summaryrefslogtreecommitdiffstats
path: root/auth.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* upstream: Replace all calls to signal(2) with a wrapper arounddtucker@openbsd.org2020-01-231-2/+2
* upstream: strdup may return NULL if memory allocation fails. Usetobhe@openbsd.org2019-12-201-7/+7
* upstream: add a "no-touch-required" option for authorized_keys anddjm@openbsd.org2019-11-251-3/+4
* upstream: potential NULL dereference for revoked hostkeys; reporteddjm@openbsd.org2019-10-161-2/+2
* upstream: remove some duplicate #includesdjm@openbsd.org2019-10-021-2/+1
* upstream: lots of things were relying on libcrypto headers todjm@openbsd.org2019-09-061-1/+2
* upstream: When system calls indicate an error they return -1, notderaadt@openbsd.org2019-07-051-8/+8
* Remove "struct ssh" from sys_auth_record_login.Darren Tucker2019-04-021-1/+1
* Revert "[auth.c] On Cygwin, refuse usernames that have differences in case"Corinna Vinschen2019-02-221-13/+0
* last bits of old packet API / active_state globalDamien Miller2019-01-201-2/+2
* remove vestiges of old packet API from loginrec.cDamien Miller2019-01-191-3/+3
* upstream: convert auth.c to new packet APIdjm@openbsd.org2019-01-191-16/+10
* upstream: convert servconf.c to new packet APIdjm@openbsd.org2019-01-191-2/+3
* upstream: begin landing remaining refactoring of packet parsingdjm@openbsd.org2019-01-191-1/+4
* upstream: include time.h for time(3)/nanosleep(2); from Iandjm@openbsd.org2019-01-171-1/+2
* Don't pass loginmsg by address now that it's an sshbuf*Kevin Adler2018-12-131-2/+2
* upstream: use path_absolute() for pathname checks; from Manoj Ampalamdjm@openbsd.org2018-11-161-3/+3
* upstream: log certificate fingerprint in authenticationdjm@openbsd.org2018-09-121-9/+13
* upstream: s/wuth/with/ in commentmartijn@openbsd.org2018-07-121-2/+2
* Adapt portable to legacy buffer API removalDamien Miller2018-07-101-1/+1
* upstream: sshd: switch authentication to sshbuf API; ok djm@markus@openbsd.org2018-07-101-18/+21
* upstream: permitlisten option for authorized_keys; ok markus@djm@openbsd.org2018-06-061-3/+12
* upstream: make UID available as a %-expansion everywhere that thedjm@openbsd.org2018-06-011-3/+5
* upstream: Do not ban PTY allocation when a sshd session is restricteddjm@openbsd.org2018-05-251-1/+2
* upstream: add valid-before="[time]" authorized_keys option. Adjm@openbsd.org2018-03-141-5/+23
* upstream: switch over to the new authorized_keys options API anddjm@openbsd.org2018-03-031-5/+175
* upstream commitmarkus@openbsd.org2018-01-231-1/+154
* upstream commitdjm@openbsd.org2017-09-121-1/+2
* upstream commitdjm@openbsd.org2017-08-231-97/+2
* upstream commitdjm@openbsd.org2017-06-241-18/+44
* upstream commitmarkus@openbsd.org2017-05-311-3/+3
* upstream commitdjm@openbsd.org2017-05-171-1/+2
* upstream commitdtucker@openbsd.org2016-12-161-2/+3
* upstream commitdjm@openbsd.org2016-11-101-2/+2
* upstream commitdjm@openbsd.org2016-11-061-6/+16
* upstream commitmarkus@openbsd.org2016-08-141-6/+4
* upstream commitdtucker@openbsd.org2016-06-151-4/+3
* auth_get_canonical_hostname in portable code.Darren Tucker2016-03-081-3/+4
* upstream commitdjm@openbsd.org2016-03-071-10/+135
* upstream commitdjm@openbsd.org2015-08-211-2/+2
* upstream commitV_7_0_P1deraadt@openbsd.org2015-08-111-2/+4
* upstream commitdjm@openbsd.org2015-05-101-3/+2
* upstream commitdjm@openbsd.org2015-02-251-2/+3
* upstream commitderaadt@openbsd.org2015-01-261-4/+4
* upstream commitdjm@openbsd.org2014-12-211-2/+3
* upstream commitdjm@openbsd.org2014-12-041-33/+29
* - millert@cvs.openbsd.org 2014/07/15 15:54:14Damien Miller2014-07-181-2/+2
* - djm@cvs.openbsd.org 2014/07/03 11:16:55Damien Miller2014-07-031-1/+15
* - markus@cvs.openbsd.org 2014/04/29 18:01:49Damien Miller2014-05-151-1/+5
* - djm@cvs.openbsd.org 2013/05/19 02:42:42Darren Tucker2013-06-011-4/+26