summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* upstream: always print the caller's error message in ossl_error(),djm@openbsd.org2019-01-211-2/+3
* upstream: get the ex_data (pkcs11_key object) back from the keys atdjm@openbsd.org2019-01-211-9/+8
* upstream: GSSAPI code got missed when converting to new packet APIdjm@openbsd.org2019-01-211-4/+4
* Fix -Wunused when compiling PKCS#11 without ECDSADamien Miller2019-01-211-0/+2
* upstream: allow override of ssh-pkcs11-helper binary viadjm@openbsd.org2019-01-211-1/+5
* upstream: adapt agent-pkcs11.sh test to softhsm2 and add supportdjm@openbsd.org2019-01-211-23/+58
* upstream: add "extra:" target to run some extra tests that are notdjm@openbsd.org2019-01-211-2/+10
* upstream: use ECDSA_SIG_set0() instead of poking signature values intodjm@openbsd.org2019-01-211-3/+14
* remove HAVE_DLOPEN that snuck inDamien Miller2019-01-211-4/+2
* conditionalise ECDSA PKCS#11 supportDamien Miller2019-01-213-1/+20
* upstream: we use singleton pkcs#11 RSA_METHOD and EC_KEY_METHODdjm@openbsd.org2019-01-211-7/+3
* upstream: KNF previous; from markus@djm@openbsd.org2019-01-211-6/+6
* upstream: use OpenSSL's RSA reference counting hooks todjm@openbsd.org2019-01-211-35/+21
* upstream: make the PKCS#11 RSA code more like the new PKCS#11djm@openbsd.org2019-01-211-16/+29
* upstream: fix leak of ECDSA pkcs11_key objectsdjm@openbsd.org2019-01-211-2/+21
* upstream: use EVP_PKEY_get0_EC_KEY() instead of direct access ofdjm@openbsd.org2019-01-211-4/+3
* upstream: cleanup PKCS#11 ECDSA pubkey loading: the returneddjm@openbsd.org2019-01-211-10/+14
* upstream: cleanup unnecessary code in ECDSA pkcs#11 signaturedjm@openbsd.org2019-01-211-25/+16
* upstream: cleanup pkcs#11 client code: use sshkey_new in insteaddjm@openbsd.org2019-01-211-23/+42
* upstream: allow override of the pkcs#11 helper binary viadjm@openbsd.org2019-01-211-5/+7
* upstream: add support for ECDSA keys in PKCS#11 tokensdjm@openbsd.org2019-01-215-236/+1302
* upstream: add option to test whether keys in an agent are usable,djm@openbsd.org2019-01-212-6/+60
* upstream: Fix BN_is_prime_* calls in SSH, the API returns -1 ontb@openbsd.org2019-01-211-5/+14
* upstream: DH-GEX min value is now specified in RFC8270. ok djm@dtucker@openbsd.org2019-01-211-2/+2
* Check for cc before gcc.Darren Tucker2019-01-211-1/+1
* last bits of old packet API / active_state globalDamien Miller2019-01-2015-58/+18
* remove PAM dependencies on old packet APIDamien Miller2019-01-206-31/+47
* remove vestiges of old packet API from loginrec.cDamien Miller2019-01-206-11/+18
* dependDamien Miller2019-01-201-50/+49
* upstream: fix error in refactor: use ssh_packet_disconnect() instead ofdjm@openbsd.org2019-01-201-4/+6
* upstream: remove last traces of old packet API!djm@openbsd.org2019-01-204-484/+2
* upstream: remove last references to active_statedjm@openbsd.org2019-01-2015-88/+90
* upstream: convert monitor.c to new packet APIdjm@openbsd.org2019-01-205-105/+94
* upstream: convert sshd.c to new packet APIdjm@openbsd.org2019-01-201-30/+39
* upstream: convert session.c to new packet APIdjm@openbsd.org2019-01-201-64/+87
* upstream: convert auth.c to new packet APIdjm@openbsd.org2019-01-207-37/+31
* upstream: convert serverloop.c to new packet APIdjm@openbsd.org2019-01-201-152/+204
* upstream: convert the remainder of sshconnect2.c to new packetdjm@openbsd.org2019-01-201-49/+46
* upstream: convert the remainder of clientloop.c to new packet APIdjm@openbsd.org2019-01-201-35/+32
* upstream: convert auth2.c to new packet APIDamien Miller2019-01-203-53/+64
* upstream: convert servconf.c to new packet APIdjm@openbsd.org2019-01-204-14/+11
* upstream: convert channels.c to new packet APIdjm@openbsd.org2019-01-201-30/+38
* upstream: convert sshconnect.c to new packet APIdjm@openbsd.org2019-01-202-24/+2
* upstream: convert ssh.c to new packet APIdjm@openbsd.org2019-01-201-26/+41
* upstream: convert mux.c to new packet APIdjm@openbsd.org2019-01-201-6/+13
* upstream: convert sshconnect2.c to new packet APIdjm@openbsd.org2019-01-201-13/+16
* upstream: convert clientloop.c to new packet APIdjm@openbsd.org2019-01-201-121/+166
* upstream: allow sshpkt_fatal() to take a varargs format; we'lldjm@openbsd.org2019-01-204-18/+36
* upstream: begin landing remaining refactoring of packet parsingdjm@openbsd.org2019-01-2017-21/+62
* upstream: Print an \r in front of the password prompt so parts oftb@openbsd.org2019-01-201-4/+11