summaryrefslogtreecommitdiff
path: root/usr.bin/ssh/monitor.c
AgeCommit message (Expand)Author
2016-03-07refactor canohost.c: move functions that cache results closer to theDamien Miller
2016-02-15memleak of algorithm name in mm_answer_sign; reported by Jakub JelenDamien Miller
2016-01-14remove roaming support; ok djm@Markus Friedl
2015-12-04implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)Markus Friedl
2015-10-20Compare pointers to NULL rather than 0.mmcc
2015-09-04don't record hostbased authentication hostkeys as user keysDamien Miller
2015-09-02Fix occurrences of "r = func() != 0" which result in the wrong errorJonathan Gray
2015-08-21Improve size == 0, count == 0 checking in mm_zalloc, which is "array" like.Theo de Raadt
2015-06-22Don't count successful partial authentication as failures in monitor;Damien Miller
2015-05-04Remove pattern length argument from match_pattern_list(),Damien Miller
2015-05-01prevent authorized_keys options picked up on public key tests withoutDamien Miller
2015-04-27fix compilation with OPENSSL=no; ok dtucker@Damien Miller
2015-04-17don't call record_login() in monitor when UseLogin is enabled;Damien Miller
2015-02-20UpdateHostKeys fixes:Damien Miller
2015-02-16Revise hostkeys@openssh.com hostkey learning extension.Damien Miller
2015-02-13make rekey_limit for sshd w/privsep work; ok djm@ dtucker@Markus Friedl
2015-02-06SIZE_MAX is standard, we should be using it in preference to theTodd C. Miller
2015-01-20Reduce use of <sys/param.h> and transition to <limits.h> throughout.Theo de Raadt
2015-01-19adapt kex to sshbuf and struct ssh; ok djm@Markus Friedl
2015-01-19update packet.c & isolate, introduce struct sshMarkus Friedl
2015-01-14move authfd.c and its tentacles to the new buffer/key API;Damien Miller
2015-01-13add sshd_config HostbasedAcceptedKeyTypes and PubkeyAcceptedKeyTypesDamien Miller
2014-12-22remember which public keys have been used for authentication andDamien Miller
2014-07-15Add support for Unix domain socket forwarding. A remote TCP portTodd C. Miller
2014-06-24New key API: refactor key-related functions to be more library-like,Damien Miller
2014-05-03unbreak compression, by re-init-ing the compression code in theMarkus Friedl
2014-04-29make compiling against OpenSSL optional (make OPENSSL=no);Markus Friedl
2014-02-02convert memset of potentially-private data to explicit_bzero()Damien Miller
2014-01-31replace most bzero with explicit_bzero, except a few that cna be memsetTed Unangst
2014-01-29remove experimental, never-enabled JPAKE code; ok markus@Damien Miller
2013-11-04fix rekeying for KEX_C25519_SHA256; noted by dtucker@Markus Friedl
2013-07-19add ssh-agent(1) support to sshd(8); allows encrypted hostkeys,Markus Friedl
2013-06-21for hostbased authentication, print the client host and user onDamien Miller
2013-05-19Standardise logging of supplemental information during userauth. KeysDamien Miller
2013-05-17bye, bye xfree(); ok markus@Damien Miller
2013-05-16Add RekeyLimit to sshd with the same syntax as the client allowing rekeyingDarren Tucker
2013-03-07add submethod support to AuthenticationMethods; ok and freedback djm@Markus Friedl
2013-03-07reconstruct the original username that was sent by the client, which mayDamien Miller
2012-12-11drain the log messages after receiving the keystate from the unprivMarkus Friedl
2012-12-02Fixes logging of partial authentication when privsep is enabledDamien Miller
2012-11-04Support multiple required authentication via an AuthenticationMethodsDamien Miller
2012-06-22remove dead code following 'for (;;)' loops.Darren Tucker
2012-01-05memleak on error pathDamien Miller
2011-06-23ignore EINTR errors from poll()Damien Miller
2011-06-17make the pre-auth privsep slave log via a socketpair shared with theDamien Miller
2011-05-23allow AuthorizedKeysFile to specify multiple files, separated by spaces.Damien Miller
2011-05-20use a macro to define which string options to copy between configsDamien Miller
2011-05-15use FD_CLOEXEC consistently; patch from zion AT x96.orgDamien Miller
2010-09-09ECDH/ECDSA compliance fix: these methods vary the hash function they useDamien Miller
2010-08-31Implement Elliptic Curve Cryptography modes for key exchange (ECDH) andDamien Miller