• Home
  • Raw
  • Download

Lines Matching refs:OpenSSH

1 This documents OpenSSH's deviations and extensions to the published SSH
4 Note that OpenSSH's sftp and sftp-server implement revision 3 of the SSH
12 The protocol used by OpenSSH's ssh-agent is described in the file
42 OpenSSH introduces new public key algorithms to support certificate
48 OpenSSH supports ECC key exchange and public key authentication as
56 OpenSSH supports MAC algorithms, whose names contain "-etm", that
84 OpenSSH supports the AES-GCM algorithm as specified in RFC 5647.
86 the behaviour of OpenSSH differs from the RFC as follows:
96 OpenSSH supports authenticated encryption using ChaCha20 and Poly1305
101 OpenSSH supports the use of ECDH in Curve25519 for key exchange as
121 OpenSSH implements a channel extension message to perform this
142 message is only sent to OpenSSH peers (identified by banner).
151 additional sessions under their control. OpenSSH provides a global
154 When an OpenSSH client expects that it will never open another session
162 On receipt of such a message, an OpenSSH server will refuse to open
170 of this message, the no-more-sessions request is only sent to OpenSSH
176 OpenSSH supports layer 2 and layer 3 tunnelling via the "tun@openssh.com"
237 OpenSSH supports local and remote Unix domain socket forwarding
289 OpenSSH supports a protocol extension allowing a server to inform
340 signal to a session attached to a channel. OpenSSH supports one
348 When OpenSSH's sftp-server was implemented, the order of the arguments
361 OpenSSH's sftp-server lists the extensions it supports using the
472 OpenSSH public keys, as generated by ssh-keygen(1) and appearing in
479 OpenSSH certificate formats.
483 OpenSSH private keys, as generated by ssh-keygen(1) use the format
486 and were the default format before OpenSSH 7.8.
490 OpenSSH supports a compact format for Key Revocation Lists (KRLs). This
495 OpenSSH's connection multiplexing uses messages as described in