summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/monitor_wrap.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* allow security keys to act as host keys as well as user keys.djm2019-12-151-3/+1
* Add new structure for signature optionsdjm2019-11-251-4/+19
* additional missing stdarg.h includes when built without WITH_OPENSSL; ok djm@naddy2019-11-181-1/+2
* Refactor signing - use sshkey_sign for everything, including the newdjm2019-10-311-3/+5
* When system calls indicate an error they return -1, not some arbitraryderaadt2019-06-281-2/+2
* Make sshpkt_get_bignum2() allocate the bignum it is parsing ratherdjm2019-01-211-7/+3
* remove last references to active_statedjm2019-01-191-9/+6
* convert monitor.c to new packet APIdjm2019-01-191-2/+1
* convert auth.c to new packet APIdjm2019-01-191-3/+2
* begin landing remaining refactoring of packet parsing API, starteddjm2019-01-191-1/+4
* remove unused zlib.hdjm2018-07-201-2/+1
* remove legacy key emulation layer; ok djm@markus2018-07-111-10/+7
* re-remove some pre-auth compression bitssf2018-07-101-3/+1
* kerberos/gssapi fixes for buffer removaldjm2018-07-101-2/+2
* sshd: switch monitor to sshbuf API; lots of help & ok djm@markus2018-07-091-200/+281
* sshd: switch loginmsg to sshbuf API; ok djm@markus2018-07-091-4/+5
* Revert previous two commitssf2018-07-091-1/+3
* Remove leftovers from pre-authentication compressionsf2018-07-061-3/+1
* switch over to the new authorized_keys options API and remove thedjm2018-03-031-17/+27
* uuencode.h is not usedmarkus2018-01-081-2/+1
* revert stricter key type / signature type checking in userauth path;djm2017-12-211-2/+2
* pass negotiated signing algorithm though to sshkey_verify() anddjm2017-12-181-2/+3
* replace statically-sized arrays in ServerOptions with dynamic onesdjm2017-10-051-7/+3
* Fix PermitOpen crash; spotted by benno@, ok dtucker@ deraadt@djm2017-10-021-1/+7
* refactor channels.cdjm2017-09-121-1/+3
* switch auth2-pubkey.c to modern APIs; with & ok djm@markus2017-05-301-6/+8
* switch from Key typedef with struct sshkey; ok djm@markus2017-05-301-6/+8
* allow LogLevel in sshd_config Match blocks; ok dtucker bz#2717djm2017-05-171-1/+2
* remove ssh1 server code; ok djm@markus2016-08-131-151/+1
* refactor canohost.c: move functions that cache results closer to thedjm2016-03-071-6/+6
* remove roaming support; ok djm@markus2016-01-141-2/+1
* implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)markus2015-12-041-2/+3
* prevent authorized_keys options picked up on public key tests withoutdjm2015-05-011-6/+9
* Revise hostkeys@openssh.com hostkey learning extension.djm2015-02-161-3/+4
* adapt kex to sshbuf and struct ssh; ok djm@markus2015-01-191-3/+3
* update packet.c & isolate, introduce struct sshmarkus2015-01-191-229/+13
* adapt mac.c to ssherr.h return codes (de-fatal) and simplify dependenciesmarkus2015-01-131-2/+2
* make compiling against OpenSSL optional (make OPENSSL=no);markus2014-04-291-2/+11
* convert memset of potentially-private data to explicit_bzero()djm2014-02-021-3/+3
* remove experimental, never-enabled JPAKE code; ok markus@djm2014-01-291-164/+1
* fix rekeying for AES-GCM modes; ok deraadtmarkus2013-11-061-2/+2
* bye, bye xfree(); ok markus@djm2013-05-171-15/+15
* support AES-GCM as defined in RFC 5647 (but with simpler KEX handling)markus2013-01-081-19/+20
* pasto; ok djm@naddy2012-10-011-2/+2
* make the pre-auth privsep slave log via a socketpair shared with thedjm2011-06-171-1/+27
* allow AuthorizedKeysFile to specify multiple files, separated by spaces.djm2011-05-231-2/+7
* use a macro to define which string options to copy between configsdjm2011-05-201-3/+10
* Implement Elliptic Curve Cryptography modes for key exchange (ECDH) anddjm2010-08-311-1/+2
* Hold authentication debug messages until after successful authentication.dtucker2010-03-071-18/+1
* alphabetize includes; reduces diff vs portable and style(9). ok stevesk djmdtucker2009-06-221-5/+5