index
:
openssh.git
master
sid
ssh_8.3
v7.9
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
sshconnect2.c
Age
Commit message (
Expand
)
Author
2020-01-21
upstream: a little more verbosity in sign_and_send_pubkey() debug
djm@openbsd.org
2019-11-15
upstream: close the "touch your security key" notifier on the error
djm@openbsd.org
2019-11-15
upstream: stdarg.h required more broadly; ok djm
deraadt@openbsd.org
2019-11-13
upstream: security keys typically need to be tapped/touched in
djm@openbsd.org
2019-11-13
upstream: enable ed25519 support; ok djm
markus@openbsd.org
2019-11-01
upstream: Refactor signing - use sshkey_sign for everything,
djm@openbsd.org
2019-11-01
upstream: ssh client support for U2F/FIDO keys
djm@openbsd.org
2019-08-08
upstream: Remove now-redundant perm_ok arg since
dtucker@openbsd.org
2019-07-08
upstream: Remove some set but never used variables. ok daraadt@
dtucker@openbsd.org
2019-07-05
upstream: When system calls indicate an error they return -1, not
deraadt@openbsd.org
2019-06-08
upstream: fix ssh-keysign fd handling problem introduced in r1.304
djm@openbsd.org
2019-05-17
upstream: When doing the fork+exec'ing for ssh-keysign, rearrange
deraadt@openbsd.org
2019-02-13
upstream: fix regression in r1.302 reported by naddy@ - only the first
djm@openbsd.org
2019-02-11
upstream: cleanup GSSAPI authentication context after completion of the
djm@openbsd.org
2019-01-21
upstream: rename kex->kem_client_pub -> kex->client_pub now that
djm@openbsd.org
2019-01-21
upstream: use KEM API for vanilla ECDH
djm@openbsd.org
2019-01-21
upstream: use KEM API for vanilla DH KEX
djm@openbsd.org
2019-01-21
upstream: use KEM API for vanilla c25519 KEX
djm@openbsd.org
2019-01-21
upstream: Add support for a PQC KEX/KEM:
djm@openbsd.org
2019-01-21
upstream: GSSAPI code got missed when converting to new packet API
djm@openbsd.org
2019-01-20
upstream: convert the remainder of sshconnect2.c to new packet
djm@openbsd.org
2019-01-20
upstream: convert sshconnect2.c to new packet API
djm@openbsd.org
2019-01-20
upstream: begin landing remaining refactoring of packet parsing
djm@openbsd.org
2019-01-04
upstream: eliminate function-static attempt counters for
djm@openbsd.org
2018-12-27
upstream: move client/server SSH-* banners to buffers under
djm@openbsd.org
2018-12-07
upstream: don't truncate user or host name in "user@host's
djm@openbsd.org
2018-11-16
upstream: fix bug in client that was keeping a redundant ssh-agent
djm@openbsd.org
2018-10-12
upstream: don't send new-style rsa-sha2-*-cert-v01@openssh.com names to
djm@openbsd.org
2018-09-14
upstream: second try, deals properly with missing and private-only
djm@openbsd.org
2018-09-14
upstream: revert following; deals badly with agent keys
djm@openbsd.org
2018-09-14
upstream: Use consistent format in debug log for keys readied,
djm@openbsd.org
2018-08-13
upstream: revert compat.[ch] section of the following change. It
djm@openbsd.org
2018-07-31
upstream: fix some memory leaks spotted by Coverity via Jakub Jelen
djm@openbsd.org
2018-07-19
upstream: Remove support for running ssh(1) setuid and fatal if
dtucker@openbsd.org
2018-07-19
upstream: Remove support for loading HostBasedAuthentication keys
dtucker@openbsd.org
2018-07-12
upstream: treat ssh_packet_write_wait() errors as fatal; ok djm@
markus@openbsd.org
2018-07-12
upstream: remove legacy key emulation layer; ok djm@
markus@openbsd.org
2018-07-10
upstream: client: switch to sshbuf API; ok djm@
markus@openbsd.org
2018-07-10
upstream: Revert previous two commits
sf@openbsd.org
2018-07-10
upstream: Remove leftovers from pre-authentication compression
sf@openbsd.org
2018-07-04
upstream: repair PubkeyAcceptedKeyTypes (and friends) after RSA
djm@openbsd.org
2018-07-03
upstream: some finesse to fix RSA-SHA2 certificate authentication
djm@openbsd.org
2018-07-03
upstream: check correct variable; unbreak agent keys
djm@openbsd.org
2018-07-03
upstream: Improve strictness and control over RSA-SHA2 signature
djm@openbsd.org
2018-06-26
upstream: whitespace
djm@openbsd.org
2018-03-25
upstream: fix bogus warning when signing cert keys using agent;
markus@openbsd.org
2018-03-03
upstream: warn when the agent returns a signature type that was
djm@openbsd.org
2018-02-09
upstream commit
dtucker@openbsd.org
2018-01-23
upstream commit
djm@openbsd.org
2017-09-04
upstream commit
dtucker@openbsd.org
[next]