summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* upstream: sftp client library support fordjm@openbsd.org2022-09-192-11/+140
* upstream: extend sftp-common.c:extend ls_file() to support supplieddjm@openbsd.org2022-09-194-14/+20
* upstream: sftp-server(8): add a "users-groups-by-id@openssh.com"djm@openbsd.org2022-09-192-2/+103
* upstream: better debugging for connect_next()djm@openbsd.org2022-09-191-7/+8
* upstream: Add RequiredRSASize for sshd(8); RSA keys that falldjm@openbsd.org2022-09-176-7/+46
* upstream: add a RequiredRSASize for checking RSA key length indjm@openbsd.org2022-09-176-17/+67
* upstream: Add a sshkey_check_rsa_length() call for checking thedjm@openbsd.org2022-09-172-11/+18
* upstream: actually hook up restrict_websafe; the command-line flagdjm@openbsd.org2022-09-171-2/+3
* upstream: correct error valuedjm@openbsd.org2022-09-171-2/+2
* upstream: sftp: Be a bit more clever about completionsdjm@openbsd.org2022-09-161-46/+69
* upstream: sftp: Don't attempt to complete arguments fordjm@openbsd.org2022-09-161-2/+2
* upstream: sk_enroll: never drop SSH_SK_USER_VERIFICATION_REQD flagdjm@openbsd.org2022-09-141-9/+1
* upstream: a little extra debuggingdjm@openbsd.org2022-09-141-1/+2
* upstream: ssh-agent: attempt FIDO key signing without PIN and usedjm@openbsd.org2022-09-141-11/+2
* upstream: .Li -> .Vt where appropriate; from josiah frentsos,jmc@openbsd.org2022-09-141-3/+3
* upstream: fix repeated words ok miod@ jmc@jsg@openbsd.org2022-09-141-3/+3
* upstream: notifier_complete(NULL, ...) is a noop, so no need to testdjm@openbsd.org2022-09-091-5/+3
* openbsd-compat/bsd-asprintf: add <stdio.h> include for vsnprintfSam James2022-09-081-0/+1
* Remove DEF_WEAK, it's already in defines.h.Darren Tucker2022-09-021-2/+0
* Resync arc4random with OpenBSD.Darren Tucker2022-09-023-108/+175
* Move OPENBSD ORIGINAL marker.Darren Tucker2022-09-021-2/+2
* Remove arc4random_uniform from arc4random.cDarren Tucker2022-09-021-38/+0
* upstream: sk-usbhid: fix key_lookup() on tokens with built-in UVdjm@openbsd.org2022-09-021-2/+11
* Move sftp from valgrind-2 to 3 to rebalance.Darren Tucker2022-08-311-2/+2
* upstream: whitespacedjm@openbsd.org2022-08-311-2/+2
* additional keysDamien Miller2022-08-292-13/+16
* cross-sign allowed_signers with PGP keyDamien Miller2022-08-291-0/+16
* Add libcrypt-devel to cygwin-release deps.Darren Tucker2022-08-271-1/+1
* Add Windows 2022 test targets.Darren Tucker2022-08-271-3/+4
* Add cygwin-release test target.Darren Tucker2022-08-263-13/+37
* upstream: whitespacedjm@openbsd.org2022-08-261-2/+2
* upstream: whitespacedjm@openbsd.org2022-08-261-4/+4
* initial list of allowed signersDamien Miller2022-08-261-0/+2
* Install Cygwin packages based on OS not config.Darren Tucker2022-08-191-2/+2
* upstream: attemp FIDO key signing without PIN and use the errordjm@openbsd.org2022-08-191-22/+20
* upstream: remove incorrect check that can break enrolling adjm@openbsd.org2022-08-191-5/+1
* upstream: Strictly enforce the maximum allowed SSH2 banner size indtucker@openbsd.org2022-08-191-1/+15
* Fix cygwin conditional steps.Darren Tucker2022-08-191-2/+2
* Add a bit more debug output.Darren Tucker2022-08-191-0/+2
* Add Cygwin (on windows-2019) test target.Darren Tucker2022-08-193-7/+25
* upstream: double free() in error path; from Eusgor via GHPR333djm@openbsd.org2022-08-191-3/+4
* Check for perms to run agent-getpeereid test.Darren Tucker2022-08-181-1/+11
* on Cygwin, prefer WinHello FIDO deviceDamien Miller2022-08-171-0/+4
* upstream: add an extra flag to sk_probe() to indicate whether we'redjm@openbsd.org2022-08-171-6/+6
* upstream: use .Cm for "sign"; from josiah frentsosjmc@openbsd.org2022-08-171-3/+3
* Revert "check_sk_options: add temporary WinHello workaround"Corinna Vinschen2022-08-121-9/+0
* fido_dev_is_winhello: return 0, not "false"Corinna Vinschen2022-08-121-1/+1
* upstream: sftp-server: support home-directory requestdjm@openbsd.org2022-08-122-2/+51
* Replace deprecated ubuntu-18.04 runners with 22.04Darren Tucker2022-08-121-9/+9
* Add a timegm implementation from Heimdal via Samba.Darren Tucker2022-08-115-0/+89