Name |
Date |
Size |
#Lines |
LOC |
||
---|---|---|---|---|---|---|
.. | - | - | ||||
contrib/ | 23-Nov-2023 | - | 4,628 | 3,263 | ||
openbsd-compat/ | 23-Nov-2023 | - | 20,067 | 13,085 | ||
regress/ | 23-Nov-2023 | - | 17,236 | 13,866 | ||
.git | D | 01-Jan-1970 | 0 | |||
Android.mk | D | 23-Nov-2023 | 7.7 KiB | 350 | 269 | |
CREDITS | D | 23-Nov-2023 | 5.4 KiB | 103 | 98 | |
ChangeLog | D | 23-Nov-2023 | 279.7 KiB | 9,395 | 6,080 | |
INSTALL | D | 23-Nov-2023 | 9.2 KiB | 271 | 186 | |
LICENCE | D | 23-Nov-2023 | 15.7 KiB | 341 | 296 | |
Makefile.in | D | 23-Nov-2023 | 25.2 KiB | 652 | 560 | |
OVERVIEW | D | 23-Nov-2023 | 6.5 KiB | 169 | 124 | |
OWNERS | D | 23-Nov-2023 | 140 | 4 | 3 | |
PROTOCOL | D | 23-Nov-2023 | 16.4 KiB | 458 | 341 | |
PROTOCOL.agent | D | 23-Nov-2023 | 18.3 KiB | 583 | 426 | |
PROTOCOL.certkeys | D | 23-Nov-2023 | 11.1 KiB | 288 | 231 | |
PROTOCOL.chacha20poly1305 | D | 23-Nov-2023 | 4.5 KiB | 108 | 84 | |
PROTOCOL.key | D | 23-Nov-2023 | 1.5 KiB | 69 | 51 | |
PROTOCOL.krl | D | 23-Nov-2023 | 5 KiB | 170 | 116 | |
PROTOCOL.mux | D | 23-Nov-2023 | 6.1 KiB | 229 | 165 | |
README | D | 23-Nov-2023 | 2.6 KiB | 65 | 48 | |
README.dns | D | 23-Nov-2023 | 1.6 KiB | 48 | 30 | |
README.platform | D | 23-Nov-2023 | 4 KiB | 97 | 74 | |
README.privsep | D | 23-Nov-2023 | 2.3 KiB | 55 | 41 | |
README.tun | D | 23-Nov-2023 | 4.8 KiB | 133 | 98 | |
README.version | D | 23-Nov-2023 | 150 | 5 | 4 | |
TODO | D | 23-Nov-2023 | 2.5 KiB | 81 | 61 | |
aclocal.m4 | D | 23-Nov-2023 | 5.4 KiB | 180 | 171 | |
addrmatch.c | D | 23-Nov-2023 | 10.9 KiB | 500 | 354 | |
atomicio.c | D | 23-Nov-2023 | 4.4 KiB | 171 | 122 | |
atomicio.h | D | 23-Nov-2023 | 2.1 KiB | 52 | 13 | |
audit-bsm.c | D | 23-Nov-2023 | 11.8 KiB | 456 | 323 | |
audit-linux.c | D | 23-Nov-2023 | 3.5 KiB | 127 | 78 | |
audit.c | D | 23-Nov-2023 | 5.7 KiB | 185 | 105 | |
audit.h | D | 23-Nov-2023 | 2.3 KiB | 56 | 27 | |
auth-bsdauth.c | D | 23-Nov-2023 | 3.6 KiB | 146 | 99 | |
auth-krb5.c | D | 23-Nov-2023 | 6.9 KiB | 273 | 200 | |
auth-options.c | D | 23-Nov-2023 | 16.7 KiB | 658 | 570 | |
auth-options.h | D | 23-Nov-2023 | 1.3 KiB | 41 | 20 | |
auth-pam.c | D | 23-Nov-2023 | 31.6 KiB | 1,262 | 977 | |
auth-pam.h | D | 23-Nov-2023 | 1.9 KiB | 46 | 19 | |
auth-passwd.c | D | 23-Nov-2023 | 6.4 KiB | 226 | 149 | |
auth-rhosts.c | D | 23-Nov-2023 | 8.9 KiB | 325 | 211 | |
auth-shadow.c | D | 23-Nov-2023 | 4.2 KiB | 143 | 87 | |
auth-sia.c | D | 23-Nov-2023 | 3.1 KiB | 115 | 70 | |
auth-sia.h | D | 23-Nov-2023 | 1.4 KiB | 32 | 4 | |
auth-skey.c | D | 23-Nov-2023 | 2.8 KiB | 109 | 66 | |
auth.c | D | 23-Nov-2023 | 23.9 KiB | 927 | 693 | |
auth.h | D | 23-Nov-2023 | 6.9 KiB | 218 | 141 | |
auth2-chall.c | D | 23-Nov-2023 | 9.2 KiB | 382 | 304 | |
auth2-gss.c | D | 23-Nov-2023 | 8 KiB | 300 | 200 | |
auth2-hostbased.c | D | 23-Nov-2023 | 7.3 KiB | 252 | 197 | |
auth2-kbdint.c | D | 23-Nov-2023 | 2.1 KiB | 70 | 33 | |
auth2-none.c | D | 23-Nov-2023 | 2.3 KiB | 80 | 43 | |
auth2-passwd.c | D | 23-Nov-2023 | 2.5 KiB | 85 | 48 | |
auth2-pubkey.c | D | 23-Nov-2023 | 30.1 KiB | 1,157 | 913 | |
auth2.c | D | 23-Nov-2023 | 16.2 KiB | 626 | 480 | |
authfd.c | D | 23-Nov-2023 | 17.9 KiB | 722 | 568 | |
authfd.h | D | 23-Nov-2023 | 3.1 KiB | 93 | 55 | |
authfile.c | D | 23-Nov-2023 | 14.3 KiB | 596 | 455 | |
authfile.h | D | 23-Nov-2023 | 2.3 KiB | 53 | 20 | |
bitmap.c | D | 23-Nov-2023 | 4.4 KiB | 213 | 170 | |
bitmap.h | D | 23-Nov-2023 | 1.8 KiB | 57 | 15 | |
blocks.c | D | 23-Nov-2023 | 6.5 KiB | 249 | 215 | |
bufaux.c | D | 23-Nov-2023 | 5.1 KiB | 260 | 192 | |
bufbn.c | D | 23-Nov-2023 | 2.5 KiB | 110 | 73 | |
bufec.c | D | 23-Nov-2023 | 1.9 KiB | 75 | 43 | |
buffer.c | D | 23-Nov-2023 | 2.6 KiB | 119 | 79 | |
buffer.h | D | 23-Nov-2023 | 3.5 KiB | 100 | 59 | |
buildpkg.sh.in | D | 23-Nov-2023 | 17.6 KiB | 678 | 526 | |
canohost.c | D | 23-Nov-2023 | 4.7 KiB | 205 | 143 | |
canohost.h | D | 23-Nov-2023 | 842 | 27 | 9 | |
chacha.c | D | 23-Nov-2023 | 5.3 KiB | 220 | 188 | |
chacha.h | D | 23-Nov-2023 | 1,000 | 37 | 22 | |
channels.c | D | 23-Nov-2023 | 124.9 KiB | 4,673 | 3,729 | |
channels.h | D | 23-Nov-2023 | 11.9 KiB | 324 | 214 | |
cipher-3des1.c | D | 23-Nov-2023 | 4.3 KiB | 159 | 109 | |
cipher-aes.c | D | 23-Nov-2023 | 4.5 KiB | 162 | 119 | |
cipher-aesctr.c | D | 23-Nov-2023 | 2.1 KiB | 84 | 50 | |
cipher-aesctr.h | D | 23-Nov-2023 | 1.3 KiB | 36 | 13 | |
cipher-bf1.c | D | 23-Nov-2023 | 2.8 KiB | 107 | 64 | |
cipher-chachapoly.c | D | 23-Nov-2023 | 3.7 KiB | 120 | 71 | |
cipher-chachapoly.h | D | 23-Nov-2023 | 1.6 KiB | 42 | 19 | |
cipher-ctr.c | D | 23-Nov-2023 | 3.6 KiB | 147 | 103 | |
cipher.c | D | 23-Nov-2023 | 18.3 KiB | 728 | 597 | |
cipher.h | D | 23-Nov-2023 | 4.3 KiB | 103 | 54 | |
cleanup.c | D | 23-Nov-2023 | 1 KiB | 33 | 10 | |
clientloop.c | D | 23-Nov-2023 | 76.4 KiB | 2,780 | 2,002 | |
clientloop.h | D | 23-Nov-2023 | 3.5 KiB | 81 | 29 | |
compat.c | D | 23-Nov-2023 | 8.7 KiB | 304 | 264 | |
compat.h | D | 23-Nov-2023 | 2.9 KiB | 78 | 47 | |
config.guess | D | 23-Nov-2023 | 42.7 KiB | 1,457 | 1,264 | |
config.h | D | 23-Nov-2023 | 43.6 KiB | 1,607 | 294 | |
config.h.in | D | 23-Nov-2023 | 45.5 KiB | 1,771 | 1,194 | |
config.sub | D | 23-Nov-2023 | 35.5 KiB | 1,824 | 1,686 | |
configure | D | 23-Nov-2023 | 518.1 KiB | 20,447 | 16,568 | |
configure.ac | D | 23-Nov-2023 | 139.2 KiB | 5,152 | 4,832 | |
crc32.c | D | 23-Nov-2023 | 4.9 KiB | 106 | 77 | |
crc32.h | D | 23-Nov-2023 | 1.4 KiB | 31 | 4 | |
crypto_api.h | D | 23-Nov-2023 | 1.3 KiB | 45 | 26 | |
deattack.c | D | 23-Nov-2023 | 4.1 KiB | 166 | 106 | |
deattack.h | D | 23-Nov-2023 | 1 KiB | 39 | 13 | |
defines.h | D | 23-Nov-2023 | 21.7 KiB | 878 | 653 | |
dh.c | D | 23-Nov-2023 | 14.8 KiB | 473 | 374 | |
dh.h | D | 23-Nov-2023 | 2.6 KiB | 81 | 33 | |
digest-libc.c | D | 23-Nov-2023 | 5.9 KiB | 265 | 214 | |
digest-openssl.c | D | 23-Nov-2023 | 5 KiB | 206 | 158 | |
digest.h | D | 23-Nov-2023 | 2.5 KiB | 72 | 33 | |
dispatch.c | D | 23-Nov-2023 | 3.7 KiB | 143 | 102 | |
dispatch.h | D | 23-Nov-2023 | 2.3 KiB | 59 | 25 | |
dns.c | D | 23-Nov-2023 | 9.2 KiB | 364 | 263 | |
dns.h | D | 23-Nov-2023 | 2 KiB | 58 | 24 | |
ed25519.c | D | 23-Nov-2023 | 3.1 KiB | 145 | 105 | |
entropy.c | D | 23-Nov-2023 | 6.1 KiB | 245 | 171 | |
entropy.h | D | 23-Nov-2023 | 1.5 KiB | 36 | 7 | |
fatal.c | D | 23-Nov-2023 | 1.6 KiB | 46 | 13 | |
fe25519.c | D | 23-Nov-2023 | 8.1 KiB | 338 | 278 | |
fe25519.h | D | 23-Nov-2023 | 2.3 KiB | 71 | 42 | |
fixalgorithms | D | 23-Nov-2023 | 422 | 27 | 13 | |
fixpaths | D | 23-Nov-2023 | 499 | 23 | 12 | |
fixprogs | D | 23-Nov-2023 | 1.6 KiB | 73 | 53 | |
ge25519.c | D | 23-Nov-2023 | 11 KiB | 322 | 249 | |
ge25519.h | D | 23-Nov-2023 | 1.4 KiB | 44 | 25 | |
ge25519_base.data | D | 23-Nov-2023 | 164.6 KiB | 859 | 856 | |
groupaccess.c | D | 23-Nov-2023 | 3.4 KiB | 134 | 77 | |
groupaccess.h | D | 23-Nov-2023 | 1.5 KiB | 36 | 7 | |
gss-genr.c | D | 23-Nov-2023 | 7.3 KiB | 283 | 192 | |
gss-serv-krb5.c | D | 23-Nov-2023 | 5.6 KiB | 213 | 144 | |
gss-serv.c | D | 23-Nov-2023 | 10.1 KiB | 397 | 250 | |
hash.c | D | 23-Nov-2023 | 1.8 KiB | 77 | 55 | |
hmac.c | D | 23-Nov-2023 | 5.1 KiB | 198 | 150 | |
hmac.h | D | 23-Nov-2023 | 1.6 KiB | 39 | 15 | |
hostfile.c | D | 23-Nov-2023 | 22.3 KiB | 857 | 656 | |
hostfile.h | D | 23-Nov-2023 | 3.8 KiB | 109 | 61 | |
includes.h | D | 23-Nov-2023 | 3.8 KiB | 177 | 133 | |
install-sh | D | 23-Nov-2023 | 5.5 KiB | 252 | 153 | |
kex.c | D | 23-Nov-2023 | 25.9 KiB | 1,041 | 875 | |
kex.h | D | 23-Nov-2023 | 7.3 KiB | 242 | 187 | |
kexc25519.c | D | 23-Nov-2023 | 4.6 KiB | 134 | 92 | |
kexc25519c.c | D | 23-Nov-2023 | 5.1 KiB | 171 | 121 | |
kexc25519s.c | D | 23-Nov-2023 | 5 KiB | 160 | 115 | |
kexdh.c | D | 23-Nov-2023 | 3.2 KiB | 95 | 61 | |
kexdhc.c | D | 23-Nov-2023 | 6 KiB | 221 | 174 | |
kexdhs.c | D | 23-Nov-2023 | 6.1 KiB | 225 | 171 | |
kexecdh.c | D | 23-Nov-2023 | 3.5 KiB | 101 | 66 | |
kexecdhc.c | D | 23-Nov-2023 | 6.3 KiB | 229 | 175 | |
kexecdhs.c | D | 23-Nov-2023 | 6 KiB | 209 | 156 | |
kexgex.c | D | 23-Nov-2023 | 3.6 KiB | 103 | 69 | |
kexgexc.c | D | 23-Nov-2023 | 7.6 KiB | 273 | 219 | |
kexgexs.c | D | 23-Nov-2023 | 7.2 KiB | 255 | 196 | |
key.c | D | 23-Nov-2023 | 8.4 KiB | 427 | 355 | |
key.h | D | 23-Nov-2023 | 4 KiB | 105 | 66 | |
krl.c | D | 23-Nov-2023 | 33.9 KiB | 1,299 | 1,069 | |
krl.h | D | 23-Nov-2023 | 2.5 KiB | 65 | 35 | |
log.c | D | 23-Nov-2023 | 10.6 KiB | 472 | 363 | |
log.h | D | 23-Nov-2023 | 2.6 KiB | 81 | 57 | |
loginrec.c | D | 23-Nov-2023 | 42 KiB | 1,730 | 1,105 | |
loginrec.h | D | 23-Nov-2023 | 4.6 KiB | 132 | 51 | |
logintest.c | D | 23-Nov-2023 | 8.6 KiB | 309 | 214 | |
mac.c | D | 23-Nov-2023 | 7.5 KiB | 273 | 219 | |
mac.h | D | 23-Nov-2023 | 2 KiB | 54 | 24 | |
match.c | D | 23-Nov-2023 | 8.4 KiB | 327 | 181 | |
match.h | D | 23-Nov-2023 | 1.1 KiB | 29 | 12 | |
md-sha256.c | D | 23-Nov-2023 | 2.2 KiB | 87 | 54 | |
md5crypt.c | D | 23-Nov-2023 | 4 KiB | 168 | 102 | |
md5crypt.h | D | 23-Nov-2023 | 744 | 23 | 8 | |
mdoc2man.awk | D | 23-Nov-2023 | 8.4 KiB | 373 | 341 | |
misc.c | D | 23-Nov-2023 | 26.7 KiB | 1,277 | 1,006 | |
misc.h | D | 23-Nov-2023 | 4.8 KiB | 151 | 105 | |
mkinstalldirs | D | 23-Nov-2023 | 691 | 41 | 23 | |
moduli | D | 23-Nov-2023 | 540.2 KiB | 432 | 431 | |
moduli.0 | D | 23-Nov-2023 | 3.4 KiB | 75 | 55 | |
moduli.5 | D | 23-Nov-2023 | 3.6 KiB | 128 | 127 | |
moduli.c | D | 23-Nov-2023 | 20.5 KiB | 809 | 493 | |
monitor.c | D | 23-Nov-2023 | 43.9 KiB | 1,800 | 1,408 | |
monitor.h | D | 23-Nov-2023 | 3.9 KiB | 95 | 56 | |
monitor_fdpass.c | D | 23-Nov-2023 | 4.7 KiB | 188 | 146 | |
monitor_fdpass.h | D | 23-Nov-2023 | 1.5 KiB | 35 | 5 | |
monitor_wrap.c | D | 23-Nov-2023 | 21.9 KiB | 946 | 704 | |
monitor_wrap.h | D | 23-Nov-2023 | 3.6 KiB | 99 | 55 | |
msg.c | D | 23-Nov-2023 | 2.8 KiB | 95 | 60 | |
msg.h | D | 23-Nov-2023 | 1.5 KiB | 33 | 6 | |
mux.c | D | 23-Nov-2023 | 59.5 KiB | 2,268 | 1,863 | |
myproposal.h | D | 23-Nov-2023 | 5.3 KiB | 197 | 147 | |
nchan.c | D | 23-Nov-2023 | 12.8 KiB | 532 | 435 | |
nchan.ms | D | 23-Nov-2023 | 3.9 KiB | 100 | 74 | |
nchan2.ms | D | 23-Nov-2023 | 3.4 KiB | 89 | 64 | |
opacket.c | D | 23-Nov-2023 | 5.8 KiB | 338 | 269 | |
opacket.h | D | 23-Nov-2023 | 6.4 KiB | 162 | 152 | |
openssh.xml.in | D | 23-Nov-2023 | 2.8 KiB | 91 | 61 | |
opensshd.init.in | D | 23-Nov-2023 | 2 KiB | 93 | 68 | |
packet.c | D | 23-Nov-2023 | 82.3 KiB | 3,057 | 2,367 | |
packet.h | D | 23-Nov-2023 | 7.3 KiB | 217 | 154 | |
pathnames.h | D | 23-Nov-2023 | 5.7 KiB | 173 | 69 | |
pkcs11.h | D | 23-Nov-2023 | 41.4 KiB | 1,358 | 1,119 | |
platform-pledge.c | D | 23-Nov-2023 | 1.9 KiB | 72 | 27 | |
platform-tracing.c | D | 23-Nov-2023 | 1.7 KiB | 52 | 29 | |
platform.c | D | 23-Nov-2023 | 5 KiB | 216 | 140 | |
platform.h | D | 23-Nov-2023 | 1.4 KiB | 38 | 17 | |
poly1305.c | D | 23-Nov-2023 | 4.5 KiB | 161 | 121 | |
poly1305.h | D | 23-Nov-2023 | 645 | 23 | 11 | |
progressmeter.c | D | 23-Nov-2023 | 7.5 KiB | 307 | 220 | |
progressmeter.h | D | 23-Nov-2023 | 1.4 KiB | 28 | 2 | |
readconf.c | D | 23-Nov-2023 | 77.6 KiB | 2,690 | 2,215 | |
readconf.h | D | 23-Nov-2023 | 7.7 KiB | 217 | 155 | |
readpass.c | D | 23-Nov-2023 | 5 KiB | 194 | 139 | |
rijndael.c | D | 23-Nov-2023 | 51.6 KiB | 1,130 | 1,009 | |
rijndael.h | D | 23-Nov-2023 | 2.1 KiB | 57 | 21 | |
rsa.c | D | 23-Nov-2023 | 5 KiB | 189 | 107 | |
rsa.h | D | 23-Nov-2023 | 864 | 27 | 8 | |
sandbox-capsicum.c | D | 23-Nov-2023 | 3.3 KiB | 123 | 78 | |
sandbox-darwin.c | D | 23-Nov-2023 | 2.5 KiB | 100 | 58 | |
sandbox-null.c | D | 23-Nov-2023 | 1.6 KiB | 73 | 36 | |
sandbox-pledge.c | D | 23-Nov-2023 | 1.8 KiB | 78 | 47 | |
sandbox-rlimit.c | D | 23-Nov-2023 | 2.4 KiB | 97 | 59 | |
sandbox-seccomp-filter.c | D | 23-Nov-2023 | 9.5 KiB | 358 | 274 | |
sandbox-solaris.c | D | 23-Nov-2023 | 2.7 KiB | 109 | 71 | |
sandbox-systrace.c | D | 23-Nov-2023 | 6.2 KiB | 219 | 163 | |
sc25519.c | D | 23-Nov-2023 | 7.2 KiB | 309 | 255 | |
sc25519.h | D | 23-Nov-2023 | 2.8 KiB | 81 | 46 | |
scp.0 | D | 23-Nov-2023 | 6.1 KiB | 169 | 139 | |
scp.1 | D | 23-Nov-2023 | 5.1 KiB | 246 | 245 | |
scp.c | D | 23-Nov-2023 | 31.8 KiB | 1,372 | 1,130 | |
servconf.c | D | 23-Nov-2023 | 70.6 KiB | 2,366 | 2,031 | |
servconf.h | D | 23-Nov-2023 | 9.5 KiB | 249 | 174 | |
serverloop.c | D | 23-Nov-2023 | 24.3 KiB | 868 | 646 | |
serverloop.h | D | 23-Nov-2023 | 976 | 27 | 4 | |
session.c | D | 23-Nov-2023 | 61.9 KiB | 2,593 | 1,901 | |
session.h | D | 23-Nov-2023 | 2.6 KiB | 86 | 49 | |
sftp-client.c | D | 23-Nov-2023 | 49.2 KiB | 1,907 | 1,553 | |
sftp-client.h | D | 23-Nov-2023 | 4.3 KiB | 143 | 53 | |
sftp-common.c | D | 23-Nov-2023 | 6.8 KiB | 260 | 206 | |
sftp-common.h | D | 23-Nov-2023 | 2 KiB | 53 | 19 | |
sftp-glob.c | D | 23-Nov-2023 | 3.4 KiB | 151 | 95 | |
sftp-server-main.c | D | 23-Nov-2023 | 1.5 KiB | 54 | 28 | |
sftp-server.0 | D | 23-Nov-2023 | 4.2 KiB | 97 | 74 | |
sftp-server.8 | D | 23-Nov-2023 | 5 KiB | 171 | 170 | |
sftp-server.c | D | 23-Nov-2023 | 42.3 KiB | 1,709 | 1,452 | |
sftp.0 | D | 23-Nov-2023 | 15.3 KiB | 387 | 301 | |
sftp.1 | D | 23-Nov-2023 | 14.5 KiB | 629 | 628 | |
sftp.c | D | 23-Nov-2023 | 57.4 KiB | 2,481 | 2,042 | |
sftp.h | D | 23-Nov-2023 | 3.3 KiB | 102 | 55 | |
smult_curve25519_ref.c | D | 23-Nov-2023 | 6.7 KiB | 266 | 227 | |
ssh-add.0 | D | 23-Nov-2023 | 5.3 KiB | 130 | 99 | |
ssh-add.1 | D | 23-Nov-2023 | 6.6 KiB | 213 | 212 | |
ssh-add.c | D | 23-Nov-2023 | 15.7 KiB | 623 | 511 | |
ssh-agent.0 | D | 23-Nov-2023 | 5.6 KiB | 121 | 94 | |
ssh-agent.1 | D | 23-Nov-2023 | 7.1 KiB | 232 | 231 | |
ssh-agent.c | D | 23-Nov-2023 | 36.5 KiB | 1,467 | 1,235 | |
ssh-dss.c | D | 23-Nov-2023 | 5.8 KiB | 221 | 169 | |
ssh-ecdsa.c | D | 23-Nov-2023 | 5.2 KiB | 190 | 140 | |
ssh-ed25519.c | D | 23-Nov-2023 | 4.2 KiB | 168 | 134 | |
ssh-gss.h | D | 23-Nov-2023 | 4.6 KiB | 135 | 88 | |
ssh-keygen.0 | D | 23-Nov-2023 | 27.3 KiB | 571 | 455 | |
ssh-keygen.1 | D | 23-Nov-2023 | 26.1 KiB | 871 | 870 | |
ssh-keygen.c | D | 23-Nov-2023 | 72.8 KiB | 2,770 | 2,377 | |
ssh-keyscan.0 | D | 23-Nov-2023 | 4.6 KiB | 112 | 80 | |
ssh-keyscan.1 | D | 23-Nov-2023 | 4.3 KiB | 181 | 180 | |
ssh-keyscan.c | D | 23-Nov-2023 | 19.2 KiB | 857 | 730 | |
ssh-keysign.0 | D | 23-Nov-2023 | 1.8 KiB | 53 | 40 | |
ssh-keysign.8 | D | 23-Nov-2023 | 2.9 KiB | 94 | 93 | |
ssh-keysign.c | D | 23-Nov-2023 | 8.4 KiB | 309 | 226 | |
ssh-pkcs11-client.c | D | 23-Nov-2023 | 5.2 KiB | 243 | 194 | |
ssh-pkcs11-helper.0 | D | 23-Nov-2023 | 642 | 26 | 17 | |
ssh-pkcs11-helper.8 | D | 23-Nov-2023 | 1.3 KiB | 44 | 43 | |
ssh-pkcs11-helper.c | D | 23-Nov-2023 | 8 KiB | 376 | 294 | |
ssh-pkcs11.c | D | 23-Nov-2023 | 18.8 KiB | 707 | 590 | |
ssh-pkcs11.h | D | 23-Nov-2023 | 1.1 KiB | 25 | 7 | |
ssh-rsa.c | D | 23-Nov-2023 | 9.3 KiB | 357 | 288 | |
ssh-sandbox.h | D | 23-Nov-2023 | 1.1 KiB | 25 | 6 | |
ssh.0 | D | 23-Nov-2023 | 47.7 KiB | 972 | 796 | |
ssh.1 | D | 23-Nov-2023 | 43.9 KiB | 1,711 | 1,710 | |
ssh.c | D | 23-Nov-2023 | 62.9 KiB | 2,197 | 1,681 | |
ssh.h | D | 23-Nov-2023 | 2.9 KiB | 106 | 21 | |
ssh1.h | D | 23-Nov-2023 | 4.1 KiB | 92 | 58 | |
ssh2.h | D | 23-Nov-2023 | 5.7 KiB | 175 | 78 | |
ssh_api.c | D | 23-Nov-2023 | 13.8 KiB | 542 | 431 | |
ssh_api.h | D | 23-Nov-2023 | 4.3 KiB | 138 | 31 | |
ssh_config | D | 23-Nov-2023 | 1.6 KiB | 51 | 46 | |
ssh_config.0 | D | 23-Nov-2023 | 56.8 KiB | 1,093 | 915 | |
ssh_config.5 | D | 23-Nov-2023 | 50.3 KiB | 1,803 | 1,802 | |
sshbuf-getput-basic.c | D | 23-Nov-2023 | 9.2 KiB | 465 | 382 | |
sshbuf-getput-crypto.c | D | 23-Nov-2023 | 5.6 KiB | 225 | 179 | |
sshbuf-misc.c | D | 23-Nov-2023 | 3.5 KiB | 162 | 129 | |
sshbuf.c | D | 23-Nov-2023 | 9.3 KiB | 415 | 328 | |
sshbuf.h | D | 23-Nov-2023 | 11.8 KiB | 357 | 166 | |
sshconnect.c | D | 23-Nov-2023 | 42.3 KiB | 1,546 | 1,193 | |
sshconnect.h | D | 23-Nov-2023 | 2.7 KiB | 78 | 37 | |
sshconnect1.c | D | 23-Nov-2023 | 22.3 KiB | 775 | 511 | |
sshconnect2.c | D | 23-Nov-2023 | 51.9 KiB | 1,974 | 1,583 | |
sshd.0 | D | 23-Nov-2023 | 31.5 KiB | 627 | 514 | |
sshd.8 | D | 23-Nov-2023 | 29.3 KiB | 948 | 947 | |
sshd.c | D | 23-Nov-2023 | 59.7 KiB | 2,298 | 1,651 | |
sshd_config | D | 23-Nov-2023 | 3.1 KiB | 119 | 95 | |
sshd_config.0 | D | 23-Nov-2023 | 51.6 KiB | 1,021 | 853 | |
sshd_config.5 | D | 23-Nov-2023 | 46.1 KiB | 1,686 | 1,685 | |
sshd_config.android | D | 23-Nov-2023 | 3.3 KiB | 121 | 98 | |
ssherr.c | D | 23-Nov-2023 | 4.8 KiB | 142 | 123 | |
ssherr.h | D | 23-Nov-2023 | 3.2 KiB | 85 | 60 | |
sshkey.c | D | 23-Nov-2023 | 97.9 KiB | 3,974 | 3,419 | |
sshkey.h | D | 23-Nov-2023 | 8.1 KiB | 231 | 174 | |
sshlogin.c | D | 23-Nov-2023 | 5.1 KiB | 165 | 90 | |
sshlogin.h | D | 23-Nov-2023 | 935 | 24 | 8 | |
sshpty.c | D | 23-Nov-2023 | 6.3 KiB | 265 | 194 | |
sshpty.h | D | 23-Nov-2023 | 1 KiB | 29 | 10 | |
sshtty.c | D | 23-Nov-2023 | 2.9 KiB | 97 | 52 | |
start-ssh | D | 23-Nov-2023 | 998 | 38 | 25 | |
survey.sh.in | D | 23-Nov-2023 | 1.7 KiB | 70 | 49 | |
ttymodes.c | D | 23-Nov-2023 | 10.4 KiB | 490 | 352 | |
ttymodes.h | D | 23-Nov-2023 | 5.3 KiB | 179 | 104 | |
uidswap.c | D | 23-Nov-2023 | 9.3 KiB | 310 | 202 | |
uidswap.h | D | 23-Nov-2023 | 716 | 19 | 4 | |
umac.c | D | 23-Nov-2023 | 45.5 KiB | 1,277 | 763 | |
umac.h | D | 23-Nov-2023 | 4.6 KiB | 130 | 42 | |
umac128.c | D | 23-Nov-2023 | 522 | 14 | 6 | |
utf8.c | D | 23-Nov-2023 | 7.8 KiB | 335 | 224 | |
utf8.h | D | 23-Nov-2023 | 1.2 KiB | 26 | 8 | |
uuencode.c | D | 23-Nov-2023 | 2.9 KiB | 96 | 49 | |
uuencode.h | D | 23-Nov-2023 | 1.5 KiB | 30 | 3 | |
verify.c | D | 23-Nov-2023 | 668 | 50 | 40 | |
version.h | D | 23-Nov-2023 | 170 | 7 | 3 | |
xmalloc.c | D | 23-Nov-2023 | 2.1 KiB | 107 | 75 | |
xmalloc.h | D | 23-Nov-2023 | 1 KiB | 27 | 8 |
README
1See https://www.openssh.com/releasenotes.html#7.5p1 for the release notes. 2 3Please read https://www.openssh.com/report.html for bug reporting 4instructions and note that we do not use Github for bug reporting or 5patch/pull-request management. 6 7- A Japanese translation of this document and of the release notes is 8- available at http://www.unixuser.org/~haruyama/security/openssh/index.html 9- Thanks to HARUYAMA Seigo <haruyama@unixuser.org> 10 11This is the port of OpenBSD's excellent OpenSSH[0] to Linux and other 12Unices. 13 14OpenSSH is based on the last free version of Tatu Ylonen's sample 15implementation with all patent-encumbered algorithms removed (to 16external libraries), all known security bugs fixed, new features 17reintroduced and many other clean-ups. OpenSSH has been created by 18Aaron Campbell, Bob Beck, Markus Friedl, Niels Provos, Theo de Raadt, 19and Dug Song. It has a homepage at https://www.openssh.com/ 20 21This port consists of the re-introduction of autoconf support, PAM 22support, EGD[1]/PRNGD[2] support and replacements for OpenBSD library 23functions that are (regrettably) absent from other unices. This port 24has been best tested on AIX, Cygwin, HP-UX, Linux, MacOS/X, 25NetBSD, OpenBSD, OpenServer, Solaris, Unicos, and UnixWare. 26 27This version actively tracks changes in the OpenBSD CVS repository. 28 29The PAM support is now more functional than the popular packages of 30commercial ssh-1.2.x. It checks "account" and "session" modules for 31all logins, not just when using password authentication. 32 33OpenSSH depends on Zlib[3], OpenSSL[4] and optionally PAM[5]. 34 35There is now several mailing lists for this port of OpenSSH. Please 36refer to https://www.openssh.com/list.html for details on how to join. 37 38Please send bug reports and patches to the mailing list 39openssh-unix-dev@mindrot.org. The list is open to posting by unsubscribed 40users. Code contribution are welcomed, but please follow the OpenBSD 41style guidelines[6]. 42 43Please refer to the INSTALL document for information on how to install 44OpenSSH on your system. 45 46Damien Miller <djm@mindrot.org> 47 48Miscellania - 49 50This version of OpenSSH is based upon code retrieved from the OpenBSD 51CVS repository which in turn was based on the last free sample 52implementation released by Tatu Ylonen. 53 54References - 55 56[0] https://www.openssh.com/ 57[1] http://www.lothar.com/tech/crypto/ 58[2] http://www.aet.tu-cottbus.de/personen/jaenicke/postfix_tls/prngd.html 59[3] http://www.gzip.org/zlib/ 60[4] http://www.openssl.org/ 61[5] http://www.openpam.org 62 http://www.kernel.org/pub/linux/libs/pam/ 63 (PAM also is standard on Solaris and HP-UX 11) 64[6] http://man.openbsd.org/style.9 65
README.dns
1How to verify host keys using OpenSSH and DNS 2--------------------------------------------- 3 4OpenSSH contains support for verifying host keys using DNS as described in 5draft-ietf-secsh-dns-05.txt. The document contains very brief instructions 6on how to use this feature. Configuring DNS is out of the scope of this 7document. 8 9 10(1) Server: Generate and publish the DNS RR 11 12To create a DNS resource record (RR) containing a fingerprint of the 13public host key, use the following command: 14 15 ssh-keygen -r hostname -f keyfile -g 16 17where "hostname" is your fully qualified hostname and "keyfile" is the 18file containing the public host key file. If you have multiple keys, 19you should generate one RR for each key. 20 21In the example above, ssh-keygen will print the fingerprint in a 22generic DNS RR format parsable by most modern name server 23implementations. If your nameserver has support for the SSHFP RR 24you can omit the -g flag and ssh-keygen will print a standard SSHFP RR. 25 26To publish the fingerprint using the DNS you must add the generated RR 27to your DNS zone file and sign your zone. 28 29 30(2) Client: Enable ssh to verify host keys using DNS 31 32To enable the ssh client to verify host keys using DNS, you have to 33add the following option to the ssh configuration file 34($HOME/.ssh/config or /etc/ssh/ssh_config): 35 36 VerifyHostKeyDNS yes 37 38Upon connection the client will try to look up the fingerprint RR 39using DNS. If the fingerprint received from the DNS server matches 40the remote host key, the user will be notified. 41 42 43 Jakob Schlyter 44 Wesley Griffin 45 46 47$OpenBSD: README.dns,v 1.2 2003/10/14 19:43:23 jakob Exp $ 48
README.platform
1This file contains notes about OpenSSH on specific platforms. 2 3AIX 4--- 5As of OpenSSH 3.8p1, sshd will now honour an accounts password expiry 6settings, where previously it did not. Because of this, it's possible for 7sites that have used OpenSSH's sshd exclusively to have accounts which 8have passwords expired longer than the inactive time (ie the "Weeks between 9password EXPIRATION and LOCKOUT" setting in SMIT or the maxexpired 10chuser attribute). 11 12Accounts in this state must have their passwords reset manually by the 13administrator. As a precaution, it is recommended that the administrative 14passwords be reset before upgrading from OpenSSH <3.8. 15 16As of OpenSSH 4.0, configure will attempt to detect if your version 17and maintenance level of AIX has a working getaddrinfo, and will use it 18if found. This will enable IPv6 support. If for some reason configure 19gets it wrong, or if you want to build binaries to work on earlier MLs 20than the build host then you can add "-DBROKEN_GETADDRINFO" to CFLAGS 21to force the previous IPv4-only behaviour. 22 23IPv6 known to work: 5.1ML7 5.2ML2 5.2ML5 24IPv6 known broken: 4.3.3ML11 5.1ML4 25 26If you wish to use dynamic libraries that aren't in the normal system 27locations (eg IBM's OpenSSL and zlib packages) then you will need to 28define the environment variable blibpath before running configure, eg 29 30blibpath=/lib:/usr/lib:/opt/freeware/lib ./configure \ 31 --with-ssl-dir=/opt/freeware --with-zlib=/opt/freeware 32 33If sshd is built with the WITH_AIXAUTHENTICATE option (which is enabled 34by default) then sshd checks that users are permitted via the 35loginrestrictions() function, in particular that the user has the 36"rlogin" attribute set. This check is not done for the root account, 37instead the PermitRootLogin setting in sshd_config is used. 38 39If you are using the IBM compiler you probably want to use CC=xlc rather 40than the default of cc. 41 42 43Cygwin 44------ 45To build on Cygwin, OpenSSH requires the following packages: 46gcc, gcc-mingw-core, mingw-runtime, binutils, make, openssl, 47openssl-devel, zlib, minres, minires-devel. 48 49 50Darwin and MacOS X 51------------------ 52Darwin does not provide a tun(4) driver required for OpenSSH-based 53virtual private networks. The BSD manpage still exists, but the driver 54has been removed in recent releases of Darwin and MacOS X. 55 56Nevertheless, tunnel support is known to work with Darwin 8 and 57MacOS X 10.4 in Point-to-Point (Layer 3) and Ethernet (Layer 2) mode 58using a third party driver. More information is available at: 59 http://www-user.rhrk.uni-kl.de/~nissler/tuntap/ 60 61 62Linux 63----- 64 65Some Linux distributions (including Red Hat/Fedora/CentOS) include 66headers and library links in the -devel RPMs rather than the main 67binary RPMs. If you get an error about headers, or complaining about a 68missing prerequisite then you may need to install the equivalent 69development packages. On Redhat based distros these may be openssl-devel, 70zlib-devel and pam-devel, on Debian based distros these may be 71libssl-dev, libz-dev and libpam-dev. 72 73 74Solaris 75------- 76If you enable BSM auditing on Solaris, you need to update audit_event(4) 77for praudit(1m) to give sensible output. The following line needs to be 78added to /etc/security/audit_event: 79 80 32800:AUE_openssh:OpenSSH login:lo 81 82The BSM audit event range available for third party TCB applications is 8332768 - 65535. Event number 32800 has been choosen for AUE_openssh. 84There is no official registry of 3rd party event numbers, so if this 85number is already in use on your system, you may change it at build time 86by configure'ing --with-cflags=-DAUE_openssh=32801 then rebuilding. 87 88 89Platforms using PAM 90------------------- 91As of OpenSSH 4.3p1, sshd will no longer check /etc/nologin itself when 92PAM is enabled. To maintain existing behaviour, pam_nologin should be 93added to sshd's session stack which will prevent users from starting shell 94sessions. Alternatively, pam_nologin can be added to either the auth or 95account stacks which will prevent authentication entirely, but will still 96return the output from pam_nologin to the client. 97
README.privsep
1Privilege separation, or privsep, is method in OpenSSH by which 2operations that require root privilege are performed by a separate 3privileged monitor process. Its purpose is to prevent privilege 4escalation by containing corruption to an unprivileged process. 5More information is available at: 6 http://www.citi.umich.edu/u/provos/ssh/privsep.html 7 8Privilege separation is now enabled by default; see the 9UsePrivilegeSeparation option in sshd_config(5). 10 11When privsep is enabled, during the pre-authentication phase sshd will 12chroot(2) to "/var/empty" and change its privileges to the "sshd" user 13and its primary group. sshd is a pseudo-account that should not be 14used by other daemons, and must be locked and should contain a 15"nologin" or invalid shell. 16 17You should do something like the following to prepare the privsep 18preauth environment: 19 20 # mkdir /var/empty 21 # chown root:sys /var/empty 22 # chmod 755 /var/empty 23 # groupadd sshd 24 # useradd -g sshd -c 'sshd privsep' -d /var/empty -s /bin/false sshd 25 26/var/empty should not contain any files. 27 28configure supports the following options to change the default 29privsep user and chroot directory: 30 31 --with-privsep-path=xxx Path for privilege separation chroot 32 --with-privsep-user=user Specify non-privileged user for privilege separation 33 34PAM-enabled OpenSSH is known to function with privsep on AIX, FreeBSD, 35HP-UX (including Trusted Mode), Linux, NetBSD and Solaris. 36 37On Cygwin, Tru64 Unix, OpenServer, and Unicos only the pre-authentication 38part of privsep is supported. Post-authentication privsep is disabled 39automatically (so you won't see the additional process mentioned below). 40 41Note that for a normal interactive login with a shell, enabling privsep 42will require 1 additional process per login session. 43 44Given the following process listing (from HP-UX): 45 46 UID PID PPID C STIME TTY TIME COMMAND 47 root 1005 1 0 10:45:17 ? 0:08 /opt/openssh/sbin/sshd -u0 48 root 6917 1005 0 15:19:16 ? 0:00 sshd: stevesk [priv] 49 stevesk 6919 6917 0 15:19:17 ? 0:03 sshd: stevesk@2 50 stevesk 6921 6919 0 15:19:17 pts/2 0:00 -bash 51 52process 1005 is the sshd process listening for new connections. 53process 6917 is the privileged monitor process, 6919 is the user owned 54sshd process and 6921 is the shell process. 55
README.tun
1How to use OpenSSH-based virtual private networks 2------------------------------------------------- 3 4OpenSSH contains support for VPN tunneling using the tun(4) network 5tunnel pseudo-device which is available on most platforms, either for 6layer 2 or 3 traffic. 7 8The following brief instructions on how to use this feature use 9a network configuration specific to the OpenBSD operating system. 10 11(1) Server: Enable support for SSH tunneling 12 13To enable the ssh server to accept tunnel requests from the client, you 14have to add the following option to the ssh server configuration file 15(/etc/ssh/sshd_config): 16 17 PermitTunnel yes 18 19Restart the server or send the hangup signal (SIGHUP) to let the server 20reread it's configuration. 21 22(2) Server: Restrict client access and assign the tunnel 23 24The OpenSSH server simply uses the file /root/.ssh/authorized_keys to 25restrict the client to connect to a specified tunnel and to 26automatically start the related interface configuration command. These 27settings are optional but recommended: 28 29 tunnel="1",command="sh /etc/netstart tun1" ssh-rsa ... reyk@openbsd.org 30 31(3) Client: Configure the local network tunnel interface 32 33Use the hostname.if(5) interface-specific configuration file to set up 34the network tunnel configuration with OpenBSD. For example, use the 35following configuration in /etc/hostname.tun0 to set up the layer 3 36tunnel on the client: 37 38 inet 192.168.5.1 255.255.255.252 192.168.5.2 39 40OpenBSD also supports layer 2 tunneling over the tun device by adding 41the link0 flag: 42 43 inet 192.168.1.78 255.255.255.0 192.168.1.255 link0 44 45Layer 2 tunnels can be used in combination with an Ethernet bridge(4) 46interface, like the following example for /etc/bridgename.bridge0: 47 48 add tun0 49 add sis0 50 up 51 52(4) Client: Configure the OpenSSH client 53 54To establish tunnel forwarding for connections to a specified 55remote host by default, use the following ssh client configuration for 56the privileged user (in /root/.ssh/config): 57 58 Host sshgateway 59 Tunnel yes 60 TunnelDevice 0:any 61 PermitLocalCommand yes 62 LocalCommand sh /etc/netstart tun0 63 64A more complicated configuration is possible to establish a tunnel to 65a remote host which is not directly accessible by the client. 66The following example describes a client configuration to connect to 67the remote host over two ssh hops in between. It uses the OpenSSH 68ProxyCommand in combination with the nc(1) program to forward the final 69ssh tunnel destination over multiple ssh sessions. 70 71 Host access.somewhere.net 72 User puffy 73 Host dmzgw 74 User puffy 75 ProxyCommand ssh access.somewhere.net nc dmzgw 22 76 Host sshgateway 77 Tunnel Ethernet 78 TunnelDevice 0:any 79 PermitLocalCommand yes 80 LocalCommand sh /etc/netstart tun0 81 ProxyCommand ssh dmzgw nc sshgateway 22 82 83The following network plan illustrates the previous configuration in 84combination with layer 2 tunneling and Ethernet bridging. 85 86+--------+ ( ) +----------------------+ 87| Client |------( Internet )-----| access.somewhere.net | 88+--------+ ( ) +----------------------+ 89 : 192.168.1.78 | 90 :............................. +-------+ 91 Forwarded ssh connection : | dmzgw | 92 Layer 2 tunnel : +-------+ 93 : | 94 : | 95 : +------------+ 96 :......| sshgateway | 97 | +------------+ 98--- real connection Bridge -> | +----------+ 99... "virtual connection" [ X ]--------| somehost | 100[X] switch +----------+ 101 192.168.1.25 102 103(5) Client: Connect to the server and establish the tunnel 104 105Finally connect to the OpenSSH server to establish the tunnel by using 106the following command: 107 108 ssh sshgateway 109 110It is also possible to tell the client to fork into the background after 111the connection has been successfully established: 112 113 ssh -f sshgateway true 114 115Without the ssh configuration done in step (4), it is also possible 116to use the following command lines: 117 118 ssh -fw 0:1 sshgateway true 119 ifconfig tun0 192.168.5.1 192.168.5.2 netmask 255.255.255.252 120 121Using OpenSSH tunnel forwarding is a simple way to establish secure 122and ad hoc virtual private networks. Possible fields of application 123could be wireless networks or administrative VPN tunnels. 124 125Nevertheless, ssh tunneling requires some packet header overhead and 126runs on top of TCP. It is still suggested to use the IP Security 127Protocol (IPSec) for robust and permanent VPN connections and to 128interconnect corporate networks. 129 130 Reyk Floeter 131 132$OpenBSD: README.tun,v 1.4 2006/03/28 00:12:31 deraadt Exp $ 133