summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/sshconnect2.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Add a ssh_config HostbasedKeyType option to control whichdjm2015-01-301-108/+198
* update to new API (key_fingerprint => sshkey_fingerprint)djm2015-01-281-3/+7
* kex_setup errors are fatal()markus2015-01-201-2/+4
* make this compile with KERBEROS5 enableddjm2015-01-201-8/+12
* adapt kex to sshbuf and struct ssh; ok djm@markus2015-01-191-6/+6
* move dispatch to struct ssh; ok djm@markus2015-01-191-23/+31
* update packet.c & isolate, introduce struct sshmarkus2015-01-191-5/+2
* avoid trailing ',' in host key algorithmsdjm2015-01-181-2/+3
* fix regression reported by brad@ for passworded keys withoutdjm2015-01-151-3/+5
* move authfd.c and its tentacles to the new buffer/key API;djm2015-01-141-69/+102
* deprecate key_load_private_pem() and sshkey_load_private_pem()djm2015-01-081-1/+3
* Add FingerprintHash option to control algorithm used for keydjm2014-12-211-3/+3
* show in debug output which hostkeys are being tried when attemptingdjm2014-12-111-1/+5
* Add support for Unix domain socket forwarding. A remote TCP portmillert2014-07-151-2/+2
* New key API: refactor key-related functions to be more library-like,djm2014-06-241-4/+4
* fix inverted test that caused PKCS#11 keys that were explicitly listeddjm2014-06-051-2/+2
* make compiling against OpenSSL optional (make OPENSSL=no);markus2014-04-291-1/+3
* OpenSSH 6.5 and 6.6 have a bug that causes ~0.2% of connectionsdjm2014-04-181-1/+3
* disable weak proposals in sshd, but keep them in ssh; ok djm@markus2014-03-271-1/+2
* convert memset of potentially-private data to explicit_bzero()djm2014-02-021-9/+9
* replace most bzero with explicit_bzero, except a few that cna be memsettedu2014-01-311-2/+2
* remove experimental, never-enabled JPAKE code; ok markus@djm2014-01-291-292/+1
* Introduce digest API and use it to perform all hashing operationsdjm2014-01-091-2/+2
* refuse RSA keys from old proprietary clients/servers that use thedjm2013-12-301-9/+24
* use curve25519 for default key exchange (curve25519-sha256@libssh.org);markus2013-11-021-1/+2
* Fix memory leaks found by Zhenbo Xu and the Melton tool. bz#1967, ok djmdtucker2013-06-051-2/+6
* bye, bye xfree(); ok markus@djm2013-05-171-77/+68
* Add an optional second argument to RekeyLimit in the client to allowdtucker2013-05-161-3/+4
* fix bzero(ptr_to_struct, sizeof(ptr_to_struct)); bz#2100 fromdjm2013-05-101-2/+2
* hush some {unused, printf type} warningsdjm2013-04-051-6/+5
* reset pubkey order on partial success; ok djm@markus2013-03-051-2/+6
* Keep track of which IndentityFile options were manually supplied and whichdtucker2013-02-171-2/+2
* Warn more loudly if an IdentityFile provided by the user cannot be read.dtucker2013-02-151-7/+12
* Make IdentitiesOnly apply to keys obtained from a PKCS11Provider.djm2012-12-021-3/+26
* remove dead code following 'for (;;)' loops.dtucker2012-06-221-3/+1
* Remove undocumented legacy options UserKnownHostsFile2 anddjm2011-05-241-5/+6
* fix memory leak; bz#1849 ok dtucker@djm2011-05-061-1/+4
* automatically order the hostkeys requested by the client based ondjm2010-11-291-2/+60
* add a KexAlgorithms knob to the client and server configuration to allowdjm2010-09-221-1/+3
* Implement Elliptic Curve Cryptography modes for key exchange (ECDH) anddjm2010-08-311-1/+2
* bz#1502: authctxt.success is declared as an int, but passed bydjm2010-04-261-2/+2
* revised certificate format ssh-{dss,rsa}-cert-v01@openssh.com with thedjm2010-04-161-2/+5
* show the key type that we are offering in debug(), helps distinguishdjm2010-04-101-2/+3
* Add support for certificate key types for users and hosts.djm2010-02-261-1/+3
* Make HostBased authentication work with a ProxyCommand. bz #1569, patchdtucker2010-01-131-13/+4
* Do not prompt for a passphrase if we fail to open a keyfile, and log thedtucker2010-01-111-2/+2
* Don't escape backslashes in the SSH2 banner. bz#1533, patch fromdtucker2010-01-041-2/+2
* zap unused variable and strlen; from Steve McClellan, ok djmdtucker2009-12-061-3/+2
* Use the HostKeyAlias when prompting for passwords. bz#1039, ok djm@dtucker2009-11-201-5/+9
* Set close-on-exec on various descriptors so they don't get leaked todtucker2009-11-101-1/+4