index
:
openssh
master
openssh
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
auth.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
upstream: move auth_openprincipals() and auth_openkeyfile() over to
djm@openbsd.org
2022-06-03
1
-57
/
+1
*
upstream: split the low-level file handling functions out from
djm@openbsd.org
2022-05-27
1
-93
/
+1
*
upstream: refactor authorized_keys/principals handling
djm@openbsd.org
2022-05-27
1
-6
/
+4
*
upstream: Check sshauthopt_new() for NULL. bz#3425, from
dtucker@openbsd.org
2022-04-27
1
-2
/
+3
*
Remove now-unused passwd variable.
Darren Tucker
2022-03-26
1
-1
/
+1
*
Factor out platform-specific locked account check.
Darren Tucker
2022-03-26
1
-47
/
+3
*
upstream: randomise the password used in fakepw
djm@openbsd.org
2022-02-23
1
-3
/
+13
*
upstream: Remove comment referencing now-removed
dtucker@openbsd.org
2021-07-08
1
-4
/
+2
*
Remove some whitespace not in upstream.
Darren Tucker
2021-07-03
1
-1
/
+0
*
auth_log: dont log partial successes as failures
Vincent Brillault
2021-06-04
1
-13
/
+16
*
upstream: highly polished whitespace, mostly fixing spaces-for-tab
djm@openbsd.org
2021-04-03
1
-2
/
+2
*
prefer login_getpwclass() to login_getclass()
Damien Miller
2021-02-18
1
-1
/
+1
*
upstream: move subprocess() from auth.c to misc.c
djm@openbsd.org
2020-12-22
1
-153
/
+1
*
upstream: load_hostkeys()/hostkeys_foreach() variants for FILE*
djm@openbsd.org
2020-12-21
1
-3
/
+3
*
upstream: use the new variant log macros instead of prepending
djm@openbsd.org
2020-10-18
1
-20
/
+18
*
upstream: LogVerbose keyword for ssh and sshd
djm@openbsd.org
2020-10-16
1
-1
/
+5
*
upstream: support for requiring user verified FIDO keys in sshd
djm@openbsd.org
2020-08-27
1
-4
/
+5
*
upstream: Add a sshd_config "Include" directive to allow inclusion
djm@openbsd.org
2020-02-01
1
-2
/
+3
*
upstream: Replace all calls to signal(2) with a wrapper around
dtucker@openbsd.org
2020-01-23
1
-2
/
+2
*
upstream: strdup may return NULL if memory allocation fails. Use
tobhe@openbsd.org
2019-12-20
1
-7
/
+7
*
upstream: add a "no-touch-required" option for authorized_keys and
djm@openbsd.org
2019-11-25
1
-3
/
+4
*
upstream: potential NULL dereference for revoked hostkeys; reported
djm@openbsd.org
2019-10-16
1
-2
/
+2
*
upstream: remove some duplicate #includes
djm@openbsd.org
2019-10-02
1
-2
/
+1
*
upstream: lots of things were relying on libcrypto headers to
djm@openbsd.org
2019-09-06
1
-1
/
+2
*
upstream: When system calls indicate an error they return -1, not
deraadt@openbsd.org
2019-07-05
1
-8
/
+8
*
Remove "struct ssh" from sys_auth_record_login.
Darren Tucker
2019-04-02
1
-1
/
+1
*
Revert "[auth.c] On Cygwin, refuse usernames that have differences in case"
Corinna Vinschen
2019-02-22
1
-13
/
+0
*
last bits of old packet API / active_state global
Damien Miller
2019-01-20
1
-2
/
+2
*
remove vestiges of old packet API from loginrec.c
Damien Miller
2019-01-19
1
-3
/
+3
*
upstream: convert auth.c to new packet API
djm@openbsd.org
2019-01-19
1
-16
/
+10
*
upstream: convert servconf.c to new packet API
djm@openbsd.org
2019-01-19
1
-2
/
+3
*
upstream: begin landing remaining refactoring of packet parsing
djm@openbsd.org
2019-01-19
1
-1
/
+4
*
upstream: include time.h for time(3)/nanosleep(2); from Ian
djm@openbsd.org
2019-01-17
1
-1
/
+2
*
Don't pass loginmsg by address now that it's an sshbuf*
Kevin Adler
2018-12-13
1
-2
/
+2
*
upstream: use path_absolute() for pathname checks; from Manoj Ampalam
djm@openbsd.org
2018-11-16
1
-3
/
+3
*
upstream: log certificate fingerprint in authentication
djm@openbsd.org
2018-09-12
1
-9
/
+13
*
upstream: s/wuth/with/ in comment
martijn@openbsd.org
2018-07-12
1
-2
/
+2
*
Adapt portable to legacy buffer API removal
Damien Miller
2018-07-10
1
-1
/
+1
*
upstream: sshd: switch authentication to sshbuf API; ok djm@
markus@openbsd.org
2018-07-10
1
-18
/
+21
*
upstream: permitlisten option for authorized_keys; ok markus@
djm@openbsd.org
2018-06-06
1
-3
/
+12
*
upstream: make UID available as a %-expansion everywhere that the
djm@openbsd.org
2018-06-01
1
-3
/
+5
*
upstream: Do not ban PTY allocation when a sshd session is restricted
djm@openbsd.org
2018-05-25
1
-1
/
+2
*
upstream: add valid-before="[time]" authorized_keys option. A
djm@openbsd.org
2018-03-14
1
-5
/
+23
*
upstream: switch over to the new authorized_keys options API and
djm@openbsd.org
2018-03-03
1
-5
/
+175
*
upstream commit
markus@openbsd.org
2018-01-23
1
-1
/
+154
*
upstream commit
djm@openbsd.org
2017-09-12
1
-1
/
+2
*
upstream commit
djm@openbsd.org
2017-08-23
1
-97
/
+2
*
upstream commit
djm@openbsd.org
2017-06-24
1
-18
/
+44
*
upstream commit
markus@openbsd.org
2017-05-31
1
-3
/
+3
*
upstream commit
djm@openbsd.org
2017-05-17
1
-1
/
+2
[next]