summaryrefslogtreecommitdiffstats
path: root/contrib/telnet
Commit message (Collapse)AuthorAgeFilesLines
* Background:nectar2003-01-292-14/+2
| | | | | | | | | | | | | | | | | | | | | When libdes was replaced with OpenSSL's libcrypto, there were a few interfaces that the former implemented but the latter did not. Because some software in the base system still depended upon these interfaces, we simply included them in our libcrypto (rnd_keys.c). Now, finally get around to removing the dependencies on these interfaces. There were basically two cases: des_new_random_key -- This is just a wrapper for des_random_key, and these calls were replaced. des_init_random_number_generator et. al. -- A few functions were used by the application to seed libdes's PRNG. These are not necessary when using libcrypto, as OpenSSL internally seeds the PRNG from /dev/random. These calls were simply removed. Again, some of the Kerberos 4 files have been taken off the vendor branch. I do not expect there to be future imports of KTH Kerberos 4.
* add more RFC defined telnet optionsbillf2003-01-181-3/+8
| | | | Reviewed by: ps
* Merge argument parsing changes into this copy of telnet.eric2002-11-271-2/+6
| | | | | Submitted by: markm Approved by: bmah
* Permit the argument to the -s option to be a hostname. I see nodd2002-10-021-1/+0
| | | | | | | | reason to restrict this to a numeric address. PR: 41841 Submitted by: Dmitry Pryanishnikov <dmitry@atlantis.dp.ua>, Maxim Maximov <mcsi@agava.com>
* Catch up with "base" telnet.markm2002-09-251-3/+3
| | | | s/FALL THROUGH/FALLTHROUGH/ for lint(1).
* Catch up with "base" telnet.markm2002-09-253-12/+8
| | | | | s/FALL THROUGH/FALLTHROUGH/ for lint(1). s/Usage/usage/ for consistency.
* From the requestor:markm2002-09-251-1/+1
| | | | | | | | "Could you do me a favor and fix sys_bsd.c to get the howmany() macro from <sys/param.h>, instead of <sys/types.h>? This will save me from having to worry about the unsync'd bits before making the change." Requested by: mike
* Encrypted strings (after hex decoding) aren't null terminated, becausensayer2002-08-221-4/+0
| | | | | | | | 0 might simply be part of the ciphertext. PR: bin/40266 Submitted by: andr@dgap.mipt.ru MFC after: 3 days
* Warnings fixes. Sort out some variable types.markm2002-06-261-6/+7
|
* Help fix warnings by marking an argument as unused.markm2002-06-261-0/+1
|
* Don't risk catching a signal while handling a signal for a dying child, as wejmallett2002-05-271-0/+8
| | | | | | | | | can then end up not properly clearing wtmp/utmp entries. PR: bin/37934 Submitted by: Sandeep Kumar <skumar@juniper.net> Reviewed by: markm MFC after: 2 weeks
* unbreak build:alfred2002-05-115-3/+7
| | | | | commands.c, sys_bsd.c: comment out/remove junk after #endif/#else network.c, terminal.c, utlities.c: include stdlib.h for exit(3)
* Fix an external declaration that was causing telnetd to core dump.markm2002-05-061-1/+1
| | | | | MFC after: 1 week PR: 37766
* Update build after import of Heimdal Kerberos 2002/02/17.nectar2002-02-191-1/+1
|
* Don't use non-signal-safe functions (exit(3) in this case) insheldonh2002-02-051-1/+1
| | | | | | | | | | | signal handlers. In this case, use _exit(2) instead, following the call to shutdown(2). This fixes rare telnetd hangs. PR: misc/33672 Submitted by: Umesh Krishnaswamy <umesh@juniper.net> MFC after: 1 month
* mdoc(7) police: remove -r from SYNOPSIS, sort -p in DESCRIPTION.ru2001-12-141-6/+5
|
* Don't assume that the number of fds to select on is known quantity (injkh2001-12-091-32/+56
| | | | | | | | this case 16). Use dynamic FD_SETs and calculated high-water marks throughout. There are also too many versions of telnet in the tree. Obtained from: OpenBSD and Apple's Radar database MFC after: 2 days
* Fixed bugs from previous revision.ru2001-12-041-1/+2
| | | | Removed -s from SYNOPSIS and restored -S in DESCRIPTION.
* Protect variables and function prototypes that are only used in the INET6jhay2001-12-031-1/+7
| | | | | | | | case with an ifdef INET6. This make the fixit floppy compile again. Reviewed by: markm
* More help for alpha WARNS=2. This code is, erm, unusual. Anyone whomarkm2001-12-031-4/+4
| | | | feels like rewriting it will meet no objection from me.
* help the alphas out with the WARNS=2 stuff.markm2001-12-032-2/+2
|
* Damn. The previous mega-commit was incomplete WRT ANSIfication. Thismarkm2001-11-3013-281/+250
| | | | fixes that.
* Very large style makeover.markm2001-11-3045-5317/+2469
| | | | | | | | | | | | | 1) ANSIfy. 2) Clean up ifdefs so that a) ones that never/always apply are appropriately either fully removed, or just the #if junk is removed. b) change #if defined(FOO) for appropiate values of FOO. (currently AUTHENTICATION and ENCRYPTION) 3) WARNS=2 fixing 4) GC other unused stuff This code can now be unifdef(1)ed to make non-crypto telnet.
* Fix world by trimming an extra comment terminator.jhb2001-10-291-1/+1
|
* Add Berkeley copyright to SRA.nsayer2001-10-293-1/+91
| | | | | | | | | | | | | | | | | | | | | | This is by the kind permission of Dave Safford, formerly of TAMU who wrote the original code. Here is an excerpt of the e-mail exchange concerning this issue: Dave Safford wrote: >Nick Sayer wrote: >> Some time ago we spoke about SRA and importing it into FreeBSD. I forgot to >> ask if you had a prefered license boilerplate for the top of the files. It >> has come up recently, and the SRA code in FreeBSD doesn't have one. >I really have no preference - use whatever is most convenient in the >FreeBSD environment. >dave safford This is the standard BSD license with clause 3 removed and clause 4 suitably renumbered. MFC after: 1 day
* Diff-reduce these two.markm2001-10-271-3/+3
| | | | | | | Really, one of them needs to disappear. I'll figure out which later. Reported by: bde
* Add __FBSDID() to diff-reduce with "base" telnet.markm2001-10-0114-28/+40
|
* Manually unifdef(1) CRAY, UNICOS, hpux and sun uselsess code.markm2001-08-2911-936/+7
|
* Remove description of an option that only applies to UNICOS < 7.0.dd2001-08-251-13/+0
| | | | | | | That define may still be present in the source, but I don't think anyone has plans to try to use it. Obtained from: NetBSD
* Code merge and diff reduce with "base" telnet. This is the "later"markm2001-08-2025-290/+283
| | | | | telnet, so it was treated as the reference code, except where later commits were made to "base" telnet.
* Removal of following export controll related sentences:horikawa2001-08-151-10/+0
| | | | | | | | | | | | | | | o Because of export controls, TELNET ENCRYPT option is not supported outside of the United States and Canada. o Because of export controls, data encryption is not supported outside of the United States and Canada. src/crypto/README revision 1.5 commit log says: > Crypto sources are no longer export controlled: > Explain, why crypto sources are still in crypto/. and actually telnet encryption is used outside of US and Canada now. Pointed out by: OHSAWA Chitoshi <ohsawa@catv1.ccn-net.ne.jp> Reviewed by: no objection on doc
* mdoc(7) police: s/BSD/.Bx/ where appropriate.ru2001-08-141-3/+6
|
* output_data(), output_datalen() and netflush() didn't actually guaranteekris2001-07-236-45/+50
| | | | | | | | | | | | | to do what they are supposed to: under some circumstances output data would be truncated, or the buffer would not actually be flushed (possibly leading to overflows when the caller assumes the operation succeeded). Change the semantics so that these functions ensure they complete the operation before returning. Comment out diagnostic code enabled by '-D reports' which causes an infinite recursion and an eventual crash. Patch developed with assistance from ru and assar.
* More potential buffer overflow fixes.ru2001-07-204-35/+7
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | o Fixed `nfrontp' calculations in output_data(). If `remaining' is initially zero, it was possible for `nfrontp' to be decremented. Noticed by: dillon o Replaced leaking writenet() with output_datalen(): : * writenet : * : * Just a handy little function to write a bit of raw data to the net. : * It will force a transmit of the buffer if necessary : * : * arguments : * ptr - A pointer to a character string to write : * len - How many bytes to write : */ : void : writenet(ptr, len) : register unsigned char *ptr; : register int len; : { : /* flush buffer if no room for new data) */ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ : if ((&netobuf[BUFSIZ] - nfrontp) < len) { : /* if this fails, don't worry, buffer is a little big */ ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ : netflush(); : } : : memmove(nfrontp, ptr, len); : nfrontp += len; : : } /* end of writenet */ What an irony! :-) o Optimized output_datalen() a bit.
* vsnprintf() can return a value larger than the buffer size.ru2001-07-191-1/+1
| | | | | Submitted by: assar Obtained from: OpenBSD
* Fixed the exploitable remote buffer overflow.ru2001-07-196-314/+219
| | | | | | Reported on: bugtraq Obtained from: Heimdal, NetBSD Reviewed by: obrien, imp
* mdoc(7) police: removed HISTORY info from the .Os call.ru2001-07-102-3/+2
|
* mdoc(7) police: merge all fixes from non-crypto version.ru2001-07-051-58/+92
|
* MF non-crypto: 1.13: document -u in usage.ru2001-07-051-8/+8
|
* Oops, forgot the 'u' in the getopt for the previous commit.dillon2001-05-241-1/+1
|
* A feature to allow one to telnet to a unix domain socket. (MFC fromdillon2001-05-233-3/+51
| | | | | | | | | non-crypto version) Also update the crypto telnet's man page to reflect other options ported from the non-crypto version. Obtained from: Lyndon Nerenberg <lyndon@orthanc.ab.ca>
* Make the PAM user-override actually override the correect thing.nsayer2001-05-171-3/+3
|
* Back out last commit. This was already fixed. This should never havepeter2001-05-171-2/+0
| | | | | happened, this is why we have commit mail expressly delivered to committers.
* Fix the latest telnet breakage. Obviously this was never compiled.peter2001-05-171-4/+4
|
* Since the root-on-insecure-tty code was added to telnetd, a dependencynsayer2001-05-161-0/+2
| | | | | on char *line was added to libtelnet. Put a dummy one in to keep the linker happy.
* Make sure the protocol actively rejects bad data rather thannsayer2001-05-161-8/+8
| | | | (potentially) not responding to an invalid SRA 'auth is' message.
* srandomdev() affords us the opportunity to radically improve, and at thensayer2001-05-161-0/+7
| | | | same time simplify, the random number selection code.
* Catch any attempted buffer overflows. The magic numbers in this codensayer2001-05-161-2/+6
| | | | | | | (512) are a little distressing, but the method really needs to be extended to allow server-supplied DH parameters anyway. Submitted by: kris
* Catch malloc return failures. This should help avoid dereferencing NULL onnsayer2001-05-161-0/+8
| | | | | | low-memory situations. Submitted by: kris
* Hack to work around braindeath in libtelnet:sra.c. The sra.o filepeter2001-05-151-0/+1
| | | | | | | references global variables from telnetd, but is also linked into telnet as well. I was tempted to back out the last sra.c change as it is 100% bogus and should be taken out and shot, but for now this bandaid should get world working again. :-(
OpenPOWER on IntegriCloud