summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/packet.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* consistently check packet_timeout_ms against 0; ok djmmarkus2020-03-061-5/+5
* have sshpkt_fatal() save/restore errno before we potentiallydjm2020-01-301-1/+4
* Fix typo in comment.dtucker2020-01-231-2/+2
* Make zlib optional. This adds a "ZLIB" build time option that allowsdtucker2020-01-231-1/+35
* strdup may return NULL if memory allocation fails. Use the safer xstrduptobhe2019-12-161-3/+3
* When system calls indicate an error they return -1, not some arbitraryderaadt2019-06-281-7/+7
* Typo and spelling fixes in comments and error messages. Patch fromdtucker2019-06-071-2/+2
* Remove crc32.{c,h} which were only used by the now-gone SSH1 protocol.dtucker2019-04-181-2/+1
* in ssh_set_newkeys(), mention the direction that we're keying in debugdjm2019-03-011-5/+7
* pass values used in KEX hash computation as sshbuf rather thandjm2019-01-211-1/+7
* Make sshpkt_get_bignum2() allocate the bignum it is parsing ratherdjm2019-01-211-4/+3
* allow sshpkt_fatal() to take a varargs format; we'll use this to givedjm2019-01-191-6/+23
* fix memory leak of ciphercontext when rekeying; bz#2942djm2019-01-041-3/+3
* move client/server SSH-* banners to buffers under ssh->kex and factordjm2018-12-271-22/+20
* memleaks; found by valgrinddjm2018-07-161-1/+3
* client: switch to sshbuf API; ok djm@markus2018-07-091-4/+1
* Revert previous two commitssf2018-07-091-5/+6
* Rename COMP_DELAYED to COMP_ZLIBsf2018-07-061-4/+4
* Remove leftovers from pre-authentication compressionsf2018-07-061-4/+3
* Remove unused ssh_packet_start_compression()sf2018-07-061-22/+1
* make ssh_remote_ipaddr() capable of being called after the ssh->statedjm2018-06-011-4/+8
* If select() fails in ssh_packet_read_seqnr go directly to the error pathdtucker2018-05-251-3/+5
* pass kex->hostkey_alg and kex->hostkey_nid from pre-auth to post-authdjm2017-12-181-1/+5
* Put remote client info back into the ClientAlive connection terminationdtucker2017-12-101-5/+5
* Add monotime_ts and monotime_tv that return monotonic timespec anddtucker2017-11-251-3/+3
* add sshd_config RDomain keyword to place sshd and the subsequentdjm2017-10-251-1/+13
* log debug messages sent to peer; ok deraadt markusdjm2017-10-131-1/+3
* refactor channels.cdjm2017-09-121-30/+38
* Allow IPQoS=none in ssh/sshd to not set an explicit ToS/DSCP valuedjm2017-07-231-2/+2
* don't pass pointer to struct sshcipher between privsep processes,djm2017-06-241-9/+5
* Add comments referring to the relevant RFC sections for rekeyingdtucker2017-06-091-2/+6
* Fix compression output stats broken in rev 1.201. Patch originally bydtucker2017-06-061-2/+2
* some warnings spotted by clang; ok markus@djm2017-06-011-5/+3
* These shutdown() SHUT_RDWR are not needed before close()deraadt2017-05-311-2/+1
* clear session keys from memory; ok djm@markus2017-05-311-35/+61
* helps if I commit the correct version of the file. fix missingdjm2017-05-081-1/+2
* I was too aggressive with the scalpel in the last commit;djm2017-05-081-3/+4
* As promised in last release announcement: remove support fordjm2017-05-071-31/+4
* remove miscellaneous SSH1 leftovers; ok markus@naddy2017-05-031-19/+2
* obliterate ssh1.h and some dead code that used itdjm2017-04-301-2/+1
* remove the (in)famous SSHv1 CRC compensation attack detector.djm2017-04-301-6/+1
* remove SSHv1 support from packet and buffer APIsdjm2017-04-301-148/+1
* remove compat20/compat13/compat15 variablesdjm2017-04-301-289/+106
* unifdef WITH_SSH1djm2017-04-301-42/+1
* Don't count the initial block twice when computing how many bytesmarkus2017-03-111-3/+3
* small memleak: free fd_set on connection timeout (though we are heading todjm2017-02-281-3/+5
* add ssh_packet_set_log_preamble() to allow inclusion of a preambledjm2017-02-031-17/+45
* Make ssh_packet_set_rekey_limits take u32 for the number of secondsdtucker2017-02-031-5/+5
* Add a per-packet input hook that is called with the decrypted packetdjm2016-10-111-1/+16
* ssh proxy mux mode (-O proxy; idea from Simon Tatham):markus2016-09-301-2/+91