summaryrefslogtreecommitdiff
path: root/sshd.c
AgeCommit message (Expand)Author
2020-05-27upstream: fix compilation with DEBUG_KEXDH; bz#3160 ok dtucker@djm@openbsd.org
2020-03-14upstream: use sshpkt_fatal() for kex_exchange_identification()djm@openbsd.org
2020-03-14upstream: Don't clear alarm timers in listening sshd. Previouslydtucker@openbsd.org
2020-03-14upstream: spelling errors in comments; no code change fromdjm@openbsd.org
2020-02-01upstream: whitespacedjm@openbsd.org
2020-02-01upstream: force early logging to stderr if debug_flag (-d) is set;djm@openbsd.org
2020-02-01upstream: mistake in previous: filling the incorrect bufferdjm@openbsd.org
2020-02-01upstream: Add a sshd_config "Include" directive to allow inclusiondjm@openbsd.org
2020-01-25upstream: tweak proctitle to include sshd arguments, as these aredjm@openbsd.org
2020-01-23upstream: Replace all calls to signal(2) with a wrapper arounddtucker@openbsd.org
2020-01-22upstream: expose the number of currently-authenticating connectionsdjm@openbsd.org
2020-01-22remove accidental change in f8c11461Damien Miller
2020-01-21upstream: pass SSH_SK_HELPER explicitly past $SUDO to avoid it gettingdjm@openbsd.org
2019-12-16upstream: allow security keys to act as host keys as well as userdjm@openbsd.org
2019-11-20upstream: additional missing stdarg.h includes when built withoutnaddy@openbsd.org
2019-11-15upstream: When clients get denied by MaxStartups, send adtucker@openbsd.org
2019-11-01upstream: Refactor signing - use sshkey_sign for everything,djm@openbsd.org
2019-10-29upstream: Signal handler cleanup: remove leftover support fordtucker@openbsd.org
2019-07-05upstream: When system calls indicate an error they return -1, notderaadt@openbsd.org
2019-06-21upstream: Add protection for private keys at rest in RAM againstdjm@openbsd.org
2019-06-08upstream: Replace calls to ssh_malloc_init() by a static init ofotto@openbsd.org
2019-05-08upstream: When running sshd -T, assume any attibute not provided bydtucker@openbsd.org
2019-03-01upstream: Fix two race conditions in sshd relating to SIGHUP:djm@openbsd.org
2019-01-21upstream: rename kex->kem_client_pub -> kex->client_pub now thatdjm@openbsd.org
2019-01-21upstream: use KEM API for vanilla ECDHdjm@openbsd.org
2019-01-21upstream: use KEM API for vanilla DH KEXdjm@openbsd.org
2019-01-21upstream: use KEM API for vanilla c25519 KEXdjm@openbsd.org
2019-01-21upstream: Add support for a PQC KEX/KEM:djm@openbsd.org
2019-01-20last bits of old packet API / active_state globalDamien Miller
2019-01-20upstream: remove last references to active_statedjm@openbsd.org
2019-01-20upstream: convert monitor.c to new packet APIdjm@openbsd.org
2019-01-20upstream: convert sshd.c to new packet APIdjm@openbsd.org
2019-01-20upstream: convert auth2.c to new packet APIDamien Miller
2019-01-20upstream: convert servconf.c to new packet APIdjm@openbsd.org
2019-01-20upstream: begin landing remaining refactoring of packet parsingdjm@openbsd.org
2019-01-17upstream: many of the global variables in this file can be made static;djm@openbsd.org
2018-12-27upstream: move client/server SSH-* banners to buffers underdjm@openbsd.org
2018-11-23refactor libcrypto initialisationDamien Miller
2018-11-19upstream: silence (to log level debug2) failure messages whendjm@openbsd.org
2018-11-16upstream: use path_absolute() for pathname checks; from Manoj Ampalamdjm@openbsd.org
2018-10-23upstream: refer to OpenSSL not SSLeay;djm@openbsd.org
2018-09-21upstream: when compiled with GSSAPI support, cache supported methoddjm@openbsd.org
2018-09-13upstream: hold our collective noses and use the openssl-1.1.x API indjm@openbsd.org
2018-08-13upstream: revert compat.[ch] section of the following change. Itdjm@openbsd.org
2018-07-31upstream: fix some memory leaks spotted by Coverity via Jakub Jelendjm@openbsd.org
2018-07-12upstream: remove legacy key emulation layer; ok djm@markus@openbsd.org
2018-07-10Adapt portable to legacy buffer API removalDamien Miller
2018-07-10upstream: sshd: switch config to sshbuf API; ok djm@markus@openbsd.org
2018-07-10upstream: sshd: switch loginmsg to sshbuf API; ok djm@markus@openbsd.org
2018-07-03upstream: Improve strictness and control over RSA-SHA2 signaturedjm@openbsd.org