summaryrefslogtreecommitdiff
path: root/sshconnect2.c
Commit message (Expand)AuthorAgeFilesLines
...
* upstream: Remove unsupported algorithms from list of defaults at rundtucker@openbsd.org2020-01-231-4/+4
* upstream: a little more verbosity in sign_and_send_pubkey() debugdjm@openbsd.org2020-01-211-3/+5
* upstream: close the "touch your security key" notifier on the errordjm@openbsd.org2019-11-151-2/+2
* upstream: stdarg.h required more broadly; ok djmderaadt@openbsd.org2019-11-151-2/+2
* upstream: security keys typically need to be tapped/touched indjm@openbsd.org2019-11-131-1/+16
* upstream: enable ed25519 support; ok djmmarkus@openbsd.org2019-11-131-8/+5
* upstream: Refactor signing - use sshkey_sign for everything,djm@openbsd.org2019-11-011-14/+3
* upstream: ssh client support for U2F/FIDO keysdjm@openbsd.org2019-11-011-25/+86
* upstream: Remove now-redundant perm_ok arg sincedtucker@openbsd.org2019-08-081-3/+3
* upstream: Remove some set but never used variables. ok daraadt@dtucker@openbsd.org2019-07-081-5/+4
* upstream: When system calls indicate an error they return -1, notderaadt@openbsd.org2019-07-051-10/+10
* upstream: fix ssh-keysign fd handling problem introduced in r1.304djm@openbsd.org2019-06-081-2/+2
* upstream: When doing the fork+exec'ing for ssh-keysign, rearrangederaadt@openbsd.org2019-05-171-7/+9
* upstream: fix regression in r1.302 reported by naddy@ - only the firstdjm@openbsd.org2019-02-131-5/+5
* upstream: cleanup GSSAPI authentication context after completion of thedjm@openbsd.org2019-02-111-67/+88
* upstream: rename kex->kem_client_pub -> kex->client_pub now thatdjm@openbsd.org2019-01-211-9/+9
* upstream: use KEM API for vanilla ECDHdjm@openbsd.org2019-01-211-2/+2
* upstream: use KEM API for vanilla DH KEXdjm@openbsd.org2019-01-211-6/+6
* upstream: use KEM API for vanilla c25519 KEXdjm@openbsd.org2019-01-211-2/+2
* upstream: Add support for a PQC KEX/KEM:djm@openbsd.org2019-01-211-1/+2
* upstream: GSSAPI code got missed when converting to new packet APIdjm@openbsd.org2019-01-211-4/+4
* upstream: convert the remainder of sshconnect2.c to new packetdjm@openbsd.org2019-01-201-49/+46
* upstream: convert sshconnect2.c to new packet APIdjm@openbsd.org2019-01-201-13/+16
* upstream: begin landing remaining refactoring of packet parsingdjm@openbsd.org2019-01-201-1/+4
* upstream: eliminate function-static attempt counters fordjm@openbsd.org2019-01-041-8/+10
* upstream: move client/server SSH-* banners to buffers underdjm@openbsd.org2018-12-271-26/+23
* upstream: don't truncate user or host name in "user@host'sdjm@openbsd.org2018-12-071-6/+5
* upstream: fix bug in client that was keeping a redundant ssh-agentdjm@openbsd.org2018-11-161-3/+5
* upstream: don't send new-style rsa-sha2-*-cert-v01@openssh.com names todjm@openbsd.org2018-10-121-2/+3
* upstream: second try, deals properly with missing and private-onlydjm@openbsd.org2018-09-141-26/+53
* upstream: revert following; deals badly with agent keysdjm@openbsd.org2018-09-141-47/+26
* upstream: Use consistent format in debug log for keys readied,djm@openbsd.org2018-09-141-26/+47
* upstream: revert compat.[ch] section of the following change. Itdjm@openbsd.org2018-08-131-8/+7
* upstream: fix some memory leaks spotted by Coverity via Jakub Jelendjm@openbsd.org2018-07-311-7/+8
* upstream: Remove support for running ssh(1) setuid and fatal ifdtucker@openbsd.org2018-07-191-2/+1
* upstream: Remove support for loading HostBasedAuthentication keysdtucker@openbsd.org2018-07-191-7/+3
* upstream: treat ssh_packet_write_wait() errors as fatal; ok djm@markus@openbsd.org2018-07-121-3/+3
* upstream: remove legacy key emulation layer; ok djm@markus@openbsd.org2018-07-121-6/+6
* upstream: client: switch to sshbuf API; ok djm@markus@openbsd.org2018-07-101-212/+277
* upstream: Revert previous two commitssf@openbsd.org2018-07-101-2/+2
* upstream: Remove leftovers from pre-authentication compressionsf@openbsd.org2018-07-101-2/+2
* upstream: repair PubkeyAcceptedKeyTypes (and friends) after RSAdjm@openbsd.org2018-07-041-4/+6
* upstream: some finesse to fix RSA-SHA2 certificate authenticationdjm@openbsd.org2018-07-031-3/+6
* upstream: check correct variable; unbreak agent keysdjm@openbsd.org2018-07-031-2/+2
* upstream: Improve strictness and control over RSA-SHA2 signaturedjm@openbsd.org2018-07-031-129/+216
* upstream: whitespacedjm@openbsd.org2018-06-261-2/+2
* upstream: fix bogus warning when signing cert keys using agent;markus@openbsd.org2018-03-251-1/+3
* upstream: warn when the agent returns a signature type that wasdjm@openbsd.org2018-03-031-7/+34
* upstream commitdtucker@openbsd.org2018-02-091-3/+2
* upstream commitdjm@openbsd.org2018-01-231-45/+10