summaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
...
* upstream: update sk-api to version 2 for ed25519 support; ok djmmarkus@openbsd.org2019-11-123-14/+29
* upstream: implement sshsk_ed25519_assemble(); ok djmmarkus@openbsd.org2019-11-122-8/+58
* upstream: implement sshsk_ed25519_inner_sig(); ok djmmarkus@openbsd.org2019-11-123-9/+61
* upstream: rename sshsk_ecdsa_sign() to sshsk_sign(); ok djmmarkus@openbsd.org2019-11-124-11/+11
* upstream: factor out sshsk_ecdsa_inner_sig(); ok djm@markus@openbsd.org2019-11-121-20/+43
* upstream: factor out sshsk_ecdsa_assemble(); ok djm@markus@openbsd.org2019-11-121-37/+59
* upstream: implement ssh-ed25519-sk verification; ok djm@markus@openbsd.org2019-11-124-3/+142
* ignore ssh-sk-helperDamien Miller2019-11-121-0/+1
* upstream: skip demanding -fstack-protector-all on hppa. we neverderaadt@openbsd.org2019-11-121-0/+1
* upstream: duplicate 'x' character in getopt(3) optstringdjm@openbsd.org2019-11-111-2/+2
* upstream: Fill in missing man page bits for U2F security key support:naddy@openbsd.org2019-11-089-43/+179
* Put sftp-realpath in libssh.aDarren Tucker2019-11-021-4/+4
* statfs might be defined in sys/mount.h.Darren Tucker2019-11-021-0/+4
* Put stdint.h inside ifdef HAVE_STDINT_H.Darren Tucker2019-11-021-0/+2
* Rebuild .depend.Darren Tucker2019-11-021-171/+174
* Define __BSD_VISIBLE in fnmatch.h.Darren Tucker2019-11-021-0/+2
* Only enable U2F if OpenSSL supports ECC.Darren Tucker2019-11-021-34/+40
* upstream: fix miscellaneous text problems; ok djm@naddy@openbsd.org2019-11-021-8/+8
* Add flags needed to build and work on Ultrix.Darren Tucker2019-11-011-1/+17
* Hook up fnmatch for platforms that don't have it.Darren Tucker2019-11-016-2/+21
* Add missing bracket in realpath macro.Darren Tucker2019-11-011-1/+1
* Import fnmatch.c from OpenBSD.Darren Tucker2019-11-012-0/+546
* Use sftp_realpath if no native realpath.Darren Tucker2019-11-012-0/+5
* Configure flags for haiku from haikuports.Darren Tucker2019-11-011-0/+2
* upstream: fix a race condition in the SIGCHILD handler that could turndjm@openbsd.org2019-11-011-4/+7
* conditionalise SK sign/verify on ENABLE_SKDamien Miller2019-11-011-0/+4
* Add prototype for localtime_r if needed.Darren Tucker2019-11-011-0/+4
* Check if IP_TOS is defined before using.Darren Tucker2019-11-011-0/+4
* autoconf pieces for U2F supportDamien Miller2019-11-015-10/+74
* upstream: remove duplicate PUBKEY_DEFAULT_PK_ALG on !WITH_OPENSSL pathdjm@openbsd.org2019-11-011-5/+1
* upstream: more additional source filesdjm@openbsd.org2019-11-011-0/+25
* upstream: additional source files here toodjm@openbsd.org2019-11-011-2/+2
* upstream: additional source files here toodjm@openbsd.org2019-11-011-2/+2
* upstream: adapt to extra sshkey_sign() argument and additionaldjm@openbsd.org2019-11-013-8/+9
* upstream: skip security-key key types for tests until we have adjm@openbsd.org2019-11-0110-22/+22
* upstream: sort;jmc@openbsd.org2019-11-011-6/+6
* upstream: undo debugging bits that shouldn't have been committeddjm@openbsd.org2019-11-011-0/+1
* dependDamien Miller2019-10-311-5/+8
* upstream: fix -Wshadow warningdjm@openbsd.org2019-10-311-2/+2
* upstream: Refactor signing - use sshkey_sign for everything,djm@openbsd.org2019-10-3114-72/+82
* upstream: ssh-agent support for U2F/FIDO keysdjm@openbsd.org2019-10-316-32/+372
* upstream: ssh AddKeysToAgent support for U2F/FIDO keysdjm@openbsd.org2019-10-311-3/+5
* upstream: ssh-add support for U2F/FIDO keysdjm@openbsd.org2019-10-312-12/+38
* upstream: add new agent key constraint for U2F/FIDO providerdjm@openbsd.org2019-10-314-13/+28
* upstream: ssh client support for U2F/FIDO keysdjm@openbsd.org2019-10-314-29/+120
* upstream: Separate myproposal.h userauth pubkey typesdjm@openbsd.org2019-10-312-4/+27
* upstream: ssh-keygen support for generating U2F/FIDO keysdjm@openbsd.org2019-10-311-6/+35
* upstream: U2F/FIDO middleware interfacedjm@openbsd.org2019-10-314-1/+490
* upstream: Initial infrastructure for U2F/FIDO supportdjm@openbsd.org2019-10-315-29/+381
* upstream: Protocol documentation for U2F/FIDO keys in OpenSSHdjm@openbsd.org2019-10-311-0/+224