summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/packet.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* highly polished whitespace, mostly fixing spaces-for-tab and baddjm2021-04-031-8/+8
* make ssh->kex->session_id a sshbuf instead of u_char*/size_t anddjm2021-01-271-6/+5
* Set the specified TOS/DSCP for interactive use prior to TCP connect.djm2020-11-271-27/+4
* use the new variant log macros instead of prepending __func__ anddjm2020-10-181-27/+24
* some language improvements; ok markusdjm2020-07-051-2/+2
* free kex in ssh_packet_close; ok djm semariemarkus2020-07-011-1/+3
* backout 1.293 fix kex mem-leak in ssh_packet_close at markus requestsemarie2020-06-261-3/+1
* fix kex mem-leak in ssh_packet_close; ok djmmarkus2020-06-241-1/+3
* fix ssh -O proxy w/mux which got broken by no longermarkus2020-06-241-2/+5
* consistently check packet_timeout_ms against 0; ok djmmarkus2020-03-061-5/+5
* have sshpkt_fatal() save/restore errno before we potentiallydjm2020-01-301-1/+4
* Fix typo in comment.dtucker2020-01-231-2/+2
* Make zlib optional. This adds a "ZLIB" build time option that allowsdtucker2020-01-231-1/+35
* strdup may return NULL if memory allocation fails. Use the safer xstrduptobhe2019-12-161-3/+3
* When system calls indicate an error they return -1, not some arbitraryderaadt2019-06-281-7/+7
* Typo and spelling fixes in comments and error messages. Patch fromdtucker2019-06-071-2/+2
* Remove crc32.{c,h} which were only used by the now-gone SSH1 protocol.dtucker2019-04-181-2/+1
* in ssh_set_newkeys(), mention the direction that we're keying in debugdjm2019-03-011-5/+7
* pass values used in KEX hash computation as sshbuf rather thandjm2019-01-211-1/+7
* Make sshpkt_get_bignum2() allocate the bignum it is parsing ratherdjm2019-01-211-4/+3
* allow sshpkt_fatal() to take a varargs format; we'll use this to givedjm2019-01-191-6/+23
* fix memory leak of ciphercontext when rekeying; bz#2942djm2019-01-041-3/+3
* move client/server SSH-* banners to buffers under ssh->kex and factordjm2018-12-271-22/+20
* memleaks; found by valgrinddjm2018-07-161-1/+3
* client: switch to sshbuf API; ok djm@markus2018-07-091-4/+1
* Revert previous two commitssf2018-07-091-5/+6
* Rename COMP_DELAYED to COMP_ZLIBsf2018-07-061-4/+4
* Remove leftovers from pre-authentication compressionsf2018-07-061-4/+3
* Remove unused ssh_packet_start_compression()sf2018-07-061-22/+1
* make ssh_remote_ipaddr() capable of being called after the ssh->statedjm2018-06-011-4/+8
* If select() fails in ssh_packet_read_seqnr go directly to the error pathdtucker2018-05-251-3/+5
* pass kex->hostkey_alg and kex->hostkey_nid from pre-auth to post-authdjm2017-12-181-1/+5
* Put remote client info back into the ClientAlive connection terminationdtucker2017-12-101-5/+5
* Add monotime_ts and monotime_tv that return monotonic timespec anddtucker2017-11-251-3/+3
* add sshd_config RDomain keyword to place sshd and the subsequentdjm2017-10-251-1/+13
* log debug messages sent to peer; ok deraadt markusdjm2017-10-131-1/+3
* refactor channels.cdjm2017-09-121-30/+38
* Allow IPQoS=none in ssh/sshd to not set an explicit ToS/DSCP valuedjm2017-07-231-2/+2
* don't pass pointer to struct sshcipher between privsep processes,djm2017-06-241-9/+5
* Add comments referring to the relevant RFC sections for rekeyingdtucker2017-06-091-2/+6
* Fix compression output stats broken in rev 1.201. Patch originally bydtucker2017-06-061-2/+2
* some warnings spotted by clang; ok markus@djm2017-06-011-5/+3
* These shutdown() SHUT_RDWR are not needed before close()deraadt2017-05-311-2/+1
* clear session keys from memory; ok djm@markus2017-05-311-35/+61
* helps if I commit the correct version of the file. fix missingdjm2017-05-081-1/+2
* I was too aggressive with the scalpel in the last commit;djm2017-05-081-3/+4
* As promised in last release announcement: remove support fordjm2017-05-071-31/+4
* remove miscellaneous SSH1 leftovers; ok markus@naddy2017-05-031-19/+2
* obliterate ssh1.h and some dead code that used itdjm2017-04-301-2/+1
* remove the (in)famous SSHv1 CRC compensation attack detector.djm2017-04-301-6/+1