summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshconnect.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* update to new API (key_fingerprint => sshkey_fingerprint)djm2015-01-281-9/+17
* correctly match ECDSA subtype (== curve) for offered/recevieddjm2015-01-261-2/+3
* Host key rotation support.djm2015-01-261-1/+10
* Reduce use of <sys/param.h> and transition to <limits.h> throughout.deraadt2015-01-201-2/+2
* store compat flags in struct ssh; ok djm@markus2015-01-191-2/+2
* Add FingerprintHash option to control algorithm used for keydjm2014-12-211-11/+16
* explicitly include sys/param.h in files that use the howmany() macro;djm2014-12-111-1/+2
* add RevokedHostKeys option for the clientdjm2014-12-041-17/+47
* Add support for Unix domain socket forwarding. A remote TCP portmillert2014-07-151-2/+2
* when rekeying, skip file/DNS lookup if it is the same as the key sentdjm2014-07-031-4/+19
* New key API: refactor key-related functions to be more library-like,djm2014-06-241-2/+2
* make compiling against OpenSSL optional (make OPENSSL=no);markus2014-04-291-1/+5
* When using VerifyHostKeyDNS with a DNSSEC resolver, down-convert anydjm2014-04-011-17/+27
* in ssh_create_socket(), only do the getaddrinfo for BindAddress whendjm2014-02-061-15/+18
* convert memset of potentially-private data to explicit_bzero()djm2014-02-021-2/+2
* ban clients/servers that suffer from SSH_BUG_DERIVEKEY, they are ancient,djm2014-01-091-1/+4
* refuse RSA keys from old proprietary clients/servers that use thedjm2013-12-301-1/+4
* when showing other hostkeys, don't forget Ed25519 keysdjm2013-12-291-2/+9
* Implement client-side hostname canonicalisation to allow an explicitdjm2013-10-161-45/+29
* bz#1211: make BindAddress work with UsePrivilegedPort=yes; patch fromdjm2013-09-191-25/+26
* Add a ssh_config ProxyUseFDPass option that supports the use ofdjm2013-08-201-18/+106
* bye, bye xfree(); ok markus@djm2013-05-171-21/+20
* support ProxyCommand=- (stdin/out already point to the proxy); ok djm@markus2013-02-221-1/+8
* remove unused variablemarkus2012-09-141-3/+1
* Send client banner immediately, rather than waiting for the server todjm2012-08-171-13/+34
* Remove undocumented legacy options UserKnownHostsFile2 anddjm2011-05-241-36/+36
* remove extra newlinedjm2011-05-231-2/+1
* reset the SIGPIPE handler when forking to execute child processes;djm2011-01-161-1/+3
* reset SIGCHLD handler to SIG_DFL when execuring LocalCommand;djm2011-01-061-1/+4
* don't mention key type in key-changed-warning, since we also printmarkus2010-12-141-4/+3
* automatically order the hostkeys requested by the client based ondjm2010-11-291-134/+137
* swapped args to kill(2)djm2010-10-061-2/+2
* kill proxy command on fatal() (we already kill it on clean exit);djm2010-10-061-2/+14
* use default shell /bin/sh if $SHELL is ""; ok markus@djm2010-10-051-3/+3
* Implement Elliptic Curve Cryptography modes for key exchange (ECDH) anddjm2010-08-311-2/+2
* oops, %r => remote username, not %udjm2010-04-161-2/+2
* revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with thedjm2010-04-161-4/+4
* expand %r => remote username in ssh_config:ProxyCommand;djm2010-04-141-3/+3
* fix terminology: we didn't find a certificate in known_hosts, we founddjm2010-04-101-2/+2
* Add a TrustedUserCAKeys option to sshd_config to specify CA keys thatdjm2010-03-041-2/+22
* Add support for certificate key types for users and hosts.djm2010-02-261-13/+65
* Fix a couple of typos/mispellings in commentsdtucker2010-01-131-2/+2
* Remove RoutingDomain from ssh since it's now not needed. It can be replaceddtucker2010-01-091-3/+2
* Set close-on-exec on various descriptors so they don't get leaked todtucker2009-11-101-2/+6
* Allow to set the rdomain in ssh/sftp/scp/sshd and ssh-keyscan.reyk2009-10-281-2/+3
* Keep track of number of bytes read and written. Needed for upcomingandreas2009-05-281-3/+5
* Un-static ssh_exchange_identification(), part of a larger change fromandreas2009-05-271-2/+2
* use #define ROQUIET here; no binary change. ok dtucker@stevesk2008-10-141-3/+3
* Send CR LF during protocol banner exchanges, but only for Protocol 2 only,dtucker2008-07-011-3/+3
* Check ExitOnForwardFailure if forwardings are disabled due to a faileddtucker2008-07-011-2/+13