summaryrefslogtreecommitdiffstats
path: root/sshconnect.c
AgeCommit message (Expand)Author
2021-02-26Revert "ssh: optional bind interface if bind address specified."Damien Miller
2021-02-26ssh: optional bind interface if bind address specified.Dmitrii Turlupov
2021-01-26upstream: move check_host_cert() from sshconnect,c to sshkey.c anddjm@openbsd.org
2020-12-22upstream: add a ssh_config KnownHostsCommand that allows the clientdjm@openbsd.org
2020-12-21upstream: plumb ssh_conn_info through to sshconnect.c; feedback/okdjm@openbsd.org
2020-12-21upstream: allow UserKnownHostsFile=none; feedback and ok markus@djm@openbsd.org
2020-12-21upstream: load_hostkeys()/hostkeys_foreach() variants for FILE*djm@openbsd.org
2020-11-27upstream: Set the specified TOS/DSCP for interactive use prior todjm@openbsd.org
2020-11-27upstream: when mentioning that the host key has changed, don'tdjm@openbsd.org
2020-11-20upstream: Explicitly initialize all members of thedtucker@openbsd.org
2020-11-13upstream: when prompting the user to accept a new hostkey, displaydjm@openbsd.org
2020-10-18upstream: use the new variant log macros instead of prependingdjm@openbsd.org
2020-10-14upstream: Zap unused family parameter from ssh_connect_direct()kn@openbsd.org
2020-10-07upstream: Disable UpdateHostkeys when hostkey checking failsdjm@openbsd.org
2020-10-07upstream: don't UpdateHostkeys when the hostkey is verified by thedjm@openbsd.org
2020-10-07upstream: revert kex->flags cert hostkey downgrade back to a plaindjm@openbsd.org
2020-10-07upstream: simply disable UpdateHostkeys when a certificatedjm@openbsd.org
2020-10-07upstream: when ordering host key algorithms in the client, considerdjm@openbsd.org
2020-10-03upstream: There are lots of place where we want to redirect stdin,djm@openbsd.org
2020-10-03upstream: record when the host key checking code downgrades adjm@openbsd.org
2020-09-16upstream: For the hostkey confirmation message:djm@openbsd.org
2020-08-27upstream: let ssh_config(5)'s AddKeysToAgent keyword accept a timedjm@openbsd.org
2020-07-17upstream: Add a '%k' TOKEN that expands to the effective HostKey ofdtucker@openbsd.org
2020-03-14upstream: use sshpkt_fatal() for kex_exchange_identification()djm@openbsd.org
2020-01-25upstream: when AddKeysToAgent=yes is set and the key contains nodjm@openbsd.org
2020-01-23upstream: Replace all calls to signal(2) with a wrapper arounddtucker@openbsd.org
2020-01-23upstream: Ignore whitespace when checking explict fingerprint.dtucker@openbsd.org
2020-01-21upstream: revise the fix for reversed arguments onnaddy@openbsd.org
2020-01-09upstream: fix reversed arguments on expand_proxy_command(); spotteddjm@openbsd.org
2019-11-15upstream: stdarg.h required more broadly; ok djmderaadt@openbsd.org
2019-11-13upstream: enable ed25519 support; ok djmmarkus@openbsd.org
2019-11-01upstream: ssh AddKeysToAgent support for U2F/FIDO keysdjm@openbsd.org
2019-11-01upstream: add new agent key constraint for U2F/FIDO providerdjm@openbsd.org
2019-10-02remove duplicate #includesDamien Miller
2019-09-13upstream: whitespacedjm@openbsd.org
2019-09-13upstream: allow %n to be expanded in ProxyCommand stringsdjm@openbsd.org
2019-07-05upstream: When system calls indicate an error they return -1, notderaadt@openbsd.org
2019-06-21upstream: Add protection for private keys at rest in RAM againstdjm@openbsd.org
2019-05-08upstream: Free host on exit path. Patch from markus atdtucker@openbsd.org
2019-03-01upstream: dup stdout/in for proxycommand=-, otherwise stdout mightmarkus@openbsd.org
2019-02-01upstream: Save connection timeout and restore for 2nd anddtucker@openbsd.org
2019-01-25upstream: Accept the host key fingerprint as a synonym for "yes"dtucker@openbsd.org
2019-01-20upstream: convert sshconnect.c to new packet APIdjm@openbsd.org
2019-01-20upstream: begin landing remaining refactoring of packet parsingdjm@openbsd.org
2018-12-27upstream: move client/server SSH-* banners to buffers underdjm@openbsd.org
2018-11-19upstream: Fix inverted logic for redirecting ProxyCommand stderr todtucker@openbsd.org
2018-11-16upstream: redirect stderr of ProxyCommands to /dev/null when ssh isdjm@openbsd.org
2018-10-22upstream: struct sockaddr_storage is guaranteed to be large enough,florian@openbsd.org
2018-09-20upstream: add CASignatureAlgorithms option for the client, allowingdjm@openbsd.org
2018-07-31upstream: Now that ssh can't be setuid, remove thedtucker@openbsd.org