summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/ssh.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Correct historical comment: provos@ modified OpenSSH to work with SSLeaydtucker2020-06-051-2/+2
* Allow some keywords to expand shell-style ${ENV} environmentdtucker2020-05-291-7/+33
* Add TOKEN percent expansion to LocalFoward and RemoteForward when useddtucker2020-04-101-50/+87
* r1.522 deleted one too many lines; repairdjm2020-04-031-1/+2
* fix debug statementdjm2020-04-031-2/+2
* the tunnel-forwarding vs ExitOnForwardFailure fix that I committeddjm2020-04-031-3/+14
* make failures when establishing "Tunnel" forwarding terminate thedjm2020-04-031-23/+39
* Make with config keywords support which percent_expansions more consistent.dtucker2020-04-031-67/+53
* initialize cname in case ai_canonname is NULL or too long; ok djmmarkus2020-03-061-2/+3
* Detect and prevent simple configuration loops when using ProxyJump.dtucker2020-02-181-1/+9
* Add ssh -Q key-sig for all key and signature types. Teach ssh -Q to acceptdtucker2020-02-071-5/+14
* Replace "security key" with "authenticator" in program messages.naddy2020-02-061-2/+2
* disable UpdateHostKeys=ask when in quiet mode;djm2020-01-281-1/+4
* disable UpdateHostKeys=ask if command is specified; ok djm@ sthen@markus2020-01-271-6/+13
* allow UpdateKnownHosts=yes to function when multiple known_hosts filesdjm2020-01-251-2/+2
* expose PKCS#11 key labels/X.509 subjects as commentsdjm2020-01-251-5/+7
* Make zlib optional. This adds a "ZLIB" build time option that allowsdtucker2020-01-231-4/+15
* Replace all calls to signal(2) with a wrapper around sigaction(2).dtucker2020-01-231-3/+3
* fix CanonicalizeHostname, broken by rev 1.507beck2020-01-051-2/+2
* Allow forwarding a different agent socket to the path specified bydjm2019-12-211-1/+33
* additional missing stdarg.h includes when built without WITH_OPENSSL; ok djm@naddy2019-11-181-1/+2
* ssh client support for U2F/FIDO keysdjm2019-10-311-1/+17
* allow %n to be expanded in ProxyCommand stringsdjm2019-09-131-2/+2
* Allow prepending a list of algorithms to the default set by startingnaddy2019-09-061-2/+2
* When system calls indicate an error they return -1, not some arbitraryderaadt2019-06-281-10/+10
* slightly more instructive error message when the user specifies multipledjm2019-06-141-3/+6
* Hostname->HostName cleanup; from lauri tirkkonenjmc2019-06-121-2/+2
* Replace calls to ssh_malloc_init() by a static init of malloc_options.otto2019-06-061-2/+1
* Use the LogLevel typdef instead of int where appropriate. Patch fromdtucker2019-04-231-2/+3
* remove last references to active_statedjm2019-01-191-4/+1
* convert ssh.c to new packet APIdjm2019-01-191-26/+41
* begin landing remaining refactoring of packet parsing API, starteddjm2019-01-191-1/+4
* move client/server SSH-* banners to buffers under ssh->kex and factordjm2018-12-271-2/+2
* add a ssh_config "Match final" predicatedjm2018-11-231-11/+20
* refer to OpenSSL not SSLeay;djm2018-10-231-3/+3
* Allow ssh_config IdentityAgent directive to accept environment variabledjm2018-10-031-3/+21
* Treat connections with ProxyJump specified the same as ones with adjm2018-09-211-4/+3
* fix "ssh -Q sig" to show correct signature algorithm list (it wasdjm2018-09-201-2/+2
* Add "ssh -Q sig" to allow listing supported signature algorithmsdjm2018-09-121-2/+9
* Now that ssh can't be setuid, remove the original_real_uid anddtucker2018-07-271-22/+9
* Use the caller provided (copied) pwent struct in load_public_identity_filesbeck2018-07-251-3/+1
* Deprecate UsePrivilegedPort now that support for running ssh(1)dtucker2018-07-191-7/+2
* Remove support for running ssh(1) setuid and fatal if attempted.dtucker2018-07-181-33/+7
* Slot 0 in the hostbased key array was previously RSA1, but that isdtucker2018-07-161-22/+22
* Remove support for loading HostBasedAuthentication keys directly indtucker2018-07-161-30/+5
* keep options.identity_file_userprovided array in sync when we loaddjm2018-07-161-2/+18
* remove legacy key emulation layer; ok djm@markus2018-07-111-57/+78
* client: switch to sshbuf API; ok djm@markus2018-07-091-13/+16
* fix incorrect expansion of %i in load_public_identity_files(); reported bydjm2018-06-081-2/+2
* Add a PermitListen directive to control which server-side addressesdjm2018-06-061-3/+3