index
:
delta/openssh-git.git
IBS
PRIVSEP
V_2_5_2
V_2_9_9
V_2_9_P1
V_3_0_2
V_3_2_3
V_3_3
V_3_5
V_3_6
V_3_6_1
V_3_7
V_3_8
V_3_8_1
V_3_9
V_4_0
V_4_1
V_4_2
V_4_3
V_4_4
V_4_5
V_4_6
V_4_7
V_4_9
V_5_3
V_5_4
V_5_6
V_5_8
V_5_9
V_6_0
V_6_2
V_6_3
V_6_4
V_6_5
V_6_6
V_6_7
V_6_8
V_6_9
V_7_0
V_7_1
V_7_2
V_7_3
V_7_4
V_7_5
V_7_6
V_7_7
V_7_8
V_7_9
V_8_0
V_8_1
V_8_2
V_8_3
V_8_4
V_8_5
V_8_6
V_8_7
V_8_8
V_8_9
V_9_0
V_9_1
V_9_2
V_9_3
baserock/6.7-musl
baserock/morph
baserock/tiagogomes/armv8l64
master
anongit.mindrot.org: openssh.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
sshconnect.c
Commit message (
Expand
)
Author
Age
Files
Lines
*
upstream: avoid printf("%s", NULL) if using ssh
djm@openbsd.org
2023-01-13
1
-3
/
+6
*
upstream: replace recently-added valid_domain() check for hostnames
djm@openbsd.org
2022-11-04
1
-8
/
+12
*
upstream: Be more paranoid with host/domain names coming from the
djm@openbsd.org
2022-10-25
1
-2
/
+9
*
upstream: whitespace
djm@openbsd.org
2022-08-26
1
-2
/
+2
*
upstream: Add period at end of "not known by any other names"
dtucker@openbsd.org
2022-06-03
1
-2
/
+2
*
upstream: ssh-add side of destination constraints
djm@openbsd.org
2021-12-20
1
-2
/
+2
*
Sync remaining ChallengeResponse removal.
Darren Tucker
2021-07-03
1
-8
/
+1
*
upstream: Use better language to refer to the user. From l1ving
dtucker@openbsd.org
2021-06-25
1
-2
/
+2
*
upstream: Allow argv_split() to optionally terminate tokenisation
djm@openbsd.org
2021-06-08
1
-2
/
+2
*
upstream: highly polished whitespace, mostly fixing spaces-for-tab
djm@openbsd.org
2021-04-03
1
-7
/
+9
*
upstream: typo in other_hostkeys_message() display output, ok djm
sthen@openbsd.org
2021-03-04
1
-2
/
+2
*
Revert "ssh: optional bind interface if bind address specified."
Damien Miller
2021-02-26
1
-6
/
+0
*
ssh: optional bind interface if bind address specified.
Dmitrii Turlupov
2021-02-26
1
-0
/
+6
*
upstream: move check_host_cert() from sshconnect,c to sshkey.c and
djm@openbsd.org
2021-01-26
1
-36
/
+20
*
upstream: add a ssh_config KnownHostsCommand that allows the client
djm@openbsd.org
2020-12-22
1
-6
/
+104
*
upstream: plumb ssh_conn_info through to sshconnect.c; feedback/ok
djm@openbsd.org
2020-12-21
1
-12
/
+17
*
upstream: allow UserKnownHostsFile=none; feedback and ok markus@
djm@openbsd.org
2020-12-21
1
-1
/
+5
*
upstream: load_hostkeys()/hostkeys_foreach() variants for FILE*
djm@openbsd.org
2020-12-21
1
-6
/
+6
*
upstream: Set the specified TOS/DSCP for interactive use prior to
djm@openbsd.org
2020-11-27
1
-1
/
+6
*
upstream: when mentioning that the host key has changed, don't
djm@openbsd.org
2020-11-27
1
-3
/
+3
*
upstream: Explicitly initialize all members of the
dtucker@openbsd.org
2020-11-20
1
-2
/
+2
*
upstream: when prompting the user to accept a new hostkey, display
djm@openbsd.org
2020-11-13
1
-28
/
+191
*
upstream: use the new variant log macros instead of prepending
djm@openbsd.org
2020-10-18
1
-37
/
+31
*
upstream: Zap unused family parameter from ssh_connect_direct()
kn@openbsd.org
2020-10-14
1
-5
/
+5
*
upstream: Disable UpdateHostkeys when hostkey checking fails
djm@openbsd.org
2020-10-07
1
-1
/
+6
*
upstream: don't UpdateHostkeys when the hostkey is verified by the
djm@openbsd.org
2020-10-07
1
-4
/
+28
*
upstream: revert kex->flags cert hostkey downgrade back to a plain
djm@openbsd.org
2020-10-07
1
-43
/
+12
*
upstream: simply disable UpdateHostkeys when a certificate
djm@openbsd.org
2020-10-07
1
-2
/
+7
*
upstream: when ordering host key algorithms in the client, consider
djm@openbsd.org
2020-10-07
1
-2
/
+3
*
upstream: There are lots of place where we want to redirect stdin,
djm@openbsd.org
2020-10-03
1
-23
/
+5
*
upstream: record when the host key checking code downgrades a
djm@openbsd.org
2020-10-03
1
-12
/
+43
*
upstream: For the hostkey confirmation message:
djm@openbsd.org
2020-09-16
1
-2
/
+2
*
upstream: let ssh_config(5)'s AddKeysToAgent keyword accept a time
djm@openbsd.org
2020-08-27
1
-2
/
+3
*
upstream: Add a '%k' TOKEN that expands to the effective HostKey of
dtucker@openbsd.org
2020-07-17
1
-1
/
+4
*
upstream: use sshpkt_fatal() for kex_exchange_identification()
djm@openbsd.org
2020-03-14
1
-3
/
+4
*
upstream: when AddKeysToAgent=yes is set and the key contains no
djm@openbsd.org
2020-01-25
1
-4
/
+5
*
upstream: Replace all calls to signal(2) with a wrapper around
dtucker@openbsd.org
2020-01-23
1
-5
/
+5
*
upstream: Ignore whitespace when checking explict fingerprint.
dtucker@openbsd.org
2020-01-23
1
-5
/
+6
*
upstream: revise the fix for reversed arguments on
naddy@openbsd.org
2020-01-21
1
-4
/
+4
*
upstream: fix reversed arguments on expand_proxy_command(); spotted
djm@openbsd.org
2020-01-09
1
-2
/
+2
*
upstream: stdarg.h required more broadly; ok djm
deraadt@openbsd.org
2019-11-15
1
-2
/
+2
*
upstream: enable ed25519 support; ok djm
markus@openbsd.org
2019-11-13
1
-2
/
+2
*
upstream: ssh AddKeysToAgent support for U2F/FIDO keys
djm@openbsd.org
2019-11-01
1
-3
/
+5
*
upstream: add new agent key constraint for U2F/FIDO provider
djm@openbsd.org
2019-11-01
1
-2
/
+2
*
remove duplicate #includes
Damien Miller
2019-10-02
1
-1
/
+0
*
upstream: whitespace
djm@openbsd.org
2019-09-13
1
-3
/
+3
*
upstream: allow %n to be expanded in ProxyCommand strings
djm@openbsd.org
2019-09-13
1
-15
/
+20
*
upstream: When system calls indicate an error they return -1, not
deraadt@openbsd.org
2019-07-05
1
-13
/
+13
*
upstream: Add protection for private keys at rest in RAM against
djm@openbsd.org
2019-06-21
1
-2
/
+2
*
upstream: Free host on exit path. Patch from markus at
dtucker@openbsd.org
2019-05-08
1
-1
/
+2
[next]