summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/auth.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* highly polished whitespace, mostly fixing spaces-for-tab and baddjm2021-04-031-2/+2
* move subprocess() from auth.c to misc.cdjm2020-12-221-153/+1
* load_hostkeys()/hostkeys_foreach() variants for FILE*djm2020-12-201-3/+3
* use the new variant log macros instead of prepending __func__ anddjm2020-10-181-20/+18
* LogVerbose keyword for ssh and sshddjm2020-10-161-1/+5
* support for requiring user verified FIDO keys in sshddjm2020-08-271-4/+5
* Add a sshd_config "Include" directive to allow inclusion of files.djm2020-01-311-2/+3
* Replace all calls to signal(2) with a wrapper around sigaction(2).dtucker2020-01-231-2/+2
* strdup may return NULL if memory allocation fails. Use the safer xstrduptobhe2019-12-161-7/+7
* add a "no-touch-required" option for authorized_keys and a similardjm2019-11-251-3/+4
* potential NULL dereference for revoked hostkeys; reported bydjm2019-10-161-2/+2
* remove some duplicate #includesdjm2019-10-021-2/+1
* lots of things were relying on libcrypto headers to transitivelydjm2019-09-061-1/+2
* When system calls indicate an error they return -1, not some arbitraryderaadt2019-06-281-8/+8
* convert auth.c to new packet APIdjm2019-01-191-16/+10
* convert servconf.c to new packet APIdjm2019-01-191-2/+3
* begin landing remaining refactoring of packet parsing API, starteddjm2019-01-191-1/+4
* include time.h for time(3)/nanosleep(2); from Ian McKellardjm2019-01-171-1/+2
* use path_absolute() for pathname checks; from Manoj Ampalamdjm2018-11-161-3/+3
* log certificate fingerprint in authentication success/failure messagedjm2018-09-121-9/+13
* s/wuth/with/ in commentmartijn2018-07-111-2/+2
* sshd: switch authentication to sshbuf API; ok djm@markus2018-07-091-18/+21
* permitlisten option for authorized_keys; ok markus@djm2018-06-061-3/+12
* make UID available as a %-expansion everywhere that the username isdjm2018-06-011-3/+5
* Do not ban PTY allocation when a sshd session is restricted becausedjm2018-05-251-1/+2
* add valid-before="[time]" authorized_keys option. A simple way ofdjm2018-03-121-5/+23
* switch over to the new authorized_keys options API and remove thedjm2018-03-031-5/+175
* move subprocess() so scp/sftp do not need uidswap.o; ok djm@markus2018-01-081-1/+154
* refactor channels.cdjm2017-09-121-1/+2
* Move several subprocess-related functions from various locations todjm2017-08-181-95/+2
* refactor authentication loggingdjm2017-06-241-18/+44
* switch from Key typedef with struct sshkey; ok djm@markus2017-05-301-3/+3
* allow LogLevel in sshd_config Match blocks; ok dtucker bz#2717djm2017-05-171-1/+2
* Add missing braces in DenyUsers code. Patch from zev at bewilderbeest.net,dtucker2016-12-151-2/+3
* unbreak DenyUsers; reported by henning@djm2016-11-081-2/+2
* Validate address ranges for AllowUser/DenyUsers at configuration loaddjm2016-11-061-6/+16
* remove ssh1 server code; ok djm@markus2016-08-131-6/+4
* Remove "POSSIBLE BREAK-IN ATTEMPT!" from log message about forward anddtucker2016-06-151-4/+3
* refactor canohost.c: move functions that cache results closer to thedjm2016-03-071-10/+131
* fix inverted logic that broke PermitRootLogin;djm2015-08-211-2/+2
* add prohibit-password as a synonymn for without-password, since thederaadt2015-08-061-2/+4
* make handling of AuthorizedPrincipalsFile=none more consistentdjm2015-05-011-3/+2
* don't leak validity of user in "too many authentication failures"djm2015-02-251-2/+3
* Reduce use of <sys/param.h> and transition to <limits.h> throughout.deraadt2015-01-201-4/+4
* Add FingerprintHash option to control algorithm used for keydjm2014-12-211-2/+3
* add RevokedHostKeys option for the clientdjm2014-12-041-33/+29
* Add support for Unix domain socket forwarding. A remote TCP portmillert2014-07-151-2/+2
* make the "Too many authentication failures" message include thedjm2014-07-031-1/+14
* make compiling against OpenSSL optional (make OPENSSL=no);markus2014-04-291-1/+5
* Standardise logging of supplemental information during userauth. Keysdjm2013-05-191-4/+26