summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
* Fix typo in Neils' name.Darren Tucker2021-11-291-1/+1
* sync bcrypt-related files with OpenBSDDamien Miller2021-11-295-41/+33
* dependDamien Miller2021-11-291-49/+47
* upstream: sshsig: return "key not found" when searching empty filesdjm@openbsd.org2021-11-281-1/+2
* upstream: ssh-keygen -Y match-principals doesn't accept any -Odjm@openbsd.org2021-11-281-3/+2
* upstream: fix indenting in last commitdjm@openbsd.org2021-11-281-2/+2
* upstream: missing initialisation for oerrnodjm@openbsd.org2021-11-281-2/+2
* Correct ifdef to activate poll() only if needed.Darren Tucker2021-11-281-1/+1
* upstream: whitespac edjm@openbsd.org2021-11-271-2/+2
* upstream: regression test for match-principals. Mostly by Fabiandjm@openbsd.org2021-11-271-1/+27
* upstream: Add ssh-keygen -Y match-principals operation to performdjm@openbsd.org2021-11-274-5/+132
* upstream: debug("func: ...") -> debug_f("...")djm@openbsd.org2021-11-271-6/+6
* Allow for fd = -1 in compat ppoll overflow check.Darren Tucker2021-11-191-1/+1
* Don't auto-enable Capsicum sandbox on FreeBSD 9/10.Darren Tucker2021-11-191-0/+6
* upstream: regression test for ssh-keygen -Y find-principals fix; fromdjm@openbsd.org2021-11-181-1/+104
* upstream: less confusing debug message; bz#3365djm@openbsd.org2021-11-181-2/+2
* upstream: avoid xmalloc(0) for PKCS#11 keyid for ECDSA keys (wedjm@openbsd.org2021-11-181-4/+5
* upstream: ssh-keygen -Y find-principals was verifying key validitydjm@openbsd.org2021-11-181-65/+36
* Correct calculation of tv_nsec in poll().Darren Tucker2021-11-181-1/+1
* Add compat implementation of ppoll using pselect.Darren Tucker2021-11-183-17/+69
* Put poll.h inside ifdef HAVE_POLL_H.Darren Tucker2021-11-183-0/+6
* upstream: check for POLLHUP wherever we check for POLLINdjm@openbsd.org2021-11-183-8/+7
* upstream: fd leak in sshd listen loop error path; from Glebdjm@openbsd.org2021-11-181-2/+4
* upstream: check for POLLHUP as well as POLLIN in sshd listen loop;djm@openbsd.org2021-11-181-2/+2
* upstream: check for POLLHUP as well as POLLIN, handle transient IOdjm@openbsd.org2021-11-181-7/+15
* adjust seccomp filter for select->poll conversionDamien Miller2021-11-181-2/+9
* update dependsDamien Miller2021-11-181-47/+49
* compat for timespecsub() and friendsDamien Miller2021-11-171-0/+33
* upstream: set num_listen_socks to 0 on close-all instead of -1,djm@openbsd.org2021-11-171-2/+2
* upstream: use ppoll() instead of pselect() with djmderaadt@openbsd.org2021-11-171-23/+23
* upstream: match .events with .fd betterderaadt@openbsd.org2021-11-171-5/+7
* upstream: convert select() to poll() ok djmderaadt@openbsd.org2021-11-171-22/+16
* upstream: replace select() with ppoll(), including convertingderaadt@openbsd.org2021-11-173-45/+26
* upstream: It really looks like pledge "stdio dns" is possiblederaadt@openbsd.org2021-11-171-4/+4
* upstream: aggressively pre-fill the pollfd array with fd=-1deraadt@openbsd.org2021-11-171-1/+3
* upstream: Convert from select() to ppoll(). Along the way, Ideraadt@openbsd.org2021-11-171-31/+22
* Switch from LibreSSL 3.4.0 to 3.4.1.Darren Tucker2021-11-121-1/+1
* upstream: add the sntrup761x25519-sha512@openssh.com hybriddjm@openbsd.org2021-11-103-5/+8
* upstream: fix ssh-keysign for KEX algorithms that use SHA384/512djm@openbsd.org2021-11-101-3/+6
* upstream: improve error message when trying to expand a ~user pathdjm@openbsd.org2021-11-101-2/+2
* Don't trust closefrom() on Linux.Darren Tucker2021-11-102-1/+8
* upstream: Plug a couple of minor mem leaks. From beldmit atdtucker@openbsd.org2021-11-062-2/+4
* upstream: move cert_filter_principals() to earlier in the file fordjm@openbsd.org2021-11-061-55/+55
* upstream: Many downstreams expect ssh to compile as non-C99...deraadt@openbsd.org2021-11-061-3/+3
* Skip getline() on HP-UX 10.x.Darren Tucker2021-11-062-1/+2
* basic SECURITY.md (refers people to the website)Damien Miller2021-11-031-0/+5
* upstream: crank SSH_SK_VERSION_MAJOR to match recent change indjm@openbsd.org2021-11-031-1/+2
* upstream: Better handle FIDO keys on tokens that provide userdjm@openbsd.org2021-11-033-13/+83
* upstream: sshsig: add tests for signing key validity anddjm@openbsd.org2021-10-291-1/+77
* upstream: avoid signedness warning; spotted in -portabledjm@openbsd.org2021-10-291-2/+2