summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* upstream: Make sure not to fclose() the same fd twice in case of antobhe@openbsd.org2022-06-241-7/+12
* upstream: Don't attempt to fprintf a null identity comment. Fromdtucker@openbsd.org2022-06-241-3/+3
* upstream: Log an error if pipe() fails while accepting adtucker@openbsd.org2022-06-241-3/+7
* automatically enable built-in FIDO supportDamien Miller2022-06-241-31/+34
* fix possible NULL deref when built without FIDODamien Miller2022-06-241-1/+2
* upstream: make sure that UseDNS hostname lookup happens in the monitordjm@openbsd.org2022-06-155-27/+20
* upstream: move auth_openprincipals() and auth_openkeyfile() over todjm@openbsd.org2022-06-033-61/+60
* upstream: test setenv in both client and server, test first-match-winsdjm@openbsd.org2022-06-032-4/+79
* upstream: Make SetEnv directives first-match-wins in bothdjm@openbsd.org2022-06-037-42/+58
* upstream: Add missing *-sk types to ssh-keyscan manpage. Fromdtucker@openbsd.org2022-06-031-3/+7
* upstream: Add period at end of "not known by any other names"dtucker@openbsd.org2022-06-031-2/+2
* upstream: ssh-keygen -A: do not generate DSA keys by default.dtucker@openbsd.org2022-06-032-7/+6
* upstream: ssh-keygen: implement "verify-required" certificate option.naddy@openbsd.org2022-06-031-1/+11
* upstream: keywords ref ssh_config.5;jmc@openbsd.org2022-06-031-4/+7
* fix some bugs in the fuzzerDamien Miller2022-05-301-1/+6
* Test against OpenSSL 1.1.1o and 3.0.3.Darren Tucker2022-05-271-1/+2
* Test against LibreSSL 3.5.3.Darren Tucker2022-05-271-1/+1
* fuzzer for authorized_keys parsingDamien Miller2022-05-272-1/+80
* upstream: split the low-level file handling functions out fromdjm@openbsd.org2022-05-275-402/+465
* upstream: refactor authorized_keys/principals handlingdjm@openbsd.org2022-05-276-57/+77
* upstream: f sshpkt functions fail, then password is not cleareddtucker@openbsd.org2022-05-271-4/+6
* upstream: Avoid kill with -1 argument. The out_ctx label can bedtucker@openbsd.org2022-05-271-2/+3
* upstream: Note that ProxyJump also accepts the same tokens asdtucker@openbsd.org2022-05-271-3/+5
* upstream: revert previous; it was broken (spotted by Theo)djm@openbsd.org2022-05-254-36/+35
* upstream: make SSHBUF_DBG/SSHBUF_TELL (off by default and only enableddjm@openbsd.org2022-05-254-35/+36
* configure.ac: Add missing AC_DEFINE for caph_cache_tzdata test causingTim Rice2022-05-241-1/+5
* upstream: regress test for in-place transfers and clobbering largerdjm@openbsd.org2022-05-161-1/+26
* upstream: Only run agent-ptrace.sh if gdb is available as allanton@openbsd.org2022-05-161-1/+1
* upstream: fix in-place copies; r1.163 incorrectly skipped truncation indjm@openbsd.org2022-05-161-5/+8
* upstream: arrange for scp, when in sftp mode, to not ftruncate(3) filesdjm@openbsd.org2022-05-134-43/+64
* upstream: Remove errant apostrophe. From haruyama at queen-ml org.dtucker@openbsd.org2022-05-131-2/+2
* upstream: Allow existing -U (use agent) flag to work with "-Y sign"djm@openbsd.org2022-05-092-10/+17
* upstream: improve error message when 'ssh-keygen -Y sign' is unable todjm@openbsd.org2022-05-091-6/+13
* Remove duplicate bcrypt_pbkdf.o from MakefileTobias Heider2022-05-091-1/+0
* upstream: When performing operations that glob(3) a remote path, ensuredjm@openbsd.org2022-05-091-11/+38
* Also retest OpenBSD upstream on .yml changes.Darren Tucker2022-05-061-1/+1
* Note that, for now, we need variadic macros.Darren Tucker2022-05-061-3/+4
* Add ubsan minimal testcase on OpenBSD.Darren Tucker2022-05-061-5/+7
* upstream: sshkey_unshield_private() contains a exact duplicate ofdjm@openbsd.org2022-05-051-40/+32
* upstream: channel_new no longer frees remote_name. So update thedjm@openbsd.org2022-05-052-6/+6
* upstream: mux.c: mark argument as const; from Martin Vahlensieckdjm@openbsd.org2022-05-051-2/+2
* upstream: make sure stdout is non-blocking; ok djm@markus@openbsd.org2022-05-051-4/+9
* upstream: Add FIDO AUTHENTICATOR section and explain a bit how FIDOflorian@openbsd.org2022-05-051-52/+78
* upstream: remove an obsolete rsa1 format example from an example;jmc@openbsd.org2022-05-051-3/+2
* upstream: fix some integer overflows in sieve_large() that show up whendjm@openbsd.org2022-05-021-7/+7
* upstream: be stricter in which characters will be accepted indjm@openbsd.org2022-05-021-2/+2
* Add Mac OS X 12 test target.Darren Tucker2022-04-301-2/+3
* Only run tests when source files change.Darren Tucker2022-04-293-2/+6
* Remove now-empty int32_minmax.inc.Darren Tucker2022-04-291-0/+0
* upstream: mention that the helpers are used by ssh(1), ssh-agent(1)djm@openbsd.org2022-04-292-18/+28