summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* upstream: explicit_bzero here to be consistent with other kex*.c;djm@openbsd.org2018-10-041-1/+2
* upstream: Allow ssh_config IdentityAgent directive to acceptdjm@openbsd.org2018-10-036-16/+72
* upstream: mention INFO@openssh.com for sending SIGINFOdjm@openbsd.org2018-10-021-1/+8
* only support SIGINFO on systems with SIGINFODamien Miller2018-10-021-0/+2
* upstream: Add server support for signalling sessions via the SSHdjm@openbsd.org2018-10-022-2/+77
* upstream: remove big ugly TODO comment from start of file. Some ofdjm@openbsd.org2018-09-261-14/+1
* upstream: Document mux proxy mode; added by Markus in openssh-7.4djm@openbsd.org2018-09-261-37/+107
* upstream: s/process_mux_master/mux_master_process/ in mux masterdjm@openbsd.org2018-09-261-36/+38
* Remove unused variable in _ssh_compat_fflush.Darren Tucker2018-09-221-4/+4
* Import updated moduli.Darren Tucker2018-09-221-437/+427
* upstream: Allow ssh_config ForwardX11Timeout=0 to disable thedjm@openbsd.org2018-09-212-16/+33
* upstream: when compiled with GSSAPI support, cache supported methoddjm@openbsd.org2018-09-211-3/+2
* upstream: In sshkey_in_file(), ignore keys that are considered fordjm@openbsd.org2018-09-211-4/+10
* upstream: Treat connections with ProxyJump specified the same as onesdjm@openbsd.org2018-09-212-7/+8
* upstream: actually make CASignatureAlgorithms available as a configdjm@openbsd.org2018-09-211-1/+2
* upstream: Import updated moduli.dtucker@openbsd.org2018-09-211-0/+1
* upstream: reorder CASignatureAlgorithms, and add them to thejmc@openbsd.org2018-09-214-19/+22
* upstream: fix "ssh -Q sig" to show correct signature algorithm listdjm@openbsd.org2018-09-201-2/+2
* upstream: add CASignatureAlgorithms option for the client, allowingdjm@openbsd.org2018-09-204-10/+42
* upstream: Add sshd_config CASignatureAlgorithms option to allowdjm@openbsd.org2018-09-205-9/+45
* upstream: Make "ssh-add -q" do what it says on the tin: silencedjm@openbsd.org2018-09-201-23/+39
* upstream: When choosing a prime from the moduli file, avoidmillert@openbsd.org2018-09-201-6/+8
* Fix openssl-1.1 fallout for --without-openssl.Darren Tucker2018-09-151-0/+4
* add futex(2) syscall to seccomp sandboxDamien Miller2018-09-151-0/+3
* really add source for authopt_fuzz this timeDamien Miller2018-09-151-0/+33
* remove accidentally checked-in authopt_fuzz binaryDamien Miller2018-09-151-0/+0
* upstream: second try, deals properly with missing and private-onlydjm@openbsd.org2018-09-141-26/+53
* fuzzer harness for authorized_keys option parsingDamien Miller2018-09-142-2/+5
* upstream: revert following; deals badly with agent keysdjm@openbsd.org2018-09-141-47/+26
* upstream: garbage-collect moribund ssh_new_private() API.djm@openbsd.org2018-09-143-22/+10
* upstream: Use consistent format in debug log for keys readied,djm@openbsd.org2018-09-141-26/+47
* upstream: Fix warnings caused by user_from_uid() and group_from_gid()millert@openbsd.org2018-09-141-2/+2
* allow SIGUSR1 as synonym for SIGINFODamien Miller2018-09-142-6/+5
* add compat headerDamien Miller2018-09-131-0/+2
* upstream: missed a bit of openssl-1.0.x API in this unittestdjm@openbsd.org2018-09-134-65/+96
* upstream: use only openssl-1.1.x API here toodjm@openbsd.org2018-09-131-38/+67
* adapt -portable to OpenSSL 1.1x APIDamien Miller2018-09-1320-41/+916
* forgot to stage these test files in commit d70d061Damien Miller2018-09-132-2/+32
* upstream: hold our collective noses and use the openssl-1.1.x API indjm@openbsd.org2018-09-1320-438/+619
* upstream: Include certs with multiple RSA signature variants indjm@openbsd.org2018-09-126-0/+34
* upstream: test revocation by explicit hash and by fingerprintdjm@openbsd.org2018-09-121-15/+34
* upstream: s/sshkey_demote/sshkey_from_private/gdjm@openbsd.org2018-09-121-5/+5
* delete the correct thing; kexfuzz binaryDamien Miller2018-09-121-1/+1
* upstream: fix edit mistake; spotted by jmc@djm@openbsd.org2018-09-121-2/+2
* upstream: add SSH_ALLOWED_CA_SIGALGS - the default list ofdjm@openbsd.org2018-09-121-1/+13
* upstream: add sshkey_check_cert_sigtype() that checks adjm@openbsd.org2018-09-122-2/+24
* upstream: add cert->signature_type field and keep it in sync withdjm@openbsd.org2018-09-122-27/+69
* upstream: Add "ssh -Q sig" to allow listing supported signaturedjm@openbsd.org2018-09-122-6/+19
* upstream: allow key revocation by SHA256 hash and allow ssh-keygendjm@openbsd.org2018-09-125-49/+193
* upstream: log certificate fingerprint in authenticationdjm@openbsd.org2018-09-121-9/+13