summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh-keyscan.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* allow ssh-keyscan to find security key hostkeysdjm2019-12-151-3/+21
* fixes for !WITH_OPENSSL compilation; ok dtucker@djm2019-09-061-1/+3
* include SHA2-variant RSA key algorithms in KEX proposal; allowsdjm2019-07-121-2/+7
* When system calls indicate an error they return -1, not some arbitraryderaadt2019-06-281-6/+6
* Replace calls to ssh_malloc_init() by a static init of malloc_options.otto2019-06-061-2/+1
* make ssh-keyscan return a non-zero exit status if it finds no keys.djm2019-01-261-2/+6
* merge kexkem[cs] into kexgendjm2019-01-211-9/+9
* use KEM API for vanilla ECDHdjm2019-01-211-2/+2
* use KEM API for vanilla DH KEXdjm2019-01-211-6/+6
* use KEM API for vanilla c25519 KEXdjm2019-01-211-2/+2
* Add support for a PQC KEX/KEM: sntrup4591761x25519-sha512@tinyssh.orgdjm2019-01-211-1/+2
* switch config file parsing to getline(3) as this avoids static limitsmarkus2018-06-061-7/+5
* apply a lick of paint; tweaks/ok dtuckerjmc2018-03-021-2/+2
* Add experimental support for PQC XMSS keys (Extended Hash-Based Signatures)markus2018-02-231-2/+10
* Add ssh-keyscan -D option to make it print its results in SSHFP formatdjm2018-02-231-4/+16
* Add monotime_ts and monotime_tv that return monotonic timespec anddtucker2017-11-251-4/+4
* Only call close once in confree(). ssh_packet_close will close the FDdtucker2017-06-301-3/+3
* remove now obsolete ctx from ssh_dispatch_run; ok djm@markus2017-05-311-2/+2
* obliterate ssh1.h and some dead code that used itdjm2017-04-301-2/+1
* remove KEY_RSA1djm2017-04-301-36/+28
* remove compat20/compat13/compat15 variablesdjm2017-04-301-2/+1
* unifdef WITH_SSH1djm2017-04-301-58/+1
* ensure hostname is lower-case before hashing it; bz#2591 reported bydjm2017-03-101-1/+2
* correctly hash hosts with a port number. Reported by Josh Powers indjm2017-03-101-6/+7
* Avoid confusing error message when attempting to use ssh-keyscan builtdjm2017-01-061-2/+6
* add support for additional fixed DH groups fromdjm2016-05-021-1/+4
* Add a function to enable security-related malloc_options. With and okdtucker2016-02-151-1/+2
* -c before -H, in SYNOPSIS and usage();jmc2015-11-081-2/+2
* Add "ssh-keyscan -c ..." flag to allow fetching certificates insteaddjm2015-11-081-10/+37
* fix keyscan output for multiple hosts/addrs on one line whendjm2015-10-241-6/+21
* include port number if a non-default one has been specified;djm2015-04-101-3/+6
* Do not use int for sig_atomic_t; spotted by christos@netbsd; ok markus@miod2015-04-051-2/+2
* set a timeout to prevent hangs when talking to busted servers;djm2015-01-301-1/+2
* avoid more fatal/exit in the packet.c paths that ssh-keyscandjm2015-01-301-2/+3
* avoid fatal() calls in packet codedjm2015-01-281-3/+5
* Reduce use of <sys/param.h> and transition to <limits.h> throughout.deraadt2015-01-201-2/+1
* switch ssh-keyscan from setjmp to multiple ssh transport layer instancesmarkus2015-01-191-68/+81
* adapt kex to sshbuf and struct ssh; ok djm@markus2015-01-191-6/+8
* explicitly include sys/param.h in files that use the howmany() macro;djm2014-12-111-1/+2
* make compiling against OpenSSL optional (make OPENSSL=no);markus2014-04-291-1/+7
* disable weak proposals in sshd, but keep them in ssh; ok djm@markus2014-03-271-1/+2
* scan for Ed25519 keys by default toodjm2014-03-121-2/+2
* support ed25519 keys (hostkeys and user identities) using the public domainmarkus2013-12-061-5/+11
* use curve25519 for default key exchange (curve25519-sha256@libssh.org);markus2013-11-021-1/+2
* bye, bye xfree(); ok markus@djm2013-05-171-8/+8
* now that sshd defaults to offering ECDSA keys, ssh-keyscan should alsodjm2012-04-111-2/+2
* use timerclear macrookan2011-03-151-2/+2
* handle ecdsa-sha2 with various key lengths; hint and ok djm@otto2011-01-041-3/+4
* Implement Elliptic Curve Cryptography modes for key exchange (ECDH) anddjm2010-08-311-4/+9
* replace verbose and overflow-prone Linebuf code with read_keyfile_line()djm2010-06-221-129/+36