summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/serverloop.c
AgeCommit message (Expand)AuthorFilesLines
2020-01-30use sshpkt_fatal() instead of plain fatal() for ssh_packet_write_poll()djm1-4/+5
2020-01-25make sshd_config:ClientAliveCountMax=0 disable the connection killingdjm1-2/+3
2020-01-25unrevert this:djm1-5/+3
2020-01-23Replace all calls to signal(2) with a wrapper around sigaction(2).dtucker1-5/+5
2019-11-27Revert previous commit. The channels code still uses int in many placesdtucker1-5/+7
2019-11-27Make channel_id u_int32_t and remove unnecessary check and cast that weredtucker1-7/+5
2019-06-28When system calls indicate an error they return -1, not some arbitraryderaadt1-4/+4
2019-03-27fix interaction between ClientAliveInterval and RekeyLimit that coulddjm1-3/+4
2019-03-06Reset last-seen time when sending a keepalive. Prevents sending twodtucker1-6/+9
2019-01-19fix error in refactor: use ssh_packet_disconnect() instead ofdjm1-4/+6
2019-01-19remove last references to active_statedjm1-3/+3
2019-01-19convert serverloop.c to new packet APIdjm1-150/+202
2019-01-19begin landing remaining refactoring of packet parsing API, starteddjm1-1/+4
2018-07-27Remove uid checks from low port binds. Now that ssh cannot bedtucker1-1/+12
2018-07-11remove legacy key emulation layer; ok djm@markus1-2/+2
2018-07-09sshd: switch config to sshbuf API; ok djm@markus1-2/+2
2018-06-08fix some over-long lines and __func__ up some debug messagesdjm1-9/+9
2018-03-03switch over to the new authorized_keys options API and remove thedjm1-15/+18
2018-02-11Don't reset signal handlers inside handlers.dtucker1-2/+1
2018-01-23Drop compatibility hacks for some ancient SSH implementations, includingdjm1-5/+3
2017-12-18unbreak hostkey rotation; attempting to sign with a desired signaturedjm1-3/+11
2017-12-18pass negotiated signing algorithm though to sshkey_verify() anddjm1-2/+3
2017-12-10Put remote client info back into the ClientAlive connection terminationdtucker1-2/+4
2017-10-23Expose devices allocated for tun/tap forwarding.djm1-2/+21
2017-09-12Make remote channel ID a u_intdjm1-1/+5
2017-09-12refactor channels.cdjm1-53/+52
2017-08-30pass packet state down to some of the channels function (moredjm1-4/+4
2017-08-11Tweak previous keepalive commit: if last_time + keepalive <= nowdtucker1-2/+2
2017-08-11Keep track of the last time we actually heard from the client anddtucker1-3/+15
2017-05-31remove now obsolete ctx from ssh_dispatch_run; ok djm@markus1-2/+2
2017-05-30protocol handlers all get struct ssh passed; ok djm@markus1-5/+5
2017-02-01Return true reason for port forwarding failures where feasible ratherdtucker1-7/+10
2017-01-04unbreak Unix domain socket forwarding for root; ok markus@djm1-8/+13
2016-12-14disable Unix-domain socket forwarding when privsep is disableddjm1-3/+5
2016-11-30Add a sshd_config DisableForwaring option that disables X11, agent,djm1-5/+5
2016-10-23Factor out "can bind to low ports" check into its own function. This will makedtucker1-3/+3
2016-09-12Add MAXIMUM(), MINIMUM(), and ROUNDUP() to misc.h, then use those definitionsderaadt1-5/+4
2016-08-13remove ssh1 server code; ok djm@markus1-547/+20
2016-03-07refactor canohost.c: move functions that cache results closer to thedjm1-5/+7
2016-03-04fix ClientAliveInterval when a time-based RekeyLimit is set;djm1-13/+15
2016-02-08refactor activation of rekeyingdjm1-13/+7
2016-01-14remove roaming support; ok djm@markus1-6/+2
2015-12-04implement SHA2-{256,512} for RSASSA-PKCS1-v1_5 signatures (user and host auth)markus1-2/+2
2015-11-28don't include port number in tcpip-forward replies for requestsdjm1-2/+3
2015-02-20UpdateHostKeys fixes:djm1-5/+5
2015-02-16Revise hostkeys@openssh.com hostkey learning extension.djm1-4/+84
2015-01-20Reduce use of <sys/param.h> and transition to <limits.h> throughout.deraadt1-2/+2
2015-01-19adapt kex to sshbuf and struct ssh; ok djm@markus1-3/+3
2015-01-19move dispatch to struct ssh; ok djm@markus1-9/+16
2015-01-19update packet.c & isolate, introduce struct sshmarkus1-6/+5