cbiere
577883a31d
Don't define the deprecated IPV6_RECVDSTADDR if the "advanced IPv6 API" is
...
used because IPV6_RECVPKTINFO and IPV6_PKTINFO are used to prevent
potential bugs in the future just in case that the numeric value of the
socket option is ever recycled.
2006-10-31 00:17:21 +00:00
agc
05ad853be0
one more to catch up with the new location for sha2.h
2006-10-28 23:07:23 +00:00
vanhu
b0d7d1da89
From Michal Ruzicka: fix typos
2006-10-22 15:10:31 +00:00
vanhu
df130f3c13
fixed typos
2006-10-22 15:10:30 +00:00
vanhu
5328e8c78b
Added ipsecdoi_chkcmpids() function
2006-10-19 09:36:22 +00:00
vanhu
3835b0b6a5
From Matthew Grooms: use ipsecdoi_chkcmpids() and changed src/dst to loc/rmt in getsainfo().
2006-10-19 09:35:51 +00:00
vanhu
b0f2fc5ddb
From Matthew Grooms: Added ipsecdoi_chkcmpids() function.
2006-10-19 09:35:44 +00:00
adrianp
9480ff5303
Change the default sshd configuration file so that only protocol version 2
...
is enabled by default. Users can manually add back support for protocol
version 1 in their sshd_config if they have a specific need for it.
Suggested by perry@ and ghen@. Ok'ed security-officer@ and christos@
2006-10-15 14:01:53 +00:00
manu
966e3f130f
Fix memory leak (Coverity 3438 and 3437)
2006-10-09 06:32:59 +00:00
manu
331d3b1287
List modified files for last commit
2006-10-09 06:21:11 +00:00
manu
6eca4f09f3
Correctly check read() return value: it's signed (Coverity 1251)
2006-10-09 06:17:20 +00:00
kardel
f34e7857d3
keep len correct when substituting variables - fixes PR/24458
2006-10-08 22:21:14 +00:00
manu
56f4977415
Camelia cipher support as in RFC 4312, from Tomoyuki Okazaki
...
<okazaki@kick.gr.jp>
2006-10-06 12:02:26 +00:00
christos
ee4546d741
unbreak gcc-3 builds.
2006-10-04 14:31:55 +00:00
christos
a9fc92da63
PR/34681: Scott Ellis: Explicitly include <sys/socket.h>
2006-10-04 14:30:35 +00:00
christos
1eafb02344
put back ignorerootrhosts
2006-10-04 14:26:31 +00:00
manu
20d3dfdcfa
fix endianness issue introduced yesterday
2006-10-03 20:43:10 +00:00
vanhu
2b72a4f236
remoteid/ph1id support
2006-10-03 08:04:31 +00:00
vanhu
b45c893ef4
Added remoteid/ph1id syntax
2006-10-03 08:03:59 +00:00
vanhu
7d2c6acefd
Parses remoteid/ph1id values
2006-10-03 08:03:33 +00:00
vanhu
dd3c365568
Uses remoteid/ph1id values
2006-10-03 08:02:51 +00:00
vanhu
80d5a8a518
Added remoteid/ph1id values
2006-10-03 08:01:56 +00:00
manu
9547d0f260
avoid reusing free'd pointer (Coverity 2613)
2006-10-02 21:51:33 +00:00
manu
1966cc3311
Check for NULL pointer (COverity 4175)
2006-10-02 21:47:32 +00:00
manu
e1ade705e1
Remove dead code (Coverity 3451)
2006-10-02 21:41:59 +00:00
manu
520ec462f7
Fix array overrun (Coverity 4172)
2006-10-02 21:33:14 +00:00
manu
e5d24ec446
Fix memory leak (Coverity 2002)
2006-10-02 21:27:08 +00:00
manu
cdb1e64a8c
Fix memory leak (Coverity 2001), refactor the code to use port get/set
...
functions
2006-10-02 21:19:43 +00:00
manu
cd350eaf6d
Avoid reusing free'd pointer (Coverity 4200)
2006-10-02 20:52:17 +00:00
manu
d564be9350
Don't use NULL pointer (Coverity 3443), reformat to 80 char/line
2006-10-02 18:54:46 +00:00
dogcow
f54a9b4797
If you're going to initialize a pointer, you have to init it with a pointer
...
type, not an int.
2006-10-02 12:44:40 +00:00
manu
68e9583818
Don't use NULL pointer (coverity 3439)
2006-10-02 12:04:53 +00:00
manu
5227e9475b
Don't use NULL pointer (Coverity 1334)
2006-10-02 11:59:40 +00:00
manu
41042afaf6
Don't use NULL pointer (Coverity 944)
2006-10-02 07:17:57 +00:00
manu
01d5ad642c
Don't use NULL pointer (Coverity 941)
2006-10-02 07:15:09 +00:00
manu
9a55720f5c
Don't use NULL pointer (Coverity 942)
2006-10-02 07:12:26 +00:00
manu
bfd607cda0
Don't use null pointer (Coverity 863)
2006-10-02 07:08:25 +00:00
manu
626d146a75
FIx memory leak (Coverity 4181)
2006-10-01 22:04:03 +00:00
manu
7be862b0db
Check that iph1->remote is not NULL before using it (Coverity 3436)
2006-10-01 19:23:57 +00:00
manu
c7242e7e9f
emove dead code (Coverity 4165)
2006-09-30 21:49:37 +00:00
manu
07b750b745
Fix memory leak (Coverity 4179)
2006-09-30 21:38:39 +00:00
manu
df69765a89
update the scripts for wrorking around routing problems on NetBSD
2006-09-30 21:22:21 +00:00
manu
172675f3db
Reuse existing code for closing IKE sockets, and avoid screwing things by
...
setting p->sock = -1, which is not expected (Coverity 4173).
2006-09-30 16:14:18 +00:00
manu
d5f44674f8
Do not free id and key, as they are used later
2006-09-30 15:51:42 +00:00
cube
55269b80c3
Grab a couple of lines from OpenSSH-portable that allow PAM authentication
...
to succeed. I guess the default configuration of NetBSD wasn't tested
before the import...
2006-09-29 22:47:21 +00:00
manu
efb59e1b32
Fix the fix: handle_recv closes the socket, so we must call com_init before
...
sending any data.
2006-09-29 21:39:35 +00:00
christos
8da6ea8890
Check for cert being NULL too.
2006-09-29 17:07:32 +00:00
christos
897b34d36d
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937
...
OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows
remote attackers to cause a denial of service (inifnite loop
and memory consumption) via malformed ASN.1 structures that
trigger an improperly handled error condition.
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940
OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier
versions allows attackers to cause a denial of service (CPU
consumption) via certain public keys that require extra time
to process.
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738
Buffer overflow in the SSL_get_shared_ciphers function in
OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier
versions has unspecified impact and remote attack vectors
involving a long list of ciphers.
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343
Unspecified vulnerability in the SSLv2 client code in OpenSSL
0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions
allows remote servers to cause a denial of service (client
crash) via unknown vectors.
2006-09-29 15:41:08 +00:00
he
f1afbc1ee7
Use PRIu64 instead of llu when printing an u_int64_t.
...
Fixes a build problem for our LP64 ports, where u_int64_t is
typically an unsigned long.
2006-09-29 14:36:34 +00:00
he
a4970f4ee7
The "success" field in Authctxt needs to be a sig_atomic_t, not an int,
...
so that we don't get a type conflict on dispatch_run() invocation. Found
while building for alpha and amd64.
2006-09-29 14:34:25 +00:00