Damien Miller
3eb48b6245
- otto@cvs.openbsd.org 2005/02/16 09:56:44
...
[ssh.c]
Better diagnostic if an identity file is not accesible. ok markus@ djm@
2005-03-01 21:15:46 +11:00
Darren Tucker
dc8fc62103
- (dtucker) [Makefile.in] Add a install-nosysconf target for installing the
...
binaries without the config files. Primarily useful for packaging.
Patch from phil at usc.edu. ok djm@
2005-02-26 10:12:38 +11:00
Darren Tucker
3804903a09
- (dtucker) [acconfig.h configure.ac openbsd-compat/bsd-misc.{c,h}]
...
Remove SETGROUPS_NOOP, was only used by Cygwin, which doesn't need it any
more. Patch from vinschen at redhat.com.
2005-02-26 10:07:37 +11:00
Darren Tucker
34233830a1
- (dtucker) [openbsd-compat/bsd-openpty.c openbsd-compat/inet_ntop.c]
...
Remove two obsolete Cygwin #ifdefs. Patch from vinschen at redhat.com.
2005-02-26 10:04:28 +11:00
Damien Miller
848b993639
- (djm) [configure.ac] in_addr_t test needs sys/types.h too
2005-02-24 12:12:34 +11:00
Darren Tucker
2ea9b18918
- (dtucker) [uidswap.c] Skip uid restore test on Cygwin. Patch from
...
vinschen at redhat.com.
2005-02-22 17:57:13 +11:00
Darren Tucker
04cfbe04aa
- (dtucker) [configure.ac] Missing comma in AIX section, somehow causes
...
unrelated platforms to be configured incorrectly.
2005-02-20 23:27:11 +11:00
Darren Tucker
d9f88915a2
- (dtucker) [LICENCE Makefile.in README.platform audit-bsm.c configure.ac
...
defines.h] Bug #125 : Add *EXPERIMENTAL* BSM audit support. Configure
--with-audit=bsm to enable. Patch originally from Sun Microsystems,
parts by John R. Jackson. ok djm@
2005-02-20 21:01:48 +11:00
Darren Tucker
3c774c52f3
- (dtucker) [configure.ac openbsd-compat/port-aix.{c,h}] Silence some more
...
compiler warnings on AIX.
2005-02-16 22:49:31 +11:00
Darren Tucker
c97b01af62
- (dtucker) [session.c] Bug #918 : store credentials from gssapi-with-mic
...
authentication early enough to be available to PAM session modules when
privsep=yes. Patch from deengert at anl.gov, ok'ed in principle by Sam
Hartman and similar to Debian's ssh-krb5 package.
2005-02-16 16:47:37 +11:00
Darren Tucker
ca6e7a7e8b
- (dtucker) [configure.ac] Bug #893 : check for libresolv early on Reliant
...
Unix; prevents problems relating to the location of -lresolv in the
link order.
2005-02-16 16:19:17 +11:00
Darren Tucker
a91f5ee618
- (dtucker) [auth-shadow.c] Prevent compiler warnings if "DAY" is defined
...
by the system headers.
2005-02-16 14:20:06 +11:00
Darren Tucker
7b48d25527
- (dtucker) [ssh-rand-helper.c] Provide seed_rng since it may be called
...
via mkstemp in some configurations. ok djm@
2005-02-16 13:20:07 +11:00
Damien Miller
ed462d9a45
write seed to temporary file and atomically rename into place; ok dtucker@
2005-02-16 13:02:45 +11:00
Darren Tucker
a39f83eeee
- (dtucker) [loginrec.c] Add missing #include.
2005-02-15 22:19:28 +11:00
Darren Tucker
691d5235ca
- (dtucker) [README.platform auth.c configure.ac loginrec.c
...
openbsd-compat/port-aix.c openbsd-compat/port-aix.h] Bug #835 : enable IPv6
on AIX where possible (see README.platform for details) and work around
a misfeature of AIX's getnameinfo. ok djm@
2005-02-15 21:45:57 +11:00
Darren Tucker
f04c361675
- (dtucker) [config.sh.in] Collect oslevel -r too.
2005-02-15 21:26:32 +11:00
Darren Tucker
15af68f767
- (dtucker) [openbsd-compat/fake-rfc2553.h] We now need EAI_SYSTEM too.
2005-02-11 18:32:13 +11:00
Darren Tucker
1b6f2291e4
- (dtucker) [configure.ac] Tidy up configure --help output.
2005-02-11 16:11:49 +11:00
Darren Tucker
2f9573df71
- (dtucker) [configure.ac] Bug #919 : Provide visible feedback for the
...
--disable-etc-default-login configure option.
2005-02-10 22:28:54 +11:00
Darren Tucker
33370e0287
- (dtucker) [configure.ac session.c] Some platforms (eg some SCO) require
...
the username to be passed to the passwd command when changing expired
passwords. ok djm@
2005-02-09 22:17:28 +11:00
Darren Tucker
c7e38d59e9
- (dtucker) [configure.ac] Bug #854 : prepend pwd to relative --with-ssl-dir
...
paths. ok djm@
2005-02-09 22:12:30 +11:00
Darren Tucker
92170a8626
- (dtucker) [auth-passwd.c openbsd-compat/port-aix.c] Don't call
...
disable_forwarding() from compat library. Prevent linker errrors trying
to resolve it for binaries other than sshd. ok djm@
2005-02-09 17:08:23 +11:00
Darren Tucker
96d4710e38
- dtucker@cvs.openbsd.org 2005/02/08 22:24:57
...
[sshd.c]
Provide reason in error message if getnameinfo fails; ok markus@
2005-02-09 09:53:48 +11:00
Darren Tucker
5b53026f71
- dtucker@cvs.openbsd.org 2005/01/30 11:18:08
...
[monitor.c]
Make code match intent; ok djm@
2005-02-09 09:52:17 +11:00
Darren Tucker
43d8e28763
- jmc@cvs.openbsd.org 2005/01/28 18:14:09
...
[ssh_config.5]
wording;
ok markus@
2005-02-09 09:51:08 +11:00
Darren Tucker
79a7acfebd
- jmc@cvs.openbsd.org 2005/01/28 15:05:43
...
[ssh_config.5]
grammar;
2005-02-09 09:48:57 +11:00
Darren Tucker
3f166dfcb5
- dtucker@cvs.openbsd.org 2005/01/28 09:45:53
...
[ssh_config]
Make it clear that the example entries in ssh_config are only some of the
commonly-used options and refer the user to ssh_config(5) for more
details; ok djm@
2005-02-09 09:46:47 +11:00
Darren Tucker
2e0cf0dca2
- (dtucker) [audit.c audit.h auth.c auth1.c auth2.c loginrec.c monitor.c
...
monitor_wrap.c monitor_wrap.h session.c sshd.c]: Prepend all of the audit
defines and enums with SSH_ to prevent namespace collisions on some
platforms (eg AIX).
2005-02-08 21:52:47 +11:00
Darren Tucker
b4d3012d2e
- (dtucker) [openbsd-compat/port-aix.c] Silence compiler warnings.
2005-02-08 21:06:55 +11:00
Darren Tucker
feb6f7f244
- (dtucker) [regress/test-exec.sh] Bug #912 : Set _POSIX2_VERSION for the
...
regress tests so newer versions of GNU head(1) behave themselves. Patch
by djm, so ok me.
2005-02-08 20:17:17 +11:00
Darren Tucker
40d9a63788
- (dtucker) [auth.c] Fix parens in audit log check.
2005-02-04 15:19:44 +11:00
Darren Tucker
598ba7b5e2
- (dtucker) [monitor.c] Permit INVALID_USER audit events from slave too.
2005-02-04 15:05:08 +11:00
Darren Tucker
6dce99142b
typo
2005-02-03 15:07:37 +11:00
Darren Tucker
269a1ea1c8
- (dtucker) [Makefile.in auth.c auth.h auth1.c auth2.c loginrec.c monitor.c
...
monitor.h monitor_wrap.c monitor_wrap.h session.c sshd.c] Bug #125 :
(first stage) Add audit instrumentation to sshd, currently disabled by
default. with suggestions from and djm@
2005-02-03 00:20:53 +11:00
Darren Tucker
2fba993080
- (dtucker) [auth.c canohost.c canohost.h configure.ac defines.h loginrec.c]
...
Bug #974 : Teach sshd to write failed login records to btmp for failed auth
attempts (currently only for password, kbdint and C/R, only on Linux and
HP-UX), based on code from login.c from util-linux. With ashok_kovai at
hotmail.com, ok djm@
2005-02-02 23:30:24 +11:00
Darren Tucker
9dc6c7dbec
- (dtucker) [session.c sshd.c] Bug #445 : Propogate KRB5CCNAME if set to child
...
the process. Since we also unset KRB5CCNAME at startup, if it's set after
authentication it must have been set by the platform's native auth system.
This was already done for AIX; this enables it for the general case.
2005-02-02 18:30:33 +11:00
Darren Tucker
42d9dc75ed
- (dtucker) [auth.c loginrec.h openbsd-compat/{bsd-cray,port-aix}.{c,h}]
...
Make record_failed_login() call provide hostname rather than having the
implementations having to do lookups themselves. Only affects AIX and
UNICOS (the latter only uses the "user" parameter anyway). ok djm@
2005-02-02 17:10:11 +11:00
Darren Tucker
ad7646a59a
- (dtucker) [configure.ac openbsd-compat/realpath.c] Sync up with realpath
...
rev 1.11 from OpenBSD and make it use fchdir if available. ok djm@
2005-02-02 10:43:59 +11:00
Darren Tucker
9dca099aec
- (dtucker) [sshd_config.5] Bug #701 : remove warning about
...
keyboard-interactive since this is no longer the case.
2005-02-01 19:16:45 +11:00
Darren Tucker
9b5495d23e
- (dtucker) [log.c] Bug #973 : force log_init() to open syslog, since on some
...
platforms syslog will revert to its default values. This may result in
messages from external libraries (eg libwrap) being sent to a different
facility.
2005-02-01 17:35:09 +11:00
Darren Tucker
218f178cb2
- dtucker@cvs.openbsd.org 2005/01/24 11:47:13
...
[auth-passwd.c]
#if -> #ifdef so builds without HAVE_LOGIN_CAP work too; ok djm@ otto@
2005-01-24 22:50:47 +11:00
Darren Tucker
1b7223c005
- dtucker@cvs.openbsd.org 2005/01/24 10:29:06
...
[moduli]
Import new moduli; requested by deraadt@ a week ago
2005-01-24 22:00:40 +11:00
Darren Tucker
ba66df81a3
- dtucker@cvs.openbsd.org 2005/01/24 10:22:06
...
[scp.c sftp.c]
Have scp and sftp wait for the spawned ssh to exit before they exit
themselves. This prevents ssh from being unable to restore terminal
modes (not normally a problem on OpenBSD but common with -Portable
on POSIX platforms). From peak at argo.troja.mff.cuni.cz (bz#950);
ok djm@ markus@
2005-01-24 21:57:40 +11:00
Darren Tucker
660db78af2
- djm@cvs.openbsd.org 2005/01/23 10:18:12
...
[cipher.c]
config option "Ciphers" should be case-sensitive; ok dtucker@
2005-01-24 21:57:11 +11:00
Darren Tucker
094cd0ba02
- dtucker@cvs.openbsd.org 2005/01/22 08:17:59
...
[auth.c]
Log source of connections denied by AllowUsers, DenyUsers, AllowGroups and
DenyGroups. bz #909 , ok djm@
2005-01-24 21:56:48 +11:00
Darren Tucker
5c14c73429
- otto@cvs.openbsd.org 2005/01/21 08:32:02
...
[auth-passwd.c sshd.c]
Warn in advance for password and account expiry; initialize loginmsg
buffer earlier and clear it after privsep fork. ok and help dtucker@
markus@
2005-01-24 21:55:49 +11:00
Darren Tucker
3c66080aa2
- (dtucker) [auth-chall.c auth.h auth2-chall.c] Bug #936 : Remove pam from
...
the list of available kbdint devices if UsePAM=no. ok djm@
2005-01-20 22:20:50 +11:00
Darren Tucker
33bc334a8b
- (dtucker) [loginrec.h] Bug #952 : Increase size of username field to 128
...
bytes to prevent errors from login_init_entry() when the username is
exactly 64 bytes(!) long. From brhamon at cisco.com, ok djm@
2005-01-20 22:07:29 +11:00
Darren Tucker
d231186fd0
- djm@cvs.openbsd.org 2004/12/22 02:13:19
...
[cipher-ctr.c cipher.c]
remove fallback AES support for old OpenSSL, as OpenBSD has had it for
many years now; ok deraadt@
(Id sync only: Portable will continue to support older OpenSSLs)
2005-01-20 13:27:56 +11:00
Darren Tucker
36a3d60347
- (dtucker) [auth-pam.c] Bug #971 : Prevent leaking information about user
...
existence via keyboard-interactive/pam, in conjunction with previous
auth2-chall.c change; with Colin Watson and djm.
2005-01-20 12:43:38 +11:00
Darren Tucker
611649ebf0
- dtucker@cvs.openbsd.org 2005/01/19 13:11:47
...
[auth-bsdauth.c auth2-chall.c]
Have keyboard-interactive code call the drivers even for responses for
invalid logins. This allows the drivers themselves to decide how to
handle them and prevent leaking information where possible. Existing
behaviour for bsdauth is maintained by checking authctxt->valid in the
bsdauth driver. Note that any third-party kbdint drivers will now need
to be able to handle responses for invalid logins. ok markus@
2005-01-20 11:05:34 +11:00
Darren Tucker
ea7c8127ce
- dtucker@cvs.openbsd.org 2005/01/17 22:48:39
...
[sshd.c]
Make debugging output continue after reexec; ok djm@
2005-01-20 11:03:08 +11:00
Darren Tucker
f0e792ec1c
- dtucker@cvs.openbsd.org 2005/01/17 03:25:46
...
[moduli.c]
Correct spelling: SCHNOOR->SCHNORR; ok djm@
2005-01-20 11:02:26 +11:00
Darren Tucker
b3509014ce
- jmc@cvs.openbsd.org 2005/01/08 00:41:19
...
[sshd_config.5]
`login'(n) -> `log in'(v);
2005-01-20 11:01:46 +11:00
Darren Tucker
b2161e37f5
- markus@cvs.openbsd.org 2005/01/05 08:51:32
...
[sshconnect.c]
remove dead code, log connect() failures with level error, ok djm@
2005-01-20 11:00:46 +11:00
Darren Tucker
0f38323222
- djm@cvs.openbsd.org 2004/12/23 23:11:00
...
[servconf.c servconf.h sshd.c sshd_config sshd_config.5]
bz #898 : support AddressFamily in sshd_config. from
peak@argo.troja.mff.cuni.cz ; ok deraadt@
2005-01-20 10:57:56 +11:00
Darren Tucker
7cfeecf670
- markus@cvs.openbsd.org 2004/12/23 17:38:07
...
[ssh-keygen.c]
leak; from mpech
2005-01-20 10:56:31 +11:00
Darren Tucker
172a5e8cb8
- markus@cvs.openbsd.org 2004/12/23 17:35:48
...
[session.c]
check for NULL; from mpech
2005-01-20 10:55:46 +11:00
Darren Tucker
24c710e498
- (dtucker) [survey.sh.in] Remove any blank lines from the output of
...
ccver-v and ccver-V.
2005-01-18 12:45:42 +11:00
Darren Tucker
72c025d9f0
- (dtucker) [INSTALL Makefile.in configure.ac survey.sh.in] Implement
...
"make survey" and "make send-survey". This will provide data on the
configure parameters, platform and platform features to the development
team, which will allow (among other things) better targetting of testing.
It's entirely voluntary and is off be default. ok djm@
2005-01-18 12:05:18 +11:00
Darren Tucker
5caa78b1b7
- (dtucker) [regress/rekey.sh] Touch datafile before filling with dd, since
...
on some wacky platforms (eg old AIXes), dd will refuse to create an output
file if it doesn't exist.
2004-12-20 12:35:42 +11:00
Darren Tucker
8686ed7508
- (dtucker) [ssh-rand-helper.c] Fall back to command-based seeding if reading
...
from prngd is enabled at compile time but fails at run time, eg because
prngd is not running. Note that if you have prngd running when OpenSSH is
built, OpenSSL will consider itself internally seeded and rand-helper won't
be built at all unless explicitly enabled via --with-rand-helper. ok djm@
2004-12-20 12:05:08 +11:00
Darren Tucker
442a383418
- (dtucker) [contrib/findssh.sh] Clean up on interrupt; from
...
amarendra.godbole at ge com.
2004-12-13 18:08:32 +11:00
Darren Tucker
f0f90989fa
- dtucker@cvs.openbsd.org 2004/12/11 01:48:56
...
[auth-rsa.c auth2-pubkey.c authfile.c misc.c misc.h]
Fix debug call in error path of authorized_keys processing and fix related
warnings; ok djm@
2004-12-11 13:39:50 +11:00
Darren Tucker
596dcfa21f
- fgsch@cvs.openbsd.org 2004/12/10 03:10:42
...
[sftp.c]
- fix globbed ls for paths the same lenght as the globbed path when
we have a unique matching.
- fix globbed ls in case of a directory when we have a unique matching.
- as a side effect, if the path does not exist error (used to silently
ignore).
- don't do extra do_lstat() if we only have one matching file.
djm@ ok
2004-12-11 13:37:22 +11:00
Darren Tucker
56c9598e5e
- (dtucker) OpenBSD CVS Sync
...
- markus@cvs.openbsd.org 2004/12/06 16:00:43
[bufaux.c]
use 0x00 not \0 since buf[] is a bignum
2004-12-11 13:34:56 +11:00
Tim Rice
0f83d2907c
[configure.ac] Comment some non obvious platforms in the target-specific
...
case statement. Suggested and OK by dtucker@
2004-12-08 18:29:58 -08:00
Darren Tucker
641b34c72b
- (dtucker) [regress/scp.sh] Use portable-friendly $DIFFOPTs in new test.
2004-12-07 11:26:15 +11:00
Darren Tucker
d028fea13a
- dtucker@cvs.openbsd.org 2004/12/06 10:49:56
...
[test-exec.sh]
Check if TEST_SSH_SSHD is a full path to sshd before searching; ok markus@
2004-12-06 23:16:29 +11:00
Darren Tucker
cc0603d4b6
- dtucker@cvs.openbsd.org 2004/11/25 09:39:27
...
[test-exec.sh]
Remove obsolete RhostsAuthentication from test config; ok markus@
2004-12-06 23:13:50 +11:00
Darren Tucker
79ec66e980
- djm@cvs.openbsd.org 2004/11/07 00:32:41
...
[multiplex.sh]
regression tests for new multiplex commands
2004-12-06 23:12:15 +11:00
Darren Tucker
124f58ecba
- djm@cvs.openbsd.org 2004/10/29 23:59:22
...
[Makefile added brokenkeys.sh]
regression test for handling of corrupt keys in authorized_keys file
2004-12-06 23:07:37 +11:00
Darren Tucker
71b5643598
- djm@cvs.openbsd.org 2004/10/08 02:01:50
...
[reexec.sh]
shrink and tidy; ok dtucker@
2004-12-06 23:05:52 +11:00
Darren Tucker
3206e57e93
- david@cvs.openbsd.org 2004/07/09 19:45:43
...
[Makefile]
add a missing CLEANFILES used in the re-exec test
2004-12-06 23:04:57 +11:00
Darren Tucker
ccf0779185
- dtucker@cvs.openbsd.org 2004/07/08 12:59:35
...
[scp.sh]
Regress test for bz #863 (scp double-error), requires $SUDO. ok markus@
2004-12-06 23:03:27 +11:00
Darren Tucker
a372960fa9
- djm@cvs.openbsd.org 2004/06/26 06:16:07
...
[reexec.sh]
don't change the name of the copied sshd for the reexec fallback test,
makes life simpler for portable
2004-12-06 23:00:27 +11:00
Darren Tucker
22cc741096
- dtucker@cvs.openbsd.org 2004/12/06 11:41:03
...
[auth-rsa.c auth2-pubkey.c authfile.c misc.c misc.h ssh.h sshd.8]
Discard over-length authorized_keys entries rather than complaining when
they don't decode. bz #884 , with & ok djm@
2004-12-06 22:47:41 +11:00
Darren Tucker
16e254d179
- jaredy@cvs.openbsd.org 2004/12/05 23:55:07
...
[sftp.1]
- explain that patterns can be used as arguments in get/put/ls/etc
commands (prodded by Michael Knudsen)
- describe ls flags as a list
- other minor improvements
ok jmc, djm
2004-12-06 22:46:45 +11:00
Darren Tucker
e2f189a841
- djm@cvs.openbsd.org 2004/11/29 07:41:24
...
[sftp-client.h sftp.c]
Some small fixes from moritz@jodeit.org . ok deraadt@
2004-12-06 22:45:53 +11:00
Darren Tucker
0133a727ac
- jmc@cvs.openbsd.org 2004/11/29 00:05:17
...
[sftp.1]
missing full stop;
2004-12-06 22:44:32 +11:00
Darren Tucker
cd516efea1
- (dtucker) OpenBSD CVS Sync
...
- markus@cvs.openbsd.org 2004/11/25 22:22:14
[sftp-client.c sftp.c]
leak; from mpech
2004-12-06 22:43:43 +11:00
Darren Tucker
ba2abb3699
- (dtucker) [TODO WARNING.RNG] Update to reflect current reality. ok djm@
2004-12-06 22:40:10 +11:00
Darren Tucker
c13866719f
- (dtucker) [auth1.c auth2.c] If the user successfully authenticates but is
...
subsequently denied by the PAM auth stack, send the PAM message to the
user via packet_disconnect (Protocol 1) or userauth_banner (Protocol 2).
ok djm@
2004-12-03 14:33:47 +11:00
Darren Tucker
9c6bf325c0
- jmc@cvs.openbsd.org 2004/11/07 17:57:30
...
[ssh.c]
usage():
- add -O
- sync -S w/ manpage
- remove -h
2004-12-03 14:10:19 +11:00
Darren Tucker
e04644c162
- (dtucker) OpenBSD CVS Sync
...
- jmc@cvs.openbsd.org 2004/11/07 17:42:36
[ssh.1]
options sort, and whitespace;
2004-12-03 14:08:45 +11:00
Darren Tucker
16bcc1c92e
- (dtucker) [INSTALL Makefile.in configure.ac] Add --with-libedit configure
...
option and supporting makefile bits and documentation.
2004-11-07 20:14:34 +11:00
Darren Tucker
7ebfc10884
- djm@cvs.openbsd.org 2004/11/07 00:01:46
...
[clientloop.c clientloop.h ssh.1 ssh.c]
add basic control of a running multiplex master connection; including the
ability to check its status and request it to exit; ok markus@
2004-11-07 20:06:19 +11:00
Darren Tucker
2d963d8721
- djm@cvs.openbsd.org 2004/11/05 12:19:56
...
[sftp.c]
command editing and history support via libedit; ok markus@
thanks to hshoexer@ and many testers on tech@ too
2004-11-07 20:04:10 +11:00
Darren Tucker
08d04faf24
- djm@cvs.openbsd.org 2004/10/29 23:57:05
...
[key.c]
use new buffer API to avoid fatal errors on corrupt keys in authorized_keys
files; ok markus@
2004-11-05 20:42:28 +11:00
Darren Tucker
50dbe8314b
- djm@cvs.openbsd.org 2004/10/29 23:56:17
...
[bufaux.c bufaux.h buffer.c buffer.h]
introduce a new buffer API that returns an error rather than fatal()ing
when presented with bad data; ok markus@
2004-11-05 20:41:24 +11:00
Darren Tucker
ce327b62ac
- djm@cvs.openbsd.org 2004/10/29 22:53:56
...
[clientloop.c misc.h readpass.c ssh-agent.c]
factor out common permission-asking code to separate function; ok markus@
2004-11-05 20:38:03 +11:00
Darren Tucker
5d78de6283
- djm@cvs.openbsd.org 2004/10/29 21:47:15
...
[channels.c channels.h clientloop.c]
fix some window size change bugs for multiplexed connections: windows sizes
were not being updated if they had changed after ~^Z suspends and SIGWINCH
was not being processed unless the first connection had requested a tty;
ok markus
2004-11-05 20:35:44 +11:00
Darren Tucker
b2694f0e8a
- markus@cvs.openbsd.org 2004/10/20 11:48:53
...
[packet.c ssh1.h]
disconnect for invalid (out of range) message types.
2004-11-05 20:27:54 +11:00
Darren Tucker
1dee8683fb
- djm@cvs.openbsd.org 2004/10/07 10:12:36
...
[ssh-agent.c]
don't unlink agent socket when bind() fails, spotted by rich AT
rich-paul.net, ok markus@
2004-11-05 20:26:49 +11:00
Darren Tucker
636ca90247
- djm@cvs.openbsd.org 2004/10/07 10:10:24
...
[scp.1 sftp.1 ssh.1 ssh_config.5]
document KbdInteractiveDevices; ok markus@
2004-11-05 20:22:00 +11:00
Darren Tucker
3269b13817
- djm@cvs.openbsd.org 2004/09/25 03:45:14
...
[sshd.c]
these printf args are no longer double; ok deraadt@ markus@
2004-11-05 20:20:59 +11:00
Darren Tucker
39207a46b4
- djm@cvs.openbsd.org 2004/09/23 13:00:04
...
[ssh.c]
correctly honour -n in multiplex client mode; spotted by sturm@ ok markus@
2004-11-05 20:19:51 +11:00
Darren Tucker
f30e1acc62
- deraadt@cvs.openbsd.org 2004/09/15 18:46:04
...
[scp.c]
scratch that do { } while (0) wrapper in this case
2004-11-05 20:10:02 +11:00
Darren Tucker
178fa66a64
- mickey@cvs.openbsd.org 2004/09/15 18:42:27
...
[sshd.c]
use less doubles in daemons; markus@ ok
2004-11-05 20:09:09 +11:00