summaryrefslogtreecommitdiffstats
path: root/auth2-pubkey.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* upstream: Start the process of splitting sshd into separatedjm@openbsd.org2024-05-171-8/+7
* upstream: make sshd_config AuthorizedPrincipalsCommand anddjm@openbsd.org2023-07-281-12/+23
* upstream: Remove now-unused compat bit SSH_BUG_RSASIGMD5. The codedtucker@openbsd.org2023-02-171-7/+1
* upstream: Add RequiredRSASize for sshd(8); RSA keys that falldjm@openbsd.org2022-09-171-1/+6
* upstream: make sure that UseDNS hostname lookup happens in the monitordjm@openbsd.org2022-06-151-11/+8
* upstream: split the low-level file handling functions out fromdjm@openbsd.org2022-05-271-305/+6
* upstream: refactor authorized_keys/principals handlingdjm@openbsd.org2022-05-271-37/+55
* upstream: include rejected signature algorithm in error message andnaddy@openbsd.org2022-03-011-3/+3
* upstream: sshd side of hostbound public key authdjm@openbsd.org2021-12-191-8/+29
* upstream: prepare for multiple names for authmethodsdjm@openbsd.org2021-12-191-3/+4
* upstream: add some debug output showing how many key file/command linesdjm@openbsd.org2021-09-291-3/+8
* upstream: Let allowed signers files used by ssh-keygen(1)djm@openbsd.org2021-07-231-3/+3
* upstream: Allow argv_split() to optionally terminate tokenisationdjm@openbsd.org2021-06-081-3/+4
* upstream: highly polished whitespace, mostly fixing spaces-for-tabdjm@openbsd.org2021-04-031-3/+4
* upstream: make ssh->kex->session_id a sshbuf instead of u_char*/size_tdjm@openbsd.org2021-01-271-6/+5
* upstream: move check_host_cert() from sshconnect,c to sshkey.c anddjm@openbsd.org2021-01-261-3/+3
* upstream: Rename PubkeyAcceptedKeyTypes keyword todtucker@openbsd.org2021-01-221-3/+3
* upstream: move subprocess() from auth.c to misc.cdjm@openbsd.org2020-12-221-5/+7
* upstream: fix possible error("%s", NULL) on error pathsdjm@openbsd.org2020-12-211-3/+3
* upstream: use the new variant log macros instead of prependingdjm@openbsd.org2020-10-181-58/+46
* upstream: support for requiring user verified FIDO keys in sshddjm@openbsd.org2020-08-271-2/+16
* upstream: Replace "security key" with "authenticator" in programnaddy@openbsd.org2020-02-061-2/+3
* upstream: Replace all calls to signal(2) with a wrapper arounddtucker@openbsd.org2020-01-231-5/+5
* upstream: add a "no-touch-required" option for authorized_keys anddjm@openbsd.org2019-11-251-2/+3
* upstream: Add a sshd_config PubkeyAuthOptions directivedjm@openbsd.org2019-11-251-3/+19
* upstream: Add new structure for signature optionsdjm@openbsd.org2019-11-251-2/+9
* upstream: lots of things were relying on libcrypto headers todjm@openbsd.org2019-09-061-1/+2
* upstream: move advance_past_options to authfile.c and make itdjm@openbsd.org2019-09-031-24/+2
* upstream: move skip_space() to misc.c and make it public; okdjm@openbsd.org2019-09-031-11/+1
* upstream: remove mostly vestigal uuencode.[ch]; moving the only uniquedjm@openbsd.org2019-07-161-2/+2
* upstream: print the correct AuthorizedPrincipalsCommand rather thandjm@openbsd.org2019-06-211-3/+3
* upstream: for public key authentication, check AuthorizedKeysFilesdjm@openbsd.org2019-06-141-11/+18
* upstream: embiggen format buffer size for certificate serial number sodjm@openbsd.org2019-05-201-2/+2
* upstream: print the full pubkey being attempted at loglevel >=djm@openbsd.org2019-01-221-1/+17
* upstream: Add sshd_config CASignatureAlgorithms option to allowdjm@openbsd.org2018-09-201-2/+8
* upstream: fix misplaced parenthesis inside if-clause. it's harmlessmestre@openbsd.org2018-09-091-2/+2
* upstream: memleak introduced in r1.83; from Colin Watsondjm@openbsd.org2018-08-231-2/+2
* upstream: delay bailout for invalid authenticdjm@openbsd.org2018-07-311-10/+15
* upstream: treat ssh_packet_write_wait() errors as fatal; ok djm@markus@openbsd.org2018-07-121-3/+3
* upstream: sshd: switch authentication to sshbuf API; ok djm@markus@openbsd.org2018-07-101-2/+2
* upstream: Improve strictness and control over RSA-SHA2 signaturedjm@openbsd.org2018-07-031-6/+7
* upstream: switch config file parsing to getline(3) as this avoidsmarkus@openbsd.org2018-06-061-5/+11
* upstream: make UID available as a %-expansion everywhere that thedjm@openbsd.org2018-06-011-3/+9
* upstream: switch over to the new authorized_keys options API anddjm@openbsd.org2018-03-031-167/+365
* upstream commitdtucker@openbsd.org2018-02-091-5/+3
* upstream commitdjm@openbsd.org2018-01-231-37/+10
* upstream commitdjm@openbsd.org2017-12-211-2/+2
* upstream commitdjm@openbsd.org2017-12-191-8/+28
* upstream commitdjm@openbsd.org2017-12-191-2/+2
* upstream commitdjm@openbsd.org2017-09-121-2/+2