Commit Graph

29 Commits

Author SHA1 Message Date
mjl 8e859a9e3f Revert minor to 0 since there is no abi change on request of thorpej. 2001-03-12 00:45:25 +00:00
mjl b822e3e5a8 Fix incorrect SHA1 calculation on big endian machines reported
in PR/12045 by John Valdes, who also provided the problem's
solution and a patch.

XXX This problem could have been caught about a year ago if we
XXX just ran the regression tests on every build!
2001-03-11 13:57:45 +00:00
thorpej f9bf570b22 skey_keyinfo() returns a pointer to a static buffer, so
const'ify it.
2000-07-28 16:35:11 +00:00
itohy f9863c47b3 Correct ctype(3) usage.
Passing "char" value is wrong.  Use "unsigned char" instead.
2000-07-11 06:07:25 +00:00
kleink 2f244ea9d9 size_t != unsigned int; from Motoyuki Konno in PR lib/10538. 2000-07-08 11:48:40 +00:00
mjl 62318ed7e2 Bring s/key closer to RFC2289 conformance by pulling in changes
from OpenBSD to make use of different hash functions possible.
Also factored out some common code pieces, ANSIfied and
corrected SHA1 hash to make the result match up with the
regression examples in above RFC.
2000-07-06 22:30:18 +00:00
is 200ab3da93 In skeyverify(), don't "restore" priority to 0, but restore it to the
previous priority. If we can't read the previous priority, leave it alone.
By Chris Jones, PR 4891.
2000-04-13 13:25:56 +00:00
mycroft 95a32deb9b Delint. 2000-01-23 02:11:02 +00:00
mrg 79102eb35e remove an incorrect comment and add another one. 1999-08-24 09:01:36 +00:00
simonb 42724dd4d2 More trailing white space. 1999-07-02 15:37:33 +00:00
abs edc1a24a56 Add a note to update src/distrib/sets/lists/base/shl.*, and add a missing
RCS Id.
1999-02-25 08:02:19 +00:00
mycroft 55ac0c2da3 const poisoning. 1998-07-26 21:58:46 +00:00
christos d8bd192855 PR/4941: Greg Oster: Don't byte swap; it is not needed. This broke big
endian machines.
1998-03-18 19:22:12 +00:00
perry 0b7831a37b remove obsolete register declarations 1998-02-03 19:12:13 +00:00
perry 93db5caa95 RCSID Police. 1998-01-05 07:41:06 +00:00
lukem 86334d6bd9 remove superfluous CFLAGS line; WARNS=1 provides the same thing 1997-10-23 03:23:03 +00:00
christos b7f2107f91 fix my own bugs :-) When I updated this to use the libc md4 library, I
did not account for the interface changes.
1997-06-28 01:12:19 +00:00
christos 3f9add8194 - pass gcc -Wall
- use the standard md4
- install skey.h in /usr/include
1997-06-18 19:18:27 +00:00
mrg 9cd5492c02 - convert unsafe strcpy(), strcat() and sprintf() to the `n' versions.
- some KNF.
1997-01-23 14:01:45 +00:00
thorpej a500813c14 RCS id police. 1996-09-19 19:39:36 +00:00
thorpej f2caf8ea31 Make a quick 64-bit safeness sweep. S/Key now works on the Alpha. 1996-09-19 19:36:51 +00:00
jtc 1847eaed9f sys/termios.h -> termios.h 1995-06-19 22:47:37 +00:00
pk bd8c5cbee9 Prototypes (PR#1105) + some misc. reorganisation. 1995-06-05 19:48:33 +00:00
cgd e9678161e2 from PR 952, by Thor Lancelot Simon: don't turn off echo when
inputting an S/KEY one-time password.
1995-05-17 20:24:39 +00:00
deraadt c259dd15ce in a word, whoops 1994-05-31 08:51:15 +00:00
deraadt e16521631c create file with nice mode 1994-05-31 08:50:31 +00:00
deraadt 8f00ef1dc7 solve byte order problem 1994-05-26 09:39:08 +00:00
deraadt 8f7e2d213d get rid of some horrible assumptions 1994-05-24 06:25:27 +00:00
deraadt c923f70510 skey, by <tsarna@endicor.com> and me 1994-05-21 05:45:58 +00:00