index
:
openssh
master
openssh
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
monitor.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
upstream: Split per-connection sshd-session binary
djm@openbsd.org
2024-10-14
1
-10
/
+97
*
upstream: remove some unused defines; ok djm@
jsg@openbsd.org
2024-09-24
1
-3
/
+1
*
upstream: Add a sshd_config "RefuseConnection" option
djm@openbsd.org
2024-09-15
1
-1
/
+11
*
upstream: Do not apply authorized_keys options when signature
djm@openbsd.org
2024-09-15
1
-2
/
+2
*
upstream: pull post-quantum ML-KEM/x25519 key exchange out from
djm@openbsd.org
2024-09-09
1
-3
/
+1
*
upstream: Add experimental support for hybrid post-quantum key exchange
djm@openbsd.org
2024-09-02
1
-1
/
+4
*
upstream: Add a facility to sshd(8) to penalise particular
djm@openbsd.org
2024-06-06
1
-1
/
+7
*
upstream: remove prototypes with no matching function; ok djm@
jsg@openbsd.org
2024-05-22
1
-3
/
+1
*
upstream: Start the process of splitting sshd into separate
djm@openbsd.org
2024-05-17
1
-19
/
+30
*
upstream: defence-in-depth MaxAuthTries check in monitor; ok markus
djm@openbsd.org
2023-08-18
1
-1
/
+6
*
upstream: Remove unused prototypes for ssh1 RSA functions.
dtucker@openbsd.org
2023-05-10
1
-4
/
+1
*
Limit the number of PAM environment variables.
Darren Tucker
2023-03-09
1
-0
/
+4
*
upstream: Remove now-unused compat bit SSH_BUG_RSASIGMD5. The code
dtucker@openbsd.org
2023-02-17
1
-6
/
+1
*
upstream: make sure that UseDNS hostname lookup happens in the monitor
djm@openbsd.org
2022-06-15
1
-6
/
+3
*
upstream: refactor authorized_keys/principals handling
djm@openbsd.org
2022-05-27
1
-3
/
+6
*
upstream: save an unneccessary alloc/free, based on patch from
djm@openbsd.org
2022-03-01
1
-7
/
+4
*
upstream: When it's the possessive of 'it', it's spelled "its",
guenther@openbsd.org
2022-02-01
1
-2
/
+2
*
upstream: log signature algorithm during verification by monitor;
djm@openbsd.org
2022-01-06
1
-2
/
+3
*
upstream: sshd side of hostbound public key auth
djm@openbsd.org
2021-12-19
1
-5
/
+21
*
upstream: remove a bunch of %p in format strings; leftovers of
djm@openbsd.org
2021-08-11
1
-6
/
+4
*
Sync remaining ChallengeResponse removal.
Darren Tucker
2021-07-03
1
-2
/
+2
*
upstream: Remove now-unused skey function prototypes leftover from
dtucker@openbsd.org
2021-04-30
1
-3
/
+1
*
upstream: do not pass file/func to monitor; noted by Ilja van Sprundel;
markus@openbsd.org
2021-04-16
1
-10
/
+6
*
upstream: don't sshbuf_get_u32() into an enum; reported by goetze
djm@openbsd.org
2021-03-03
1
-4
/
+4
*
upstream: make ssh->kex->session_id a sshbuf instead of u_char*/size_t
djm@openbsd.org
2021-01-27
1
-21
/
+28
*
upstream: remove global variable used to stash compat flags and use the
djm@openbsd.org
2021-01-27
1
-5
/
+5
*
upstream: Rename HostbasedKeyTypes (ssh) and
dtucker@openbsd.org
2021-01-26
1
-2
/
+2
*
upstream: Rename PubkeyAcceptedKeyTypes keyword to
dtucker@openbsd.org
2021-01-22
1
-2
/
+2
*
upstream: Update/replace the experimental post-quantim hybrid key
djm@openbsd.org
2020-12-29
1
-2
/
+2
*
upstream: clean up passing of struct passwd from monitor to preauth
djm@openbsd.org
2020-11-27
1
-6
/
+20
*
upstream: use the new variant log macros instead of prepending
djm@openbsd.org
2020-10-18
1
-154
/
+141
*
upstream: variants of the log methods that append a ssherr.h string
djm@openbsd.org
2020-10-18
1
-4
/
+3
*
upstream: revised log infrastructure for OpenSSH
djm@openbsd.org
2020-10-16
1
-5
/
+10
*
upstream: support for requiring user verified FIDO keys in sshd
djm@openbsd.org
2020-08-27
1
-2
/
+15
*
upstream: support for user-verified FIDO keys
djm@openbsd.org
2020-08-27
1
-2
/
+2
*
upstream: correct recently broken comments
deraadt@openbsd.org
2020-07-15
1
-2
/
+2
*
upstream: some language improvements; ok markus
djm@openbsd.org
2020-07-15
1
-2
/
+2
*
upstream: spelling errors in comments; no code change from
djm@openbsd.org
2020-03-14
1
-2
/
+2
*
upstream: change explicit_bzero();free() to freezero()
jsg@openbsd.org
2020-02-28
1
-3
/
+2
*
upstream: Replace "security key" with "authenticator" in program
naddy@openbsd.org
2020-02-06
1
-3
/
+4
*
upstream: Replace all calls to signal(2) with a wrapper around
dtucker@openbsd.org
2020-01-23
1
-5
/
+5
*
upstream: allow security keys to act as host keys as well as user
djm@openbsd.org
2019-12-16
1
-2
/
+2
*
upstream: redundant test
djm@openbsd.org
2019-11-25
1
-2
/
+2
*
upstream: add a "no-touch-required" option for authorized_keys and
djm@openbsd.org
2019-11-25
1
-2
/
+3
*
upstream: Add a sshd_config PubkeyAuthOptions directive
djm@openbsd.org
2019-11-25
1
-24
/
+39
*
upstream: Add new structure for signature options
djm@openbsd.org
2019-11-25
1
-3
/
+11
*
upstream: a little more information from the monitor when signature
djm@openbsd.org
2019-11-19
1
-3
/
+4
*
upstream: Refactor signing - use sshkey_sign for everything,
djm@openbsd.org
2019-10-31
1
-2
/
+2
*
upstream: reversed test yielded incorrect debug message
djm@openbsd.org
2019-10-09
1
-2
/
+2
*
wrap stdint.h include in HAVE_STDINT_H
Damien Miller
2019-10-09
1
-1
/
+1
[next]