History log of /freebsd-10.0-release/crypto/openssh/sshconnect2.c
Revision Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
# 259065 07-Dec-2013 gjb

- Copy stable/10 (r259064) to releng/10.0 as part of the
10.0-RELEASE cycle.
- Update __FreeBSD_version [1]
- Set branch name to -RC1

[1] 10.0-CURRENT __FreeBSD_version value ended at '55', so
start releng/10.0 at '100' so the branch is started with
a value ending in zero.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation

# 256281 10-Oct-2013 gjb

Copy head (r256279) to stable/10 as part of the 10.0-RELEASE cycle.

Approved by: re (implicit)
Sponsored by: The FreeBSD Foundation


# 255767 21-Sep-2013 des

Upgrade to 6.3p1.

Approved by: re (gjb)


# 249016 02-Apr-2013 des

Merge upstream patch to silence spurious "no such identity file" warnings.


# 248619 22-Mar-2013 des

Upgrade to OpenSSH 6.2p1. The most important new features are support
for a key revocation list and more fine-grained authentication control.


# 240075 03-Sep-2012 des

Upgrade OpenSSH to 6.1p1.


# 226046 05-Oct-2011 des

Upgrade to OpenSSH 5.9p1.

MFC after: 3 months


# 224640 03-Aug-2011 brooks

Enable keyword expansion for $FreeBSD$ on files where it was added it
r224638.

Submitted by: bz
Approved by: re (implicit)
Point hat to: brooks


# 224638 03-Aug-2011 brooks

Add support for dynamically adjusted buffers to allow the full use of
the bandwidth of long fat pipes (i.e. 100Mbps+ trans-oceanic or
trans-continental links). Bandwidth-delay products up to 64MB are
supported.

Also add support (not compiled by default) for the None cypher. The
None cypher can only be enabled on non-interactive sessions (those
without a pty where -T was not used) and must be enabled in both
the client and server configuration files and on the client command
line. Additionally, the None cypher will only be activated after
authentication is complete. To enable the None cypher you must add
-DNONE_CIPHER_ENABLED to CFLAGS via the make command line or in
/etc/make.conf.

This code is a style(9) compliant version of these features extracted
from the patches published at:

http://www.psc.edu/networking/projects/hpn-ssh/

Merging this patch has been a collaboration between me and Bjoern.

Reviewed by: bz
Approved by: re (kib), des (maintainer)


# 221420 04-May-2011 des

Upgrade to OpenSSH 5.8p2.


# 215116 11-Nov-2010 des

Upgrade to OpenSSH 5.6p1.


# 204917 09-Mar-2010 des

Upgrade to OpenSSH 5.4p1.

MFC after: 1 month


# 197679 01-Oct-2009 des

Upgrade to OpenSSH 5.3p1.


# 192595 22-May-2009 des

Upgrade to OpenSSH 5.2p1.

MFC after: 3 months


# 183336 24-Sep-2008 des

MFV "xmalloc: zero size" fix.

MFC after: 1 week


# 181111 01-Aug-2008 des

Upgrade to OpenSSH 5.1p1.

I have worked hard to reduce diffs against the vendor branch. One
notable change in that respect is that we no longer prefer DSA over
RSA - the reasons for doing so went away years ago. This may cause
some surprises, as ssh will warn about unknown host keys even for
hosts whose keys haven't changed.

MFC after: 6 weeks


# 181110 01-Aug-2008 des

Remove svn:keywords except on files that need it. This makes diffs
against the vendor branch much more readable.


# 181097 31-Jul-2008 des

Consistently set svn:eol-style.


# 162856 30-Sep-2006 des

Merge conflicts.

MFC after: 1 week


# 157019 22-Mar-2006 des

Merge conflicts.


# 149753 03-Sep-2005 des

Resolve conflicts.


# 137019 28-Oct-2004 des

Resolve conflicts


# 128460 20-Apr-2004 des

Resolve conflicts.


# 126277 26-Feb-2004 des

Resolve conflicts.


# 124211 07-Jan-2004 des

Resolve conflicts and remove obsolete files.

Sponsored by: registrar.no


# 114426 01-May-2003 des

Remove RCSID from files which have no other diffs to the vendor branch.


# 113911 23-Apr-2003 des

Resolve conflicts.


# 106130 29-Oct-2002 des

Resolve conflicts.


# 99063 29-Jun-2002 des

Resolve conflicts.

Sponsored by: DARPA, NAI Labs


# 98941 27-Jun-2002 des

Forcibly revert to mainline.


# 98684 23-Jun-2002 des

Resolve conflicts. Known issues:

- sshd fails to set TERM correctly.
- privilege separation may break PAM and is currently turned off.
- man pages have not yet been updated

I will have these issues resolved, and privilege separation turned on by
default, in time for DP2.

Sponsored by: DARPA, NAI Labs


# 93704 02-Apr-2002 des

Revert to vendor version, what little was left of our local patches here
was incorrect.

Pointed out by: Markus Friedl <markus@openbsd.org>


# 92559 18-Mar-2002 des

Fix conflicts.


# 76262 04-May-2001 green

Fix conflicts for OpenSSH 2.9.


# 74500 20-Mar-2001 green

Make password attacks based on traffic analysis harder by requiring that
"non-echoed" characters are still echoed back in a null packet, as well
as pad passwords sent to not give hints to the length otherwise.

Obtained from: OpenBSD


# 69588 05-Dec-2000 green

This commit was generated by cvs2svn to compensate for changes in r69587,
which included commits to RCS files with non-trunk default branches.


# 69587 05-Dec-2000 green

Import of OpenSSH 2.3.0 (virgin OpenBSD source release).


# 65668 10-Sep-2000 kris

Initial import of OpenSSH post-2.2.0 snapshot dated 2000-09-09


# 61209 03-Jun-2000 kris

Initial import of OpenSSH snapshot from 2000/05/30

Obtained from: OpenBSD


# 60573 15-May-2000 kris

Initial import of OpenSSH v2.1.