Age | Commit message (Collapse) | Author |
|
- rename curves to nistp256 etc
- fix svr-auth.c TRACE problem
--HG--
branch : ecc
|
|
--HG--
branch : ecc
|
|
--HG--
branch : ecc
|
|
|
|
Got rid of ENABLE_AGENTFWD macro.
|
|
--HG--
branch : agent-client
extra : convert_revision : eb0dae4b62e243ba37a897beb7ba81a4f637d8b3
|
|
agent forwarding.
--HG--
branch : agent-client
extra : convert_revision : 276cf5e82276b6c879d246ba64739ec6868f5150
|
|
--HG--
branch : agent-client
extra : convert_revision : 5465e639cc3f5ee0c6c55f0de6e7b6d5a8769da3
|
|
--HG--
branch : agent-client
extra : convert_revision : 357373f28e889108178b8627480fd24bc26dcbd7
|
|
--HG--
branch : agent-client
extra : convert_revision : 84676a98a0848224078a716b1292744a34e9d80c
|
|
899a8851a5edf840b2f7925bcc26ffe99dcac54d)
to branch 'au.asn.ucc.matt.dropbear.cli-agent' (head 6bbab8364de17bd9ecb1dee5ffb796e48c0380d2)
--HG--
branch : agent-client
extra : convert_revision : d39a49137cc36b624768d4e79e564141dde8d355
|
|
--HG--
extra : convert_revision : 70c64073c9ec07b4dfb54ee60e39cec2bd8c6910
|
|
8a7db1e2fdc5636abb338adb636babc32f465739)
to branch 'au.asn.ucc.matt.dropbear.cli-agent' (head d82c25da2f7e4fb6da510d806c64344e80bb270d)
--HG--
branch : agent-client
extra : convert_revision : 78d02301ae8310efa2639f15da0ea62dea110e4b
|
|
twice.
--HG--
extra : convert_revision : eac2a177021cfa0cbf365d5821fe6c8a0a5dc758
|
|
and 'bcb33fce2fad01a7626598209d43af3571bd86f0'
--HG--
extra : convert_revision : 691c56da3db2685f58ea53540a73c1b79e7df9cd
|
|
--HG--
extra : convert_revision : 9c39c3f447a47f61606df5d4bee364a449f12e18
|
|
cli-authpubkey.c:
fix leak of keybuf
cli-kex.c:
fix leak of fingerprint fp
cli-service.c:
remove commented out code
dropbearkey.c:
don't attepmt to free NULL key on failure
common-kex.c:
only free key if it is initialised
keyimport.c:
remove dead encrypted-key code
don't leak a FILE* loading OpenSSH keys
rsa.c, dss.c:
check return values for some libtommath functions
svr-kex.c:
check return value retrieving DH kex mpint
svr-tcpfwd.c:
fix null-dereference if remote tcp forward request fails
tcp-accept.c:
don't incorrectly free the tcpinfo var
--HG--
extra : convert_revision : 640a55bc710cbaa6d212453c750026c770e19193
|
|
(incomplete and does not compile)
--HG--
branch : agent-client
extra : convert_revision : 01038174ec27245b51bd43a66c01ad930880f67b
|
|
--HG--
extra : convert_revision : 838e354daf3ae9a1dce710526c37fec9859ee6d1
|
|
--HG--
extra : convert_revision : d928bc851e32be7bd429bf7504b148c0e4bf7e2f
|
|
--HG--
extra : convert_revision : 75c02f80c4ed25bd4697e7f17ffac6eded54c148
|
|
--HG--
extra : convert_revision : 149ce7a9a9cc5fe670994d6789b40be49895c595
|
|
--HG--
extra : convert_revision : fbbf404290f3fea3dfa9f6f53eba9389057e9044
|
|
- rearrange the runopts code for client and server (hostkey reading is needed
by both (if the client is doing pubkey auth. otherwise....))
--HG--
extra : convert_revision : 5420858803bfff1e27dfe7fa877ba6fdd747e0c5
|
|
remote hostkey verification though.
--HG--
extra : convert_revision : 8635abe49e499e16d44a8ee79d474dc35257e9cc
|