index
:
openssh
master
openssh
Fast-forward packages
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
sshconnect.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
upstream: add a ssh_config KnownHostsCommand that allows the client
djm@openbsd.org
2020-12-22
1
-6
/
+104
*
upstream: plumb ssh_conn_info through to sshconnect.c; feedback/ok
djm@openbsd.org
2020-12-21
1
-12
/
+17
*
upstream: allow UserKnownHostsFile=none; feedback and ok markus@
djm@openbsd.org
2020-12-21
1
-1
/
+5
*
upstream: load_hostkeys()/hostkeys_foreach() variants for FILE*
djm@openbsd.org
2020-12-21
1
-6
/
+6
*
upstream: Set the specified TOS/DSCP for interactive use prior to
djm@openbsd.org
2020-11-27
1
-1
/
+6
*
upstream: when mentioning that the host key has changed, don't
djm@openbsd.org
2020-11-27
1
-3
/
+3
*
upstream: Explicitly initialize all members of the
dtucker@openbsd.org
2020-11-20
1
-2
/
+2
*
upstream: when prompting the user to accept a new hostkey, display
djm@openbsd.org
2020-11-12
1
-28
/
+191
*
upstream: use the new variant log macros instead of prepending
djm@openbsd.org
2020-10-18
1
-37
/
+31
*
upstream: Zap unused family parameter from ssh_connect_direct()
kn@openbsd.org
2020-10-14
1
-5
/
+5
*
upstream: Disable UpdateHostkeys when hostkey checking fails
djm@openbsd.org
2020-10-07
1
-1
/
+6
*
upstream: don't UpdateHostkeys when the hostkey is verified by the
djm@openbsd.org
2020-10-07
1
-4
/
+28
*
upstream: revert kex->flags cert hostkey downgrade back to a plain
djm@openbsd.org
2020-10-07
1
-43
/
+12
*
upstream: simply disable UpdateHostkeys when a certificate
djm@openbsd.org
2020-10-07
1
-2
/
+7
*
upstream: when ordering host key algorithms in the client, consider
djm@openbsd.org
2020-10-07
1
-2
/
+3
*
upstream: There are lots of place where we want to redirect stdin,
djm@openbsd.org
2020-10-03
1
-23
/
+5
*
upstream: record when the host key checking code downgrades a
djm@openbsd.org
2020-10-03
1
-12
/
+43
*
upstream: For the hostkey confirmation message:
djm@openbsd.org
2020-09-16
1
-2
/
+2
*
upstream: let ssh_config(5)'s AddKeysToAgent keyword accept a time
djm@openbsd.org
2020-08-27
1
-2
/
+3
*
upstream: Add a '%k' TOKEN that expands to the effective HostKey of
dtucker@openbsd.org
2020-07-17
1
-1
/
+4
*
upstream: use sshpkt_fatal() for kex_exchange_identification()
djm@openbsd.org
2020-03-14
1
-3
/
+4
*
upstream: when AddKeysToAgent=yes is set and the key contains no
djm@openbsd.org
2020-01-25
1
-4
/
+5
*
upstream: Replace all calls to signal(2) with a wrapper around
dtucker@openbsd.org
2020-01-23
1
-5
/
+5
*
upstream: Ignore whitespace when checking explict fingerprint.
dtucker@openbsd.org
2020-01-23
1
-5
/
+6
*
upstream: revise the fix for reversed arguments on
naddy@openbsd.org
2020-01-21
1
-4
/
+4
*
upstream: fix reversed arguments on expand_proxy_command(); spotted
djm@openbsd.org
2020-01-09
1
-2
/
+2
*
upstream: stdarg.h required more broadly; ok djm
deraadt@openbsd.org
2019-11-14
1
-2
/
+2
*
upstream: enable ed25519 support; ok djm
markus@openbsd.org
2019-11-12
1
-2
/
+2
*
upstream: ssh AddKeysToAgent support for U2F/FIDO keys
djm@openbsd.org
2019-10-31
1
-3
/
+5
*
upstream: add new agent key constraint for U2F/FIDO provider
djm@openbsd.org
2019-10-31
1
-2
/
+2
*
remove duplicate #includes
Damien Miller
2019-10-02
1
-1
/
+0
*
upstream: whitespace
djm@openbsd.org
2019-09-13
1
-3
/
+3
*
upstream: allow %n to be expanded in ProxyCommand strings
djm@openbsd.org
2019-09-13
1
-15
/
+20
*
upstream: When system calls indicate an error they return -1, not
deraadt@openbsd.org
2019-07-05
1
-13
/
+13
*
upstream: Add protection for private keys at rest in RAM against
djm@openbsd.org
2019-06-21
1
-2
/
+2
*
upstream: Free host on exit path. Patch from markus at
dtucker@openbsd.org
2019-05-08
1
-1
/
+2
*
upstream: dup stdout/in for proxycommand=-, otherwise stdout might
markus@openbsd.org
2019-03-01
1
-3
/
+11
*
upstream: Save connection timeout and restore for 2nd and
dtucker@openbsd.org
2019-02-01
1
-2
/
+3
*
upstream: Accept the host key fingerprint as a synonym for "yes"
dtucker@openbsd.org
2019-01-24
1
-8
/
+11
*
upstream: convert sshconnect.c to new packet API
djm@openbsd.org
2019-01-19
1
-22
/
+1
*
upstream: begin landing remaining refactoring of packet parsing
djm@openbsd.org
2019-01-19
1
-1
/
+4
*
upstream: move client/server SSH-* banners to buffers under
djm@openbsd.org
2018-12-27
1
-179
/
+8
*
upstream: Fix inverted logic for redirecting ProxyCommand stderr to
dtucker@openbsd.org
2018-11-19
1
-3
/
+5
*
upstream: redirect stderr of ProxyCommands to /dev/null when ssh is
djm@openbsd.org
2018-11-16
1
-5
/
+32
*
upstream: struct sockaddr_storage is guaranteed to be large enough,
florian@openbsd.org
2018-10-22
1
-5
/
+1
*
upstream: add CASignatureAlgorithms option for the client, allowing
djm@openbsd.org
2018-09-20
1
-4
/
+13
*
upstream: Now that ssh can't be setuid, remove the
dtucker@openbsd.org
2018-07-31
1
-3
/
+1
*
upstream: Fix typo in comment. From Alexandru Iacob via github.
dtucker@openbsd.org
2018-07-20
1
-2
/
+2
*
upstream: Deprecate UsePrivilegedPort now that support for running
dtucker@openbsd.org
2018-07-19
1
-14
/
+10
*
upstream: Remove support for running ssh(1) setuid and fatal if
dtucker@openbsd.org
2018-07-19
1
-25
/
+3
[next]