_disconnect (Protocol 1) or userauth_banner (Protocol 2).
   ok djm@
2004-12-03 14:33:47 +11:00
Darren Tucker 9c6bf325c0 - jmc@cvs.openbsd.org 2004/11/07 17:57:30
[ssh.c]
     usage():
     - add -O
     - sync -S w/ manpage
     - remove -h
2004-12-03 14:10:19 +11:00
Darren Tucker e04644c162 - (dtucker) OpenBSD CVS Sync
- jmc@cvs.openbsd.org 2004/11/07 17:42:36
     [ssh.1]
     options sort, and whitespace;
2004-12-03 14:08:45 +11:00
Darren Tucker 16bcc1c92e - (dtucker) [INSTALL Makefile.in configure.ac] Add --with-libedit configure
option and supporting makefile bits and documentation.
2004-11-07 20:14:34 +11:00
Darren Tucker 7ebfc10884 - djm@cvs.openbsd.org 2004/11/07 00:01:46
[clientloop.c clientloop.h ssh.1 ssh.c]
     add basic control of a running multiplex master connection; including the
     ability to check its status and request it to exit; ok markus@
2004-11-07 20:06:19 +11:00
Darren Tucker 2d963d8721 - djm@cvs.openbsd.org 2004/11/05 12:19:56
[sftp.c]
     command editing and history support via libedit; ok markus@
     thanks to hshoexer@ and many testers on tech@ too
2004-11-07 20:04:10 +11:00
Darren Tucker 08d04faf24 - djm@cvs.openbsd.org 2004/10/29 23:57:05
[key.c]
     use new buffer API to avoid fatal errors on corrupt keys in authorized_keys
     files; ok markus@
2004-11-05 20:42:28 +11:00
Darren Tucker 50dbe8314b - djm@cvs.openbsd.org 2004/10/29 23:56:17
[bufaux.c bufaux.h buffer.c buffer.h]
     introduce a new buffer API that returns an error rather than fatal()ing
     when presented with bad data; ok markus@
2004-11-05 20:41:24 +11:00
Darren Tucker ce327b62ac - djm@cvs.openbsd.org 2004/10/29 22:53:56
[clientloop.c misc.h readpass.c ssh-agent.c]
     factor out common permission-asking code to separate function; ok markus@
2004-11-05 20:38:03 +11:00
Darren Tucker 5d78de6283 - djm@cvs.openbsd.org 2004/10/29 21:47:15
[channels.c channels.h clientloop.c]
     fix some window size change bugs for multiplexed connections: windows sizes
     were not being updated if they had changed after ~^Z suspends and SIGWINCH
     was not being processed unless the first connection had requested a tty;
     ok markus
2004-11-05 20:35:44 +11:00
Darren Tucker b2694f0e8a - markus@cvs.openbsd.org 2004/10/20 11:48:53
[packet.c ssh1.h]
     disconnect for invalid (out of range) message types.
2004-11-05 20:27:54 +11:00
Darren Tucker 1dee8683fb - djm@cvs.openbsd.org 2004/10/07 10:12:36
[ssh-agent.c]
     don't unlink agent socket when bind() fails, spotted by rich AT
     rich-paul.net, ok markus@
2004-11-05 20:26:49 +11:00
Darren Tucker 636ca90247 - djm@cvs.openbsd.org 2004/10/07 10:10:24
[scp.1 sftp.1 ssh.1 ssh_config.5]
     document KbdInteractiveDevices; ok markus@
2004-11-05 20:22:00 +11:00
Darren Tucker 3269b13817 - djm@cvs.openbsd.org 2004/09/25 03:45:14
[sshd.c]
     these printf args are no longer double; ok deraadt@ markus@
2004-11-05 20:20:59 +11:00
Darren Tucker 39207a46b4 - djm@cvs.openbsd.org 2004/09/23 13:00:04
[ssh.c]
     correctly honour -n in multiplex client mode; spotted by sturm@ ok markus@
2004-11-05 20:19:51 +11:00
Darren Tucker f30e1acc62 - deraadt@cvs.openbsd.org 2004/09/15 18:46:04
[scp.c]
     scratch that do { } while (0) wrapper in this case
2004-11-05 20:10:02 +11:00
Darren Tucker 178fa66a64 - mickey@cvs.openbsd.org 2004/09/15 18:42:27
[sshd.c]
     use less doubles in daemons; markus@ ok
2004-11-05 20:09:09 +11:00
Darren Tucker 7cc5c23817 - jaredy@cvs.openbsd.org 2004/09/15 03:25:41
[sshd_config.5]
     mention PrintLastLog only prints last login time for interactive
     sessions, like PrintMotd mentions.
     From Michael Knudsen, with wording changed slightly to match the
     PrintMotd description.
     ok djm
2004-11-05 20:06:59 +11:00
Darren Tucker e9bf98412e - deraadt@cvs.openbsd.org 2004/09/15 00:46:01
[ssh.c]
     /* fallthrough */ is something a programmer understands.  But
     /* FALLTHROUGH */ is also understood by lint, so that is better.
2004-11-05 20:05:32 +11:00
Darren Tucker 07336dae94 - djm@cvs.openbsd.org 2004/09/07 23:41:30
[clientloop.c ssh.c]
     cleanup multiplex control socket on SIGHUP too, spotted by sturm@
     ok markus@ deraadt@
2004-11-05 20:02:16 +11:00
Darren Tucker 4e4fe0052c - jmc@cvs.openbsd.org 2004/08/30 21:22:49
[ssh-add.1 ssh.1]
     .Xsession -> .xsession;
     originally from a pr from f at obiit dot org, but missed by myself;
     ok markus@ matthieu@
2004-11-05 20:01:03 +11:00
Darren Tucker c016134588 - markus@cvs.openbsd.org 2004/08/30 09:18:08
[LICENCE]
     s/keygen/keyscan/
2004-11-05 20:00:03 +11:00
Darren Tucker a56f191ef1 - (dtucker) [configure.ac includes.h] Bug #947: Fix compile error on HP-UX
10.x by testing for conflicts in shadow.h and undef'ing _INCLUDE__STDC__
   only if a conflict is detected.
2004-11-02 20:30:54 +11:00
Darren Tucker 35beaddc7e - (dtucker) [uidswap.c] Don't test dropping of gids for the root user or
on Cygwin.  Cygwin parts from vinschen at redhat com; ok djm@
2004-10-19 16:33:33 +10:00
Damien Miller 0e035d816a that was "ok dtucker@" 2004-10-16 18:53:28 +10:00
Damien Miller daffc6a115 - (djm) [auth-pam.c] snprintf->strl*, fix server message length calculations 2004-10-16 18:52:44 +10:00
Darren Tucker dbc2296e2c - (dtucker) [monitor_mm.c openbsd-compat/xmmap.c] Bug #940: cast constants
to void * to appease picky compilers (eg Tru64's "cc -std1").
2004-10-06 23:15:44 +10:00
Darren Tucker b7d55e3eb5 - (dtucker) [README.privsep] Bug #939: update info about HP-UX Trusted Mode
and other PAM platforms.
2004-10-06 20:09:32 +10:00