summaryrefslogtreecommitdiffstats
path: root/sshconnect.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* upstream: add a ssh_config KnownHostsCommand that allows the clientdjm@openbsd.org2020-12-221-6/+104
* upstream: plumb ssh_conn_info through to sshconnect.c; feedback/okdjm@openbsd.org2020-12-211-12/+17
* upstream: allow UserKnownHostsFile=none; feedback and ok markus@djm@openbsd.org2020-12-211-1/+5
* upstream: load_hostkeys()/hostkeys_foreach() variants for FILE*djm@openbsd.org2020-12-211-6/+6
* upstream: Set the specified TOS/DSCP for interactive use prior todjm@openbsd.org2020-11-271-1/+6
* upstream: when mentioning that the host key has changed, don'tdjm@openbsd.org2020-11-271-3/+3
* upstream: Explicitly initialize all members of thedtucker@openbsd.org2020-11-201-2/+2
* upstream: when prompting the user to accept a new hostkey, displaydjm@openbsd.org2020-11-121-28/+191
* upstream: use the new variant log macros instead of prependingdjm@openbsd.org2020-10-181-37/+31
* upstream: Zap unused family parameter from ssh_connect_direct()kn@openbsd.org2020-10-141-5/+5
* upstream: Disable UpdateHostkeys when hostkey checking failsdjm@openbsd.org2020-10-071-1/+6
* upstream: don't UpdateHostkeys when the hostkey is verified by thedjm@openbsd.org2020-10-071-4/+28
* upstream: revert kex->flags cert hostkey downgrade back to a plaindjm@openbsd.org2020-10-071-43/+12
* upstream: simply disable UpdateHostkeys when a certificatedjm@openbsd.org2020-10-071-2/+7
* upstream: when ordering host key algorithms in the client, considerdjm@openbsd.org2020-10-071-2/+3
* upstream: There are lots of place where we want to redirect stdin,djm@openbsd.org2020-10-031-23/+5
* upstream: record when the host key checking code downgrades adjm@openbsd.org2020-10-031-12/+43
* upstream: For the hostkey confirmation message:djm@openbsd.org2020-09-161-2/+2
* upstream: let ssh_config(5)'s AddKeysToAgent keyword accept a timedjm@openbsd.org2020-08-271-2/+3
* upstream: Add a '%k' TOKEN that expands to the effective HostKey ofdtucker@openbsd.org2020-07-171-1/+4
* upstream: use sshpkt_fatal() for kex_exchange_identification()djm@openbsd.org2020-03-141-3/+4
* upstream: when AddKeysToAgent=yes is set and the key contains nodjm@openbsd.org2020-01-251-4/+5
* upstream: Replace all calls to signal(2) with a wrapper arounddtucker@openbsd.org2020-01-231-5/+5
* upstream: Ignore whitespace when checking explict fingerprint.dtucker@openbsd.org2020-01-231-5/+6
* upstream: revise the fix for reversed arguments onnaddy@openbsd.org2020-01-211-4/+4
* upstream: fix reversed arguments on expand_proxy_command(); spotteddjm@openbsd.org2020-01-091-2/+2
* upstream: stdarg.h required more broadly; ok djmderaadt@openbsd.org2019-11-141-2/+2
* upstream: enable ed25519 support; ok djmmarkus@openbsd.org2019-11-121-2/+2
* upstream: ssh AddKeysToAgent support for U2F/FIDO keysdjm@openbsd.org2019-10-311-3/+5
* upstream: add new agent key constraint for U2F/FIDO providerdjm@openbsd.org2019-10-311-2/+2
* remove duplicate #includesDamien Miller2019-10-021-1/+0
* upstream: whitespacedjm@openbsd.org2019-09-131-3/+3
* upstream: allow %n to be expanded in ProxyCommand stringsdjm@openbsd.org2019-09-131-15/+20
* upstream: When system calls indicate an error they return -1, notderaadt@openbsd.org2019-07-051-13/+13
* upstream: Add protection for private keys at rest in RAM againstdjm@openbsd.org2019-06-211-2/+2
* upstream: Free host on exit path. Patch from markus atdtucker@openbsd.org2019-05-081-1/+2
* upstream: dup stdout/in for proxycommand=-, otherwise stdout mightmarkus@openbsd.org2019-03-011-3/+11
* upstream: Save connection timeout and restore for 2nd anddtucker@openbsd.org2019-02-011-2/+3
* upstream: Accept the host key fingerprint as a synonym for "yes"dtucker@openbsd.org2019-01-241-8/+11
* upstream: convert sshconnect.c to new packet APIdjm@openbsd.org2019-01-191-22/+1
* upstream: begin landing remaining refactoring of packet parsingdjm@openbsd.org2019-01-191-1/+4
* upstream: move client/server SSH-* banners to buffers underdjm@openbsd.org2018-12-271-179/+8
* upstream: Fix inverted logic for redirecting ProxyCommand stderr todtucker@openbsd.org2018-11-191-3/+5
* upstream: redirect stderr of ProxyCommands to /dev/null when ssh isdjm@openbsd.org2018-11-161-5/+32
* upstream: struct sockaddr_storage is guaranteed to be large enough,florian@openbsd.org2018-10-221-5/+1
* upstream: add CASignatureAlgorithms option for the client, allowingdjm@openbsd.org2018-09-201-4/+13
* upstream: Now that ssh can't be setuid, remove thedtucker@openbsd.org2018-07-311-3/+1
* upstream: Fix typo in comment. From Alexandru Iacob via github.dtucker@openbsd.org2018-07-201-2/+2
* upstream: Deprecate UsePrivilegedPort now that support for runningdtucker@openbsd.org2018-07-191-14/+10
* upstream: Remove support for running ssh(1) setuid and fatal ifdtucker@openbsd.org2018-07-191-25/+3