summaryrefslogtreecommitdiff
path: root/ssh-rand-helper.c
Commit message (Collapse)AuthorAgeFilesLines
* - stevesk@cvs.openbsd.org 2006/07/06 16:03:53Damien Miller2006-07-101-0/+1
| | | | | | | | | | | [auth-options.c auth-options.h auth-passwd.c auth-rh-rsa.c] [auth-rhosts.c auth-rsa.c auth.c auth.h auth2-hostbased.c] [auth2-pubkey.c auth2.c includes.h misc.c misc.h monitor.c] [monitor_wrap.c monitor_wrap.h scp.c serverloop.c session.c] [session.h sftp-common.c ssh-add.c ssh-keygen.c ssh-keysign.c] [ssh.c sshconnect.c sshconnect.h sshd.c sshpty.c sshpty.h uidswap.c] [uidswap.h] move #include <pwd.h> out of includes.h; ok markus@
* - stevesk@cvs.openbsd.org 2006/07/05 02:42:09Damien Miller2006-07-101-0/+3
| | | | | | | [canohost.c hostfile.c includes.h misc.c packet.c readconf.c] [serverloop.c sshconnect.c uuencode.c] move #include <netinet/in.h> out of includes.h; ok deraadt@ (also ssh-rand-helper.c logintest.c loginrec.c)
* - (dtucker) [ssh-rand-helper.c] Don't exit if mkdir fails because theDarren Tucker2006-07-051-2/+2
| | | | target already exists.
* - (dtucker) [ssh-rand-helper.c] Check return code of mkdir and fix fileDarren Tucker2006-05-171-1/+3
| | | | pointer leak. From kjhall at us.ibm.com, found by coverity.
* - (dtucker) [auth-pam.c groupaccess.c monitor.c monitor_wrap.c scard-opensc.cDarren Tucker2006-05-041-2/+1
| | | | | | | session.c ssh-rand-helper.c sshd.c openbsd-compat/bsd-cygwin_util.c openbsd-compat/setproctitle.c] Convert malloc(foo*bar) -> calloc(foo,bar) in Portable-only code; since calloc zeros, remove now-redundant memsets. Also add a couple of sanity checks. With & ok djm@
* - djm@cvs.openbsd.org 2006/03/25 01:13:23Damien Miller2006-03-261-2/+2
| | | | | | | | | | | | [buffer.c channels.c deattack.c misc.c scp.c session.c sftp-client.c] [sftp-server.c ssh-agent.c ssh-rsa.c xmalloc.c xmalloc.h auth-pam.c] [uidswap.c] change OpenSSH's xrealloc() function from being xrealloc(p, new_size) to xrealloc(p, new_nmemb, new_itemsize). realloc is particularly prone to integer overflows because it is almost always allocating "n * size" bytes, so this is a far safer API; ok deraadt@
* - deraadt@cvs.openbsd.org 2006/03/19 18:51:18Damien Miller2006-03-261-2/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | [atomicio.c auth-bsdauth.c auth-chall.c auth-krb5.c auth-options.c] [auth-pam.c auth-passwd.c auth-rh-rsa.c auth-rhosts.c auth-rsa.c] [auth-shadow.c auth-skey.c auth.c auth1.c auth2-chall.c] [auth2-hostbased.c auth2-kbdint.c auth2-none.c auth2-passwd.c] [auth2-pubkey.c auth2.c authfd.c authfile.c bufaux.c buffer.c] [canohost.c channels.c cipher-3des1.c cipher-acss.c cipher-aes.c] [cipher-bf1.c cipher-ctr.c cipher.c cleanup.c clientloop.c compat.c] [compress.c deattack.c dh.c dispatch.c dns.c entropy.c fatal.c] [groupaccess.c hostfile.c includes.h kex.c kexdh.c kexdhc.c] [kexdhs.c kexgex.c kexgexc.c kexgexs.c key.c log.c loginrec.c] [loginrec.h logintest.c mac.c match.c md-sha256.c md5crypt.c misc.c] [monitor.c monitor_fdpass.c monitor_mm.c monitor_wrap.c msg.c] [nchan.c packet.c progressmeter.c readconf.c readpass.c rsa.c] [scard.c scp.c servconf.c serverloop.c session.c sftp-client.c] [sftp-common.c sftp-glob.c sftp-server.c sftp.c ssh-add.c] [ssh-agent.c ssh-dss.c ssh-keygen.c ssh-keyscan.c ssh-keysign.c] [ssh-rand-helper.c ssh-rsa.c ssh.c sshconnect.c sshconnect1.c] [sshconnect2.c sshd.c sshlogin.c sshpty.c sshtty.c ttymodes.c] [uidswap.c uuencode.c xmalloc.c openbsd-compat/bsd-arc4random.c] [openbsd-compat/bsd-closefrom.c openbsd-compat/bsd-cygwin_util.c] [openbsd-compat/bsd-getpeereid.c openbsd-compat/bsd-misc.c] [openbsd-compat/bsd-nextstep.c openbsd-compat/bsd-snprintf.c] [openbsd-compat/bsd-waitpid.c openbsd-compat/fake-rfc2553.c] RCSID() can die
* - (djm) [ssh-rand-helper.c] Needs a bunch of headersDamien Miller2006-03-151-1/+12
|
* -(djm) [audit.c auth1.c auth2.c entropy.c loginrec.c serverloop.c]Damien Miller2005-07-171-3/+3
| | | | [ssh-rand-helper.c] fix portable 2nd level indents at 4 spaces too
* - (djm) [acss.c auth-pam.c auth-shadow.c auth-skey.c auth1.c canohost.c]Damien Miller2005-07-171-2/+2
| | | | | [cipher-acss.c loginrec.c ssh-rand-helper.c sshd.c] Fix whitespace at EOL in portable too ("perl -p -i -e 's/\s+$/\n/' *.[ch]")
* - (djm) [loginrec.c ssh-rand-helper.c] Fix -Wsign-compare for portable,Damien Miller2005-06-191-5/+5
| | | | tested and fixes tim@
* Document the path to seed_rng betterDarren Tucker2005-02-161-3/+3
|
* - (dtucker) [ssh-rand-helper.c] Provide seed_rng since it may be calledDarren Tucker2005-02-161-1/+13
| | | | via mkstemp in some configurations. ok djm@
* write seed to temporary file and atomically rename into place; ok dtucker@Damien Miller2005-02-161-9/+29
|
* - (dtucker) [ssh-rand-helper.c] Fall back to command-based seeding if readingDarren Tucker2004-12-201-16/+27
| | | | | | | from prngd is enabled at compile time but fails at run time, eg because prngd is not running. Note that if you have prngd running when OpenSSH is built, OpenSSL will consider itself internally seeded and rand-helper won't be built at all unless explicitly enabled via --with-rand-helper. ok djm@
* - (djm) [ssh-rand-helper.c] Typo. Found byDamien Miller2004-08-231-2/+2
| | | | Martin.Kraemer AT Fujitsu-Siemens.com
* - (dtucker) [logintest.c scp.c sftp-server.c sftp.c ssh-add.c ssh-agent.cDarren Tucker2004-07-171-5/+1
| | | | | | ssh-keygen.c ssh-keyscan.c ssh-keysign.c ssh-rand-helper.c ssh.c sshd.c openbsd-compat/bsd-misc.c] Move "char *__progname" to bsd-misc.c. Reduces diff vs OpenBSD; ok mouring@, tested by tim@ too.
* - djm@cvs.openbsd.org 2004/06/13 15:03:02Damien Miller2004-06-151-5/+1
| | | | | | | [channels.c channels.h clientloop.c clientloop.h includes.h readconf.c] [readconf.h scp.1 sftp.1 ssh.1 ssh.c ssh_config.5] implement session multiplexing in the client (the server has supported this since 2.0); ok markus@
* more whitespace (tabs this time)Damien Miller2003-11-211-6/+6
|
* - djm@cvs.openbsd.org 2003/11/21 11:57:03Damien Miller2003-11-211-19/+19
| | | | | | [everything] unexpand and delete whitespace at EOL; ok markus@ (done locally and RCS IDs synced)
* - (bal) "extration" -> "extraction" in ssh-rand-helper.c; repoted by johnBen Lindstrom2003-09-221-2/+2
| | | | on #unixhelp@efnet
* - (djm) s/get_progname/ssh_get_progname/g to avoid conflict with HeimdalDamien Miller2003-08-221-2/+2
| | | | -lbroken; ok dtucker
* - (dtucker) [ssh-rand-helper.c loginrec.c]Darren Tucker2003-07-061-4/+4
| | | | Apply atomicio typing change to these too.
* - (djm) A few type mismatch fixes from Bug #565Damien Miller2003-05-161-4/+4
|
* - (djm) Fix return value checks for RAND_bytes. Report fromDamien Miller2003-03-171-3/+5
| | | | Steve G <linux_4ever@yahoo.com>
* - (djm) Kill ssh-rand-helper children on timeout, patch fromDamien Miller2002-10-211-1/+2
| | | | dtucker@zip.com.au
* - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsignedKevin Steves2002-07-281-7/+6
| | | | char arg.
* unexpandBen Lindstrom2002-06-091-2/+2
|
* - (djm) ssh-rand-helper improvementsDamien Miller2002-04-141-13/+69
| | | | | | - Add commandline debugging options - Don't write binary data if stdout is a tty (use hex instead) - Give it a manpage
* - (djm) OpenBSD CVS SyncDamien Miller2002-02-101-2/+2
| | | | | | | - deraadt@cvs.openbsd.org 2002/02/09 17:37:34 [pathnames.h session.c ssh.1 sshd.8 sshd_config ssh-keyscan.1] move ssh config files to /etc/ssh - (djm) Adjust portable Makefile.in tnd ssh-rand-helper.c o match
* - (djm) Fix some bugs I introduced into ssh-rand-helper yesterdayDamien Miller2002-01-221-9/+5
|
* - (djm) Rework ssh-rand-helper:Damien Miller2002-01-211-348/+349
| | | | | | | | - Reduce quantity of ifdef code, in preparation for ssh_rand_conf - Always seed from system calls, even when doing PRNGd seeding - Tidy and comment #define knobs - Remove unused facility for multiple runs through command list - KNF, cleanup, update copyright
* - (stevesk) [Makefile.in ssh-rand-helper.c]Kevin Steves2001-12-251-1/+8
| | | | portable lib and __progname support for ssh-rand-helper; ok djm@
* - (djm) Ignore fix & patchlevel in OpenSSL version check. Patch fromDamien Miller2001-12-241-0/+805
solar@openwall.com - (djm) Rework entropy code. If the OpenSSL PRNG is has not been internally seeded, execute a subprogram "ssh-rand-helper" to obtain some entropy for us. Rewrite the old in-process entropy collecter as an example ssh-rand-helper. - (djm) Always perform ssh_prng_cmds path lookups in configure, even if we don't end up using ssh_prng_cmds (so we always get a valid file)