summaryrefslogtreecommitdiffstats
path: root/utf8.h (unfollow)
Commit message (Expand)AuthorFilesLines
2019-11-15Add wrappers for other ultrix headers.Darren Tucker1-8/+10
2019-11-15Add SSIZE_MAX when we define ssize_t.Darren Tucker1-0/+1
2019-11-15Remove ultrix realpath hack.Darren Tucker1-1/+0
2019-11-15upstream: unshield security key privkey before attempting signaturedjm@openbsd.org1-4/+16
2019-11-15upstream: rewrite c99-ismderaadt@openbsd.org1-2/+2
2019-11-15upstream: only clang understands those new -W optionsderaadt@openbsd.org1-0/+1
2019-11-15configure flag to built-in security key supportDamien Miller2-1/+12
2019-11-15upstream commitDamien Miller2-21/+21
2019-11-15upstream commitDamien Miller1-21/+34
2019-11-15upstream commitDamien Miller1-9/+5
2019-11-15upstream commitDamien Miller1-5/+3
2019-11-15upstream commitDamien Miller1-4/+4
2019-11-15upstream commitDamien Miller1-1/+4
2019-11-15upstream commitDamien Miller1-3/+3
2019-11-15upstream: don't consult dlopen whitelist for internal security keydjm@openbsd.org1-2/+4
2019-11-15upstream commitDamien Miller1-14/+14
2019-11-15upstream commitDamien Miller1-4/+4
2019-11-15upstream: U2F tokens may return FIDO_ERR_USER_PRESENCE_REQUIRED whendjm@openbsd.org1-0/+4
2019-11-15Add libfido2 to INSTALL.Darren Tucker1-0/+9
2019-11-15libcrypto is now optional.Darren Tucker1-9/+10
2019-11-15upstream: show the "please touch your security key" notifier whendjm@openbsd.org1-9/+15
2019-11-15upstream: close the "touch your security key" notifier on the errordjm@openbsd.org1-2/+2
2019-11-15upstream: correct function name in debug messagedjm@openbsd.org1-1/+1
2019-11-15upstream: follow existing askpass logic for security key notifier:djm@openbsd.org1-3/+4
2019-11-15upstream: remove debugging goop that snuck in to last commitdjm@openbsd.org1-0/+1
2019-11-15don't fatal if libfido2 not foundDamien Miller1-2/+1
2019-11-15correct object dependencyDamien Miller1-1/+1
2019-11-14upstream: directly support U2F/FIDO2 security keys in OpenSSH bydjm@openbsd.org13-72/+837
2019-11-14upstream: in order to be able to figure out the number ofmarkus@openbsd.org1-1/+6
2019-11-14upstream: fix check for sig_s; noted by qsa at qualys.commarkus@openbsd.org1-2/+2
2019-11-14upstream: When clients get denied by MaxStartups, send adtucker@openbsd.org1-1/+4
2019-11-14upstream: fix shield/unshield for xmss keys: - in ssh-agent we needmarkus@openbsd.org4-15/+64
2019-11-14upstream: remove size_t gl_pathc < 0 test, it is invalid. thederaadt@openbsd.org1-3/+3
2019-11-14upstream: stdarg.h required more broadly; ok djmderaadt@openbsd.org11-22/+21
2019-11-14Put sshsk_sign call inside ifdef ENABLE_SK.Darren Tucker1-0/+2
2019-11-13Remove duplicate __NR_clock_nanosleepDarren Tucker1-3/+0
2019-11-13seccomp: Allow clock_nanosleep() in sandbox.Darren Tucker1-0/+6
2019-11-13Include stdarg.h for va_list in xmalloc.h.Darren Tucker3-0/+3
2019-11-13Put headers inside ifdef _AIX.Darren Tucker1-2/+2
2019-11-13Fix comment in match_usergroup_pattern_list.Darren Tucker1-1/+1
2019-11-13upstream: allow an empty attestation certificate returned by adjm@openbsd.org1-2/+3
2019-11-13upstream: security keys typically need to be tapped/touched indjm@openbsd.org3-6/+38
2019-11-13upstream: pass SSH_ASKPASS_PROMPT hint to y/n key confirm toodjm@openbsd.org1-1/+2
2019-11-13upstream: dd API for performing one-shot notifications via tty ordjm@openbsd.org2-2/+91
2019-11-13upstream: add xvasprintf()djm@openbsd.org2-8/+17
2019-11-12Remove leftover if statement from sync.Darren Tucker1-1/+0
2019-11-12upstream: remove extra layer for ed25519 signature; ok djm@markus@openbsd.org3-45/+39
2019-11-12upstream: check sig_r and sig_s for ssh-sk keys; ok djmmarkus@openbsd.org1-1/+13
2019-11-12upstream: enable ed25519 support; ok djmmarkus@openbsd.org12-31/+200
2019-11-12upstream: update sk-api to version 2 for ed25519 support; ok djmmarkus@openbsd.org3-14/+29