summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshconnect2.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* wrap long linedjm2020-06-051-2/+3
* when ordering the hostkey algorithms to request from a server,djm2020-05-131-4/+16
* fix reversed test that caused IdentitiesOnly=yes to not apply to keysdjm2020-04-171-2/+2
* When using HostkeyAlgorithms to merely append or remove algorithmsdjm2020-02-061-15/+26
* Replace "security key" with "authenticator" in program messages.naddy2020-02-061-6/+7
* Make zlib optional. This adds a "ZLIB" build time option that allowsdtucker2020-01-231-3/+3
* Replace all calls to signal(2) with a wrapper around sigaction(2).dtucker2020-01-231-4/+4
* Remove unsupported algorithms from list of defaults at run time anddtucker2020-01-231-4/+4
* a little more verbosity in sign_and_send_pubkey() debug messagesdjm2020-01-211-3/+5
* close the "touch your security key" notifier on the error path toodjm2019-11-151-2/+2
* stdarg.h required more broadly; ok djmderaadt2019-11-131-1/+2
* security keys typically need to be tapped/touched in order to performdjm2019-11-121-1/+16
* enable ed25519 support; ok djmmarkus2019-11-121-8/+5
* Refactor signing - use sshkey_sign for everything, including the newdjm2019-10-311-14/+3
* ssh client support for U2F/FIDO keysdjm2019-10-311-25/+86
* Remove now-redundant perm_ok arg since sshkey_load_private_type willdtucker2019-08-051-3/+3
* Remove some set but never used variables. ok daraadt@dtucker2019-07-071-5/+4
* When system calls indicate an error they return -1, not some arbitraryderaadt2019-06-281-10/+10
* fix ssh-keysign fd handling problem introduced in r1.304 caused by a typodjm2019-05-311-2/+2
* When doing the fork+exec'ing for ssh-keysign, rearrange the socketderaadt2019-05-151-7/+9
* fix regression in r1.302 reported by naddy@ - only the first publicdjm2019-02-121-5/+5
* cleanup GSSAPI authentication context after completion of thedjm2019-02-111-67/+88
* merge kexkem[cs] into kexgendjm2019-01-211-9/+9
* use KEM API for vanilla ECDHdjm2019-01-211-2/+2
* use KEM API for vanilla DH KEXdjm2019-01-211-6/+6
* use KEM API for vanilla c25519 KEXdjm2019-01-211-2/+2
* Add support for a PQC KEX/KEM: sntrup4591761x25519-sha512@tinyssh.orgdjm2019-01-211-1/+2
* GSSAPI code got missed when converting to new packet APIdjm2019-01-211-4/+4
* convert the remainder of sshconnect2.c to new packet APIdjm2019-01-191-49/+46
* convert sshconnect2.c to new packet APIdjm2019-01-191-13/+16
* begin landing remaining refactoring of packet parsing API, starteddjm2019-01-191-1/+4
* eliminate function-static attempt counters for passwd/kbdintdjm2019-01-041-8/+10
* move client/server SSH-* banners to buffers under ssh->kex and factordjm2018-12-271-26/+23
* don't truncate user or host name in "user@host's password: " prompts.djm2018-11-281-6/+5
* fix bug in client that was keeping a redundant ssh-agent socket arounddjm2018-11-161-3/+5
* don't send new-style rsa-sha2-*-cert-v01@openssh.com names to olderdjm2018-10-111-2/+3
* second try, deals properly with missing and private-only keys:djm2018-09-141-26/+53
* revert following; deals badly with agent keysdjm2018-09-141-47/+26
* Use consistent format in debug log for keys readied, offered anddjm2018-09-141-26/+47
* revert compat.[ch] section of the following change. It causesdjm2018-08-131-8/+7
* fix some memory leaks spotted by Coverity via Jakub Jelen in bz#2366djm2018-07-311-7/+8
* Remove support for running ssh(1) setuid and fatal if attempted.dtucker2018-07-181-2/+1
* Remove support for loading HostBasedAuthentication keys directly indtucker2018-07-161-7/+3
* treat ssh_packet_write_wait() errors as fatal; ok djm@markus2018-07-111-3/+3
* remove legacy key emulation layer; ok djm@markus2018-07-111-6/+6
* client: switch to sshbuf API; ok djm@markus2018-07-091-212/+277
* Revert previous two commitssf2018-07-091-2/+2
* Remove leftovers from pre-authentication compressionsf2018-07-061-2/+2
* repair PubkeyAcceptedKeyTypes (and friends) after RSA signature work -djm2018-07-041-4/+6
* some finesse to fix RSA-SHA2 certificate authentication for certsdjm2018-07-031-3/+6