summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* Include time.h when defining timegm.Darren Tucker2022-11-031-0/+1
* Always use compat getentropy.Darren Tucker2022-11-023-12/+11
* Check for sockaddr_in.sin_len.Darren Tucker2022-11-021-0/+10
* upstream: Use variable for diff optionsdtucker@openbsd.org2022-11-011-10/+9
* OpenSSL dev branch is 302 not 320.Darren Tucker2022-10-311-1/+1
* upstream: put sshkey_check_rsa_length() back in sshkey.c to unbreakdjm@openbsd.org2022-10-282-22/+21
* upstream: allow ssh-keyscan(1) to accept CIDR address ranges, e.g.djm@openbsd.org2022-10-284-8/+136
* fix merge botchDamien Miller2022-10-281-1/+0
* upstream: refactor sshkey_private_deserializedjm@openbsd.org2022-10-289-280/+259
* upstream: refactor sshkey_private_serialize_opt()djm@openbsd.org2022-10-2810-178/+171
* upstream: refactor certifydjm@openbsd.org2022-10-281-93/+33
* upstream: refactor sshkey_sign() and sshkey_verify()djm@openbsd.org2022-10-289-209/+158
* upstream: refactor sshkey_from_blob_internal()djm@openbsd.org2022-10-289-262/+271
* upstream: refactor sshkey_from_private()djm@openbsd.org2022-10-289-133/+166
* upstream: factor out key generationdjm@openbsd.org2022-10-2811-138/+108
* upstream: refactor and simplify sshkey_read()djm@openbsd.org2022-10-281-122/+24
* upstream: factor out public key serializationdjm@openbsd.org2022-10-289-101/+166
* upstream: factor out sshkey_equal_public()djm@openbsd.org2022-10-289-96/+171
* upstream: begin big refactor of sshkeydjm@openbsd.org2022-10-289-272/+640
* upstream: Be more paranoid with host/domain names coming from thedjm@openbsd.org2022-10-252-4/+15
* upstream: regress test for unmatched glob characters; fails beforedjm@openbsd.org2022-10-251-3/+29
* upstream: when scp(1) is using the SFTP protocol for transport (thedjm@openbsd.org2022-10-252-6/+67
* upstream: use correct type with sizeof ok djm@jsg@openbsd.org2022-10-251-2/+2
* upstream: ssh-agent.1: - use Nm not Xr for self-ref - while here,jmc@openbsd.org2022-10-252-8/+8
* upstream: document "-O no-restrict-websafe"; spotted by Ross Ldjm@openbsd.org2022-10-251-2/+25
* OpenSSL dev branch now identifies as 3.2.0.Darren Tucker2022-10-181-1/+1
* revert c64b62338b4 and guard POLL* defines insteadDamien Miller2022-10-171-8/+21
* undef _get{short,long} before redefiningDamien Miller2022-10-141-3/+9
* Fix snprintf configure test for clang 15Harmen Stoppels2022-10-141-3/+3
* skip bsd-poll.h if poll.h found; ok dtuckerDamien Miller2022-10-101-2/+2
* upstream: honour user's umask if it is more restrictive then the sshdjm@openbsd.org2022-10-071-2/+2
* Add LibreSSL 3.6.0 to test suite.Darren Tucker2022-10-071-1/+2
* Add 9.1 branch to CI status page.Darren Tucker2022-10-061-0/+4
* Test commits to all branches of portable.Darren Tucker2022-10-053-4/+1
* whitespace at EOLDamien Miller2022-10-051-26/+26
* mention libfido2 autodetectionDamien Miller2022-10-051-1/+1
* remove mention of --with-security-key-builtinDamien Miller2022-10-051-1/+0
* update .dependV_9_1_P1Damien Miller2022-10-041-1/+3
* update release notes URLDamien Miller2022-10-041-1/+1
* crank versions in RPM spec filesDamien Miller2022-10-042-2/+2
* upstream: openssh-9.1djm@openbsd.org2022-09-271-2/+2
* upstream: Fix typo. From AlexanderStohr via github PR#343.dtucker@openbsd.org2022-09-271-2/+2
* upstream: add RequiredRSASize to the list of keywords accepted bydjm@openbsd.org2022-09-272-4/+6
* no need for glob.h hereDamien Miller2022-09-191-1/+0
* avoid Wuninitialized false positive in gcc-12ishDamien Miller2022-09-191-1/+1
* upstream: use users-groups-by-id@openssh.com sftp-server extensiondjm@openbsd.org2022-09-194-5/+278
* upstream: sftp client library support fordjm@openbsd.org2022-09-192-11/+140
* upstream: extend sftp-common.c:extend ls_file() to support supplieddjm@openbsd.org2022-09-194-14/+20
* upstream: sftp-server(8): add a "users-groups-by-id@openssh.com"djm@openbsd.org2022-09-192-2/+103
* upstream: better debugging for connect_next()djm@openbsd.org2022-09-191-7/+8