path: root/src/server.c
AgeCommit message (Expand)AuthorFilesLines
2019-12-09server: Use SSH_STRING_FREE()Andreas Schneider1-4/+4
2019-12-09SSH-01-006: Add missing NULL check in server_set_kex()Andreas Schneider1-1/+8
2019-12-09server: Cast auth_methods to uint32_tAndreas Schneider1-3/+5
2019-12-09server: Make sure methods is a valid value before castingAndreas Schneider1-1/+6
2019-11-18Use only one variable denoting the size of methods arraysJakub Jelen1-2/+2
2019-11-07server: Use really the negotiated signature typeJakub Jelen1-1/+6
2019-06-13SSH_LOG: Adjust log level from SSH_LOG_WARNING to SSH_LOG_PROTOCOLDavid Wedderwille1-1/+1
2019-06-13server: Send only allowed algorithms in extensionAnderson Toshiyuki Sasaki1-2/+6
2019-06-12kex, pki, server, options: Filter algorithms in FIPS modeAnderson Toshiyuki Sasaki1-3/+12
2019-06-12server: Use default methods instead of allAnderson Toshiyuki Sasaki1-2/+2
2019-06-12options: Added an option to set server HostKey algorithmsAnderson Toshiyuki Sasaki1-62/+80
2019-06-12options: Add option to set server accepted pubkey typesAnderson Toshiyuki Sasaki1-5/+8
2019-04-29server: fix sending SSH_MSG_EXT_INFO upon rekeyJon Simons1-1/+16
2019-04-29server: fix queued USERAUTH_SUCCESS rekey bugJon Simons1-3/+9
2019-04-17libssh: deprecate SSH_KEYTYPE_ECDSABen Toews1-1/+3
2019-02-21connector: Fallback on the socket output callbackDavid Wedderwille1-0/+1
2019-01-24dh-gex: Add server implementationAris Adamantiadis1-0/+1
2019-01-24kex: use runtime callbacks (server)Aris Adamantiadis1-146/+5
2019-01-09server: Correctly handle extensionsJakub Jelen1-1/+1
2019-01-09packet: Implement rekeying based on the recommendation from RFC'sJakub Jelen1-1/+2
2019-01-09packet: Provide a function to switch crypto in separate directionsJakub Jelen1-30/+2
2019-01-09packet: Introduce a new function to access cryptoJakub Jelen1-4/+7
2019-01-09server: Reformat ssh_auth_reply_successJakub Jelen1-24/+28
2018-11-23server: Do not send SSH_MSG_EXT_INFO after rekeyJakub Jelen1-8/+10
2018-11-20packets: Fix ssh_send_keepalive()Nicolas Viennot1-23/+3
2018-10-19server: Set correct state after sending INFO_REQUEST (Kbd Interactive)Meng Tan1-0/+1
2018-09-20dh: Add diffie-hellman-group18-sha512 supportAnderson Toshiyuki Sasaki1-0/+1
2018-09-19dh: Add diffie-hellman-group16-sha512 supportAnderson Toshiyuki Sasaki1-0/+1
2018-08-31server: We should list SHA2 variants in offered hostkeysJakub Jelen1-1/+6
2018-08-31server: Support for extension negotiationJakub Jelen1-1/+40
2018-08-27session: Group auth variables in a structAndreas Schneider1-9/+9
2018-08-03server: Fix echo access in ssh_message_auth_interactive_request()Andreas Schneider1-1/+1
2018-07-05crytpo: Make sure we check return of ssh_get_random() correctlyAndreas Schneider1-1/+7
2018-06-29kex: add curve25519-sha256 as alias for curve25519-sha256@libssh.orgTilo Eckert1-0/+1
2018-06-29Rest in Peace SSHv1Andreas Schneider1-124/+95
2018-06-28Remove vim modelines from all filesAndreas Schneider1-2/+0
2018-05-07server: Fix segfault in dh_handshake_server()Andreas Schneider1-1/+11
2018-04-20server: Fix session pubkey importAndreas Schneider1-1/+1
2018-04-18server: Do not leak pubkey_blob in ssh_get_key_params()Andreas Schneider1-0/+1
2018-03-21crypto: Change the type of server_pubkey to ssh_keyAndreas Schneider1-1/+8
2018-01-18server: Use calloc() instead of malloc()Andreas Schneider1-2/+2
2017-12-28add mbedtls crypto supportJuraj Vijtiuk1-0/+2
2017-10-29server: expose 'ssh_server_init_kex' APIJon Simons1-6/+21
2017-08-24ecdh: enable ecdh_sha2_nistp{384,521} kex methodsJon Simons1-0/+2
2016-11-06doc: Improve documentation for ssh_set_auth_methods()Andreas Schneider1-6/+0
2016-01-19cleanup: use ssh_ prefix in the packet (non-static) functionsFabiano FidĂȘncio1-12/+12
2016-01-19cleanup: use ssh_ prefix in the dh (non-static) functionsFabiano FidĂȘncio1-8/+8
2016-01-19cleanup: use ssh_ prefix in the buffer (non-static) functionsFabiano FidĂȘncio1-5/+5
2015-09-24crypto: move key setup in newkeys handlerAris Adamantiadis1-0/+8
2015-08-18server: Fix return code check of ssh_buffer_pack()Andreas Schneider1-1/+1