summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/serverloop.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* highly polished whitespace, mostly fixing spaces-for-tab and baddjm2021-04-031-2/+2
* make ssh->kex->session_id a sshbuf instead of u_char*/size_t anddjm2021-01-271-3/+3
* use the new variant log macros instead of prepending __func__ anddjm2020-10-181-45/+37
* start ClientAliveInterval bookkeeping before first pass throughdjm2020-07-031-1/+3
* use sshpkt_fatal() instead of plain fatal() for ssh_packet_write_poll()djm2020-01-301-4/+5
* make sshd_config:ClientAliveCountMax=0 disable the connection killingdjm2020-01-251-2/+3
* unrevert this:djm2020-01-251-5/+3
* Replace all calls to signal(2) with a wrapper around sigaction(2).dtucker2020-01-231-5/+5
* Revert previous commit. The channels code still uses int in many placesdtucker2019-11-271-5/+7
* Make channel_id u_int32_t and remove unnecessary check and cast that weredtucker2019-11-271-7/+5
* When system calls indicate an error they return -1, not some arbitraryderaadt2019-06-281-4/+4
* fix interaction between ClientAliveInterval and RekeyLimit that coulddjm2019-03-271-3/+4
* Reset last-seen time when sending a keepalive. Prevents sending twodtucker2019-03-061-6/+9
* fix error in refactor: use ssh_packet_disconnect() instead ofdjm2019-01-191-4/+6
* remove last references to active_statedjm2019-01-191-3/+3
* convert serverloop.c to new packet APIdjm2019-01-191-152/+204
* begin landing remaining refactoring of packet parsing API, starteddjm2019-01-191-1/+4
* Remove uid checks from low port binds. Now that ssh cannot bedtucker2018-07-271-1/+12
* remove legacy key emulation layer; ok djm@markus2018-07-111-2/+2
* sshd: switch config to sshbuf API; ok djm@markus2018-07-091-2/+2
* fix some over-long lines and __func__ up some debug messagesdjm2018-06-081-9/+9
* switch over to the new authorized_keys options API and remove thedjm2018-03-031-15/+18
* Don't reset signal handlers inside handlers.dtucker2018-02-111-2/+1
* Drop compatibility hacks for some ancient SSH implementations, includingdjm2018-01-231-5/+3
* unbreak hostkey rotation; attempting to sign with a desired signaturedjm2017-12-181-3/+11
* pass negotiated signing algorithm though to sshkey_verify() anddjm2017-12-181-2/+3
* Put remote client info back into the ClientAlive connection terminationdtucker2017-12-101-2/+4
* Expose devices allocated for tun/tap forwarding.djm2017-10-231-2/+21
* Make remote channel ID a u_intdjm2017-09-121-1/+5
* refactor channels.cdjm2017-09-121-53/+52
* pass packet state down to some of the channels function (moredjm2017-08-301-4/+4
* Tweak previous keepalive commit: if last_time + keepalive <= nowdtucker2017-08-111-2/+2
* Keep track of the last time we actually heard from the client anddtucker2017-08-111-3/+15
* remove now obsolete ctx from ssh_dispatch_run; ok djm@markus2017-05-311-2/+2
* protocol handlers all get struct ssh passed; ok djm@markus2017-05-301-5/+5
* Return true reason for port forwarding failures where feasible ratherdtucker2017-02-011-7/+10
* unbreak Unix domain socket forwarding for root; ok markus@djm2017-01-041-8/+13
* disable Unix-domain socket forwarding when privsep is disableddjm2016-12-141-3/+5
* Add a sshd_config DisableForwaring option that disables X11, agent,djm2016-11-301-5/+5
* Factor out "can bind to low ports" check into its own function. This will makedtucker2016-10-231-3/+3
* Add MAXIMUM(), MINIMUM(), and ROUNDUP() to misc.h, then use those definitionsderaadt2016-09-121-5/+4
* remove ssh1 server code; ok djm@markus2016-08-131-547/+20
* refactor canohost.c: move functions that cache results closer to thedjm2016-03-071-5/+7
* fix ClientAliveInterval when a time-based RekeyLimit is set;djm2016-03-041-13/+15
* refactor activation of rekeyingdjm2016-02-081-13/+7
* remove roaming support; ok djm@markus2016-01-141-6/+2
* implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)markus2015-12-041-2/+2
* don't include port number in tcpip-forward replies for requestsdjm2015-11-281-2/+3
* UpdateHostKeys fixes:djm2015-02-201-5/+5
* Revise hostkeys@openssh.com hostkey learning extension.djm2015-02-161-4/+84