Commit Graph

33 Commits

Author SHA1 Message Date
wiz
7e29440d57 Misc. improvements, sort SEE ALSO. 2001-11-10 08:05:51 +00:00
gmcgarry
6b3997421a Add and install skey(3). 2001-11-10 06:11:10 +00:00
wiz
f1bde32520 s/necesary/necessary/ 2001-07-24 16:43:02 +00:00
wiz
14dbdf5518 Negative exit code cleanup: Replace exit(-x) with exit(x).
As seen on tech-userlevel.
2001-04-06 11:13:45 +00:00
mjl
8e859a9e3f Revert minor to 0 since there is no abi change on request of thorpej. 2001-03-12 00:45:25 +00:00
mjl
b822e3e5a8 Fix incorrect SHA1 calculation on big endian machines reported
in PR/12045 by John Valdes, who also provided the problem's
solution and a patch.

XXX This problem could have been caught about a year ago if we
XXX just ran the regression tests on every build!
2001-03-11 13:57:45 +00:00
thorpej
f9bf570b22 skey_keyinfo() returns a pointer to a static buffer, so
const'ify it.
2000-07-28 16:35:11 +00:00
itohy
f9863c47b3 Correct ctype(3) usage.
Passing "char" value is wrong.  Use "unsigned char" instead.
2000-07-11 06:07:25 +00:00
kleink
2f244ea9d9 size_t != unsigned int; from Motoyuki Konno in PR lib/10538. 2000-07-08 11:48:40 +00:00
mjl
62318ed7e2 Bring s/key closer to RFC2289 conformance by pulling in changes
from OpenBSD to make use of different hash functions possible.
Also factored out some common code pieces, ANSIfied and
corrected SHA1 hash to make the result match up with the
regression examples in above RFC.
2000-07-06 22:30:18 +00:00
is
200ab3da93 In skeyverify(), don't "restore" priority to 0, but restore it to the
previous priority. If we can't read the previous priority, leave it alone.
By Chris Jones, PR 4891.
2000-04-13 13:25:56 +00:00
mycroft
95a32deb9b Delint. 2000-01-23 02:11:02 +00:00
mrg
79102eb35e remove an incorrect comment and add another one. 1999-08-24 09:01:36 +00:00
simonb
42724dd4d2 More trailing white space. 1999-07-02 15:37:33 +00:00
abs
edc1a24a56 Add a note to update src/distrib/sets/lists/base/shl.*, and add a missing
RCS Id.
1999-02-25 08:02:19 +00:00
mycroft
55ac0c2da3 const poisoning. 1998-07-26 21:58:46 +00:00
christos
d8bd192855 PR/4941: Greg Oster: Don't byte swap; it is not needed. This broke big
endian machines.
1998-03-18 19:22:12 +00:00
perry
0b7831a37b remove obsolete register declarations 1998-02-03 19:12:13 +00:00
perry
93db5caa95 RCSID Police. 1998-01-05 07:41:06 +00:00
lukem
86334d6bd9 remove superfluous CFLAGS line; WARNS=1 provides the same thing 1997-10-23 03:23:03 +00:00
christos
b7f2107f91 fix my own bugs :-) When I updated this to use the libc md4 library, I
did not account for the interface changes.
1997-06-28 01:12:19 +00:00
christos
3f9add8194 - pass gcc -Wall
- use the standard md4
- install skey.h in /usr/include
1997-06-18 19:18:27 +00:00
mrg
9cd5492c02 - convert unsafe strcpy(), strcat() and sprintf() to the `n' versions.
- some KNF.
1997-01-23 14:01:45 +00:00
thorpej
a500813c14 RCS id police. 1996-09-19 19:39:36 +00:00
thorpej
f2caf8ea31 Make a quick 64-bit safeness sweep. S/Key now works on the Alpha. 1996-09-19 19:36:51 +00:00
jtc
1847eaed9f sys/termios.h -> termios.h 1995-06-19 22:47:37 +00:00
pk
bd8c5cbee9 Prototypes (PR#1105) + some misc. reorganisation. 1995-06-05 19:48:33 +00:00
cgd
e9678161e2 from PR 952, by Thor Lancelot Simon: don't turn off echo when
inputting an S/KEY one-time password.
1995-05-17 20:24:39 +00:00
deraadt
c259dd15ce in a word, whoops 1994-05-31 08:51:15 +00:00
deraadt
e16521631c create file with nice mode 1994-05-31 08:50:31 +00:00
deraadt
8f00ef1dc7 solve byte order problem 1994-05-26 09:39:08 +00:00
deraadt
8f7e2d213d get rid of some horrible assumptions 1994-05-24 06:25:27 +00:00
deraadt
c923f70510 skey, by <tsarna@endicor.com> and me 1994-05-21 05:45:58 +00:00