summaryrefslogtreecommitdiffstats
path: root/openbsd-compat/bsd-nextstep.c (unfollow)
Commit message (Expand)AuthorFilesLines
2022-06-27upstream: Don't leak the strings allocated by order_hostkeyalgs()dtucker@openbsd.org2-6/+12
2022-06-25Zero out LIBFIDO2 when SK support not usable.Darren Tucker1-1/+1
2022-06-25Disable SK support if FIDO libs not found.Darren Tucker1-0/+1
2022-06-24fix broken case statement in previousDamien Miller1-0/+1
2022-06-24request 1.1x API compatibility for OpenSSL >=3.xDamien Miller1-2/+7
2022-06-24upstream: make it clear that RekeyLimit applies to both transmitteddjm@openbsd.org2-10/+10
2022-06-24upstream: Make sure not to fclose() the same fd twice in case of antobhe@openbsd.org1-7/+12
2022-06-24upstream: Don't attempt to fprintf a null identity comment. Fromdtucker@openbsd.org1-3/+3
2022-06-24upstream: Log an error if pipe() fails while accepting adtucker@openbsd.org1-3/+7
2022-06-24automatically enable built-in FIDO supportDamien Miller1-31/+34
2022-06-24fix possible NULL deref when built without FIDODamien Miller1-1/+2
2022-06-15upstream: make sure that UseDNS hostname lookup happens in the monitordjm@openbsd.org5-27/+20
2022-06-03upstream: move auth_openprincipals() and auth_openkeyfile() over todjm@openbsd.org3-61/+60
2022-06-03upstream: test setenv in both client and server, test first-match-winsdjm@openbsd.org2-4/+79
2022-06-03upstream: Make SetEnv directives first-match-wins in bothdjm@openbsd.org7-42/+58
2022-06-03upstream: Add missing *-sk types to ssh-keyscan manpage. Fromdtucker@openbsd.org1-3/+7
2022-06-03upstream: Add period at end of "not known by any other names"dtucker@openbsd.org1-2/+2
2022-06-03upstream: ssh-keygen -A: do not generate DSA keys by default.dtucker@openbsd.org2-7/+6
2022-06-03upstream: ssh-keygen: implement "verify-required" certificate option.naddy@openbsd.org1-1/+11
2022-06-03upstream: keywords ref ssh_config.5;jmc@openbsd.org1-4/+7
2022-05-30fix some bugs in the fuzzerDamien Miller1-1/+6
2022-05-27Test against OpenSSL 1.1.1o and 3.0.3.Darren Tucker1-1/+2
2022-05-27Test against LibreSSL 3.5.3.Darren Tucker1-1/+1
2022-05-27fuzzer for authorized_keys parsingDamien Miller2-1/+80
2022-05-27upstream: split the low-level file handling functions out fromdjm@openbsd.org5-402/+465
2022-05-27upstream: refactor authorized_keys/principals handlingdjm@openbsd.org6-57/+77
2022-05-27upstream: f sshpkt functions fail, then password is not cleareddtucker@openbsd.org1-4/+6
2022-05-27upstream: Avoid kill with -1 argument. The out_ctx label can bedtucker@openbsd.org1-2/+3
2022-05-27upstream: Note that ProxyJump also accepts the same tokens asdtucker@openbsd.org1-3/+5
2022-05-25upstream: revert previous; it was broken (spotted by Theo)djm@openbsd.org4-36/+35
2022-05-25upstream: make SSHBUF_DBG/SSHBUF_TELL (off by default and only enableddjm@openbsd.org4-35/+36
2022-05-24configure.ac: Add missing AC_DEFINE for caph_cache_tzdata test causingTim Rice1-1/+5
2022-05-16upstream: regress test for in-place transfers and clobbering largerdjm@openbsd.org1-1/+26
2022-05-16upstream: Only run agent-ptrace.sh if gdb is available as allanton@openbsd.org1-1/+1
2022-05-16upstream: fix in-place copies; r1.163 incorrectly skipped truncation indjm@openbsd.org1-5/+8
2022-05-13upstream: arrange for scp, when in sftp mode, to not ftruncate(3) filesdjm@openbsd.org4-43/+64
2022-05-13upstream: Remove errant apostrophe. From haruyama at queen-ml org.dtucker@openbsd.org1-2/+2
2022-05-09upstream: Allow existing -U (use agent) flag to work with "-Y sign"djm@openbsd.org2-10/+17
2022-05-09upstream: improve error message when 'ssh-keygen -Y sign' is unable todjm@openbsd.org1-6/+13
2022-05-09Remove duplicate bcrypt_pbkdf.o from MakefileTobias Heider1-1/+0
2022-05-09upstream: When performing operations that glob(3) a remote path, ensuredjm@openbsd.org1-11/+38
2022-05-06Also retest OpenBSD upstream on .yml changes.Darren Tucker1-1/+1
2022-05-06Note that, for now, we need variadic macros.Darren Tucker1-3/+4
2022-05-06Add ubsan minimal testcase on OpenBSD.Darren Tucker1-5/+7
2022-05-05upstream: sshkey_unshield_private() contains a exact duplicate ofdjm@openbsd.org1-40/+32
2022-05-05upstream: channel_new no longer frees remote_name. So update thedjm@openbsd.org2-6/+6
2022-05-05upstream: mux.c: mark argument as const; from Martin Vahlensieckdjm@openbsd.org1-2/+2
2022-05-05upstream: make sure stdout is non-blocking; ok djm@markus@openbsd.org1-4/+9
2022-05-05upstream: Add FIDO AUTHENTICATOR section and explain a bit how FIDOflorian@openbsd.org1-52/+78
2022-05-05upstream: remove an obsolete rsa1 format example from an example;jmc@openbsd.org1-3/+2