index
:
wireguard-openbsd
jd/histogram
jd/queueboosts
jd/simplify-queueing
master
WireGuard implementation for the OpenBSD kernel
Matt Dunwoodie
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
usr.bin
/
ssh
/
sshconnect2.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
wrap long line
djm
2020-06-05
1
-2
/
+3
*
when ordering the hostkey algorithms to request from a server,
djm
2020-05-13
1
-4
/
+16
*
fix reversed test that caused IdentitiesOnly=yes to not apply to keys
djm
2020-04-17
1
-2
/
+2
*
When using HostkeyAlgorithms to merely append or remove algorithms
djm
2020-02-06
1
-15
/
+26
*
Replace "security key" with "authenticator" in program messages.
naddy
2020-02-06
1
-6
/
+7
*
Make zlib optional. This adds a "ZLIB" build time option that allows
dtucker
2020-01-23
1
-3
/
+3
*
Replace all calls to signal(2) with a wrapper around sigaction(2).
dtucker
2020-01-23
1
-4
/
+4
*
Remove unsupported algorithms from list of defaults at run time and
dtucker
2020-01-23
1
-4
/
+4
*
a little more verbosity in sign_and_send_pubkey() debug messages
djm
2020-01-21
1
-3
/
+5
*
close the "touch your security key" notifier on the error path too
djm
2019-11-15
1
-2
/
+2
*
stdarg.h required more broadly; ok djm
deraadt
2019-11-13
1
-1
/
+2
*
security keys typically need to be tapped/touched in order to perform
djm
2019-11-12
1
-1
/
+16
*
enable ed25519 support; ok djm
markus
2019-11-12
1
-8
/
+5
*
Refactor signing - use sshkey_sign for everything, including the new
djm
2019-10-31
1
-14
/
+3
*
ssh client support for U2F/FIDO keys
djm
2019-10-31
1
-25
/
+86
*
Remove now-redundant perm_ok arg since sshkey_load_private_type will
dtucker
2019-08-05
1
-3
/
+3
*
Remove some set but never used variables. ok daraadt@
dtucker
2019-07-07
1
-5
/
+4
*
When system calls indicate an error they return -1, not some arbitrary
deraadt
2019-06-28
1
-10
/
+10
*
fix ssh-keysign fd handling problem introduced in r1.304 caused by a typo
djm
2019-05-31
1
-2
/
+2
*
When doing the fork+exec'ing for ssh-keysign, rearrange the socket
deraadt
2019-05-15
1
-7
/
+9
*
fix regression in r1.302 reported by naddy@ - only the first public
djm
2019-02-12
1
-5
/
+5
*
cleanup GSSAPI authentication context after completion of the
djm
2019-02-11
1
-67
/
+88
*
merge kexkem[cs] into kexgen
djm
2019-01-21
1
-9
/
+9
*
use KEM API for vanilla ECDH
djm
2019-01-21
1
-2
/
+2
*
use KEM API for vanilla DH KEX
djm
2019-01-21
1
-6
/
+6
*
use KEM API for vanilla c25519 KEX
djm
2019-01-21
1
-2
/
+2
*
Add support for a PQC KEX/KEM: sntrup4591761x25519-sha512@tinyssh.org
djm
2019-01-21
1
-1
/
+2
*
GSSAPI code got missed when converting to new packet API
djm
2019-01-21
1
-4
/
+4
*
convert the remainder of sshconnect2.c to new packet API
djm
2019-01-19
1
-49
/
+46
*
convert sshconnect2.c to new packet API
djm
2019-01-19
1
-13
/
+16
*
begin landing remaining refactoring of packet parsing API, started
djm
2019-01-19
1
-1
/
+4
*
eliminate function-static attempt counters for passwd/kbdint
djm
2019-01-04
1
-8
/
+10
*
move client/server SSH-* banners to buffers under ssh->kex and factor
djm
2018-12-27
1
-26
/
+23
*
don't truncate user or host name in "user@host's password: " prompts.
djm
2018-11-28
1
-6
/
+5
*
fix bug in client that was keeping a redundant ssh-agent socket around
djm
2018-11-16
1
-3
/
+5
*
don't send new-style rsa-sha2-*-cert-v01@openssh.com names to older
djm
2018-10-11
1
-2
/
+3
*
second try, deals properly with missing and private-only keys:
djm
2018-09-14
1
-26
/
+53
*
revert following; deals badly with agent keys
djm
2018-09-14
1
-47
/
+26
*
Use consistent format in debug log for keys readied, offered and
djm
2018-09-14
1
-26
/
+47
*
revert compat.[ch] section of the following change. It causes
djm
2018-08-13
1
-8
/
+7
*
fix some memory leaks spotted by Coverity via Jakub Jelen in bz#2366
djm
2018-07-31
1
-7
/
+8
*
Remove support for running ssh(1) setuid and fatal if attempted.
dtucker
2018-07-18
1
-2
/
+1
*
Remove support for loading HostBasedAuthentication keys directly in
dtucker
2018-07-16
1
-7
/
+3
*
treat ssh_packet_write_wait() errors as fatal; ok djm@
markus
2018-07-11
1
-3
/
+3
*
remove legacy key emulation layer; ok djm@
markus
2018-07-11
1
-6
/
+6
*
client: switch to sshbuf API; ok djm@
markus
2018-07-09
1
-212
/
+277
*
Revert previous two commits
sf
2018-07-09
1
-2
/
+2
*
Remove leftovers from pre-authentication compression
sf
2018-07-06
1
-2
/
+2
*
repair PubkeyAcceptedKeyTypes (and friends) after RSA signature work -
djm
2018-07-04
1
-4
/
+6
*
some finesse to fix RSA-SHA2 certificate authentication for certs
djm
2018-07-03
1
-3
/
+6
[next]