index
:
wireguard-openbsd
jd/histogram
jd/queueboosts
jd/simplify-queueing
master
WireGuard implementation for the OpenBSD kernel
Matt Dunwoodie
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
usr.bin
/
ssh
/
auth.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
highly polished whitespace, mostly fixing spaces-for-tab and bad
djm
2021-04-03
1
-2
/
+2
*
move subprocess() from auth.c to misc.c
djm
2020-12-22
1
-153
/
+1
*
load_hostkeys()/hostkeys_foreach() variants for FILE*
djm
2020-12-20
1
-3
/
+3
*
use the new variant log macros instead of prepending __func__ and
djm
2020-10-18
1
-20
/
+18
*
LogVerbose keyword for ssh and sshd
djm
2020-10-16
1
-1
/
+5
*
support for requiring user verified FIDO keys in sshd
djm
2020-08-27
1
-4
/
+5
*
Add a sshd_config "Include" directive to allow inclusion of files.
djm
2020-01-31
1
-2
/
+3
*
Replace all calls to signal(2) with a wrapper around sigaction(2).
dtucker
2020-01-23
1
-2
/
+2
*
strdup may return NULL if memory allocation fails. Use the safer xstrdup
tobhe
2019-12-16
1
-7
/
+7
*
add a "no-touch-required" option for authorized_keys and a similar
djm
2019-11-25
1
-3
/
+4
*
potential NULL dereference for revoked hostkeys; reported by
djm
2019-10-16
1
-2
/
+2
*
remove some duplicate #includes
djm
2019-10-02
1
-2
/
+1
*
lots of things were relying on libcrypto headers to transitively
djm
2019-09-06
1
-1
/
+2
*
When system calls indicate an error they return -1, not some arbitrary
deraadt
2019-06-28
1
-8
/
+8
*
convert auth.c to new packet API
djm
2019-01-19
1
-16
/
+10
*
convert servconf.c to new packet API
djm
2019-01-19
1
-2
/
+3
*
begin landing remaining refactoring of packet parsing API, started
djm
2019-01-19
1
-1
/
+4
*
include time.h for time(3)/nanosleep(2); from Ian McKellar
djm
2019-01-17
1
-1
/
+2
*
use path_absolute() for pathname checks; from Manoj Ampalam
djm
2018-11-16
1
-3
/
+3
*
log certificate fingerprint in authentication success/failure message
djm
2018-09-12
1
-9
/
+13
*
s/wuth/with/ in comment
martijn
2018-07-11
1
-2
/
+2
*
sshd: switch authentication to sshbuf API; ok djm@
markus
2018-07-09
1
-18
/
+21
*
permitlisten option for authorized_keys; ok markus@
djm
2018-06-06
1
-3
/
+12
*
make UID available as a %-expansion everywhere that the username is
djm
2018-06-01
1
-3
/
+5
*
Do not ban PTY allocation when a sshd session is restricted because
djm
2018-05-25
1
-1
/
+2
*
add valid-before="[time]" authorized_keys option. A simple way of
djm
2018-03-12
1
-5
/
+23
*
switch over to the new authorized_keys options API and remove the
djm
2018-03-03
1
-5
/
+175
*
move subprocess() so scp/sftp do not need uidswap.o; ok djm@
markus
2018-01-08
1
-1
/
+154
*
refactor channels.c
djm
2017-09-12
1
-1
/
+2
*
Move several subprocess-related functions from various locations to
djm
2017-08-18
1
-95
/
+2
*
refactor authentication logging
djm
2017-06-24
1
-18
/
+44
*
switch from Key typedef with struct sshkey; ok djm@
markus
2017-05-30
1
-3
/
+3
*
allow LogLevel in sshd_config Match blocks; ok dtucker bz#2717
djm
2017-05-17
1
-1
/
+2
*
Add missing braces in DenyUsers code. Patch from zev at bewilderbeest.net,
dtucker
2016-12-15
1
-2
/
+3
*
unbreak DenyUsers; reported by henning@
djm
2016-11-08
1
-2
/
+2
*
Validate address ranges for AllowUser/DenyUsers at configuration load
djm
2016-11-06
1
-6
/
+16
*
remove ssh1 server code; ok djm@
markus
2016-08-13
1
-6
/
+4
*
Remove "POSSIBLE BREAK-IN ATTEMPT!" from log message about forward and
dtucker
2016-06-15
1
-4
/
+3
*
refactor canohost.c: move functions that cache results closer to the
djm
2016-03-07
1
-10
/
+131
*
fix inverted logic that broke PermitRootLogin;
djm
2015-08-21
1
-2
/
+2
*
add prohibit-password as a synonymn for without-password, since the
deraadt
2015-08-06
1
-2
/
+4
*
make handling of AuthorizedPrincipalsFile=none more consistent
djm
2015-05-01
1
-3
/
+2
*
don't leak validity of user in "too many authentication failures"
djm
2015-02-25
1
-2
/
+3
*
Reduce use of <sys/param.h> and transition to <limits.h> throughout.
deraadt
2015-01-20
1
-4
/
+4
*
Add FingerprintHash option to control algorithm used for key
djm
2014-12-21
1
-2
/
+3
*
add RevokedHostKeys option for the client
djm
2014-12-04
1
-33
/
+29
*
Add support for Unix domain socket forwarding. A remote TCP port
millert
2014-07-15
1
-2
/
+2
*
make the "Too many authentication failures" message include the
djm
2014-07-03
1
-1
/
+14
*
make compiling against OpenSSL optional (make OPENSSL=no);
markus
2014-04-29
1
-1
/
+5
*
Standardise logging of supplemental information during userauth. Keys
djm
2013-05-19
1
-4
/
+26
[next]