summaryrefslogtreecommitdiff
path: root/usr.bin/ssh
AgeCommit message (Expand)Author
2014-01-20memleak; found by Loganaden Velvindron @ AfriNIC; ok markus@Damien Miller
2014-01-19Cast the sizeof to socklen_t so it'll work even if the supplied len isDarren Tucker
2014-01-19fix inverted meaning of 'no' and 'yes' for CanonicalizeFallbackLocalDamien Miller
2014-01-19Cast socklen_t when comparing to size_t and use socklen_t to iterate overDarren Tucker
2014-01-18explicitly define USE_PIPES to 1 to prevent redefinition warnings in portableDarren Tucker
2014-01-18Remove -Wbounded: it is now the compiler default.Martynas Venckus
2014-01-17fix log message statvfs. ok djmDarren Tucker
2014-01-17remove unused includes. ok djm@Darren Tucker
2014-01-17signed/unsigned comparison warning fix; from portableDamien Miller
2014-01-16openssh-6.5Damien Miller
2014-01-16needless and incorrect cast to size_t can break resumption ofDamien Miller
2014-01-12avoid use of OpenSSL BIGNUM type and functions for KEX withDamien Miller
2014-01-10the /etc/ssh/ssh_host_ed25519_key is loaded by default tooDamien Miller
2014-01-09ban clients/servers that suffer from SSH_BUG_DERIVEKEY, they are ancient,Damien Miller
2014-01-09Introduce digest API and use it to perform all hashing operationsDamien Miller
2014-01-09When formating the time for "ls -l"-style output, show dates in the futurePhilip Guenther
2014-01-04use standard types and formats for size_t like variables. ok dtuckerTed Unangst
2013-12-30refuse RSA keys from old proprietary clients/servers that use theDamien Miller
2013-12-29when showing other hostkeys, don't forget Ed25519 keysDamien Miller
2013-12-29don't forget to load Ed25519 certs tooDamien Miller
2013-12-29don't refuse to load Ed25519 certificatesDamien Miller
2013-12-29allow deletion of ed25519 keys from the agentDamien Miller
2013-12-29to make sure we don't omit any key types as valid CA keys again,Damien Miller
2013-12-29correct comment for key_drop_cert()Damien Miller
2013-12-29correct comment for key_to_certified()Damien Miller
2013-12-29allow ed25519 keys to appear as certificate authoritiesDamien Miller
2013-12-27correct commentDamien Miller
2013-12-27make the original RSA and DSA signing/verification code look more likeDamien Miller
2013-12-21small typoTed Unangst
2013-12-19use full name for author, with his permissionDamien Miller
2013-12-19bz#2186: don't crash (NULL deref) when deleting PKCS#11 keys from an agentDamien Miller
2013-12-19bz#2147: fix multiple remote forwardings with dynamically assignedDamien Miller
2013-12-19simplify freeing of source-address certificate restrictionDamien Miller
2013-12-19Cast client_alive_interval to u_int64_t before assinging toDarren Tucker
2013-12-19skip requesting smartcard PIN when removing keys from agent; bz#2187Damien Miller
2013-12-17I've assempled the header file by cut&pasting from generated headersMarkus Friedl
2013-12-15add some comments and constify a constantDamien Miller
2013-12-15Make ssh-add also add .ssh/id_ed25519; fixes lie in manual page.Pascal Stumpf
2013-12-09remove unused definesMarkus Friedl
2013-12-09Add Authors for the public domain ed25519/nacl code.Markus Friedl
2013-12-08Use a literal for the default value of KEXAlgorithms. ok deraadt jmcDarren Tucker
2013-12-07add missing mentions of ed25519; ok djm@Christian Weisgerber
2013-12-07document -a and -o wrt new key formatDamien Miller
2013-12-07correct RCS identsDamien Miller
2013-12-07set k->cert = NULL after freeing itDamien Miller
2013-12-06missing comma;Jason McIntyre
2013-12-06support ed25519 keys (hostkeys and user identities) using the public domainMarkus Friedl
2013-12-06new private key format, bcrypt as KDF by default; details in PROTOCOL.key;Markus Friedl
2013-12-06move private key (de)serialization to key.c; ok djmMarkus Friedl
2013-12-06remove duplicated character ('g') in getopt() string;Damien Miller