summaryrefslogtreecommitdiff
path: root/sshconnect.c
Commit message (Expand)AuthorAgeFilesLines
* upstream: avoid printf("%s", NULL) if using sshdjm@openbsd.org2023-01-131-3/+6
* upstream: replace recently-added valid_domain() check for hostnamesdjm@openbsd.org2022-11-041-8/+12
* upstream: Be more paranoid with host/domain names coming from thedjm@openbsd.org2022-10-251-2/+9
* upstream: whitespacedjm@openbsd.org2022-08-261-2/+2
* upstream: Add period at end of "not known by any other names"dtucker@openbsd.org2022-06-031-2/+2
* upstream: ssh-add side of destination constraintsdjm@openbsd.org2021-12-201-2/+2
* Sync remaining ChallengeResponse removal.Darren Tucker2021-07-031-8/+1
* upstream: Use better language to refer to the user. From l1vingdtucker@openbsd.org2021-06-251-2/+2
* upstream: Allow argv_split() to optionally terminate tokenisationdjm@openbsd.org2021-06-081-2/+2
* upstream: highly polished whitespace, mostly fixing spaces-for-tabdjm@openbsd.org2021-04-031-7/+9
* upstream: typo in other_hostkeys_message() display output, ok djmsthen@openbsd.org2021-03-041-2/+2
* Revert "ssh: optional bind interface if bind address specified."Damien Miller2021-02-261-6/+0
* ssh: optional bind interface if bind address specified.Dmitrii Turlupov2021-02-261-0/+6
* upstream: move check_host_cert() from sshconnect,c to sshkey.c anddjm@openbsd.org2021-01-261-36/+20
* upstream: add a ssh_config KnownHostsCommand that allows the clientdjm@openbsd.org2020-12-221-6/+104
* upstream: plumb ssh_conn_info through to sshconnect.c; feedback/okdjm@openbsd.org2020-12-211-12/+17
* upstream: allow UserKnownHostsFile=none; feedback and ok markus@djm@openbsd.org2020-12-211-1/+5
* upstream: load_hostkeys()/hostkeys_foreach() variants for FILE*djm@openbsd.org2020-12-211-6/+6
* upstream: Set the specified TOS/DSCP for interactive use prior todjm@openbsd.org2020-11-271-1/+6
* upstream: when mentioning that the host key has changed, don'tdjm@openbsd.org2020-11-271-3/+3
* upstream: Explicitly initialize all members of thedtucker@openbsd.org2020-11-201-2/+2
* upstream: when prompting the user to accept a new hostkey, displaydjm@openbsd.org2020-11-131-28/+191
* upstream: use the new variant log macros instead of prependingdjm@openbsd.org2020-10-181-37/+31
* upstream: Zap unused family parameter from ssh_connect_direct()kn@openbsd.org2020-10-141-5/+5
* upstream: Disable UpdateHostkeys when hostkey checking failsdjm@openbsd.org2020-10-071-1/+6
* upstream: don't UpdateHostkeys when the hostkey is verified by thedjm@openbsd.org2020-10-071-4/+28
* upstream: revert kex->flags cert hostkey downgrade back to a plaindjm@openbsd.org2020-10-071-43/+12
* upstream: simply disable UpdateHostkeys when a certificatedjm@openbsd.org2020-10-071-2/+7
* upstream: when ordering host key algorithms in the client, considerdjm@openbsd.org2020-10-071-2/+3
* upstream: There are lots of place where we want to redirect stdin,djm@openbsd.org2020-10-031-23/+5
* upstream: record when the host key checking code downgrades adjm@openbsd.org2020-10-031-12/+43
* upstream: For the hostkey confirmation message:djm@openbsd.org2020-09-161-2/+2
* upstream: let ssh_config(5)'s AddKeysToAgent keyword accept a timedjm@openbsd.org2020-08-271-2/+3
* upstream: Add a '%k' TOKEN that expands to the effective HostKey ofdtucker@openbsd.org2020-07-171-1/+4
* upstream: use sshpkt_fatal() for kex_exchange_identification()djm@openbsd.org2020-03-141-3/+4
* upstream: when AddKeysToAgent=yes is set and the key contains nodjm@openbsd.org2020-01-251-4/+5
* upstream: Replace all calls to signal(2) with a wrapper arounddtucker@openbsd.org2020-01-231-5/+5
* upstream: Ignore whitespace when checking explict fingerprint.dtucker@openbsd.org2020-01-231-5/+6
* upstream: revise the fix for reversed arguments onnaddy@openbsd.org2020-01-211-4/+4
* upstream: fix reversed arguments on expand_proxy_command(); spotteddjm@openbsd.org2020-01-091-2/+2
* upstream: stdarg.h required more broadly; ok djmderaadt@openbsd.org2019-11-151-2/+2
* upstream: enable ed25519 support; ok djmmarkus@openbsd.org2019-11-131-2/+2
* upstream: ssh AddKeysToAgent support for U2F/FIDO keysdjm@openbsd.org2019-11-011-3/+5
* upstream: add new agent key constraint for U2F/FIDO providerdjm@openbsd.org2019-11-011-2/+2
* remove duplicate #includesDamien Miller2019-10-021-1/+0
* upstream: whitespacedjm@openbsd.org2019-09-131-3/+3
* upstream: allow %n to be expanded in ProxyCommand stringsdjm@openbsd.org2019-09-131-15/+20
* upstream: When system calls indicate an error they return -1, notderaadt@openbsd.org2019-07-051-13/+13
* upstream: Add protection for private keys at rest in RAM againstdjm@openbsd.org2019-06-211-2/+2
* upstream: Free host on exit path. Patch from markus atdtucker@openbsd.org2019-05-081-1/+2