summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* upstream: Remove compat code for OpenSSL 1.0.*dtucker@openbsd.org2023-03-281-9/+0
* Prevent conflicts between Solaris SHA2 and OpenSSL.Darren Tucker2023-03-281-1/+23
* Remove HEADER_SHA_H from previous...Darren Tucker2023-03-281-1/+0
* Replace OPENSSL_NO_SHA with HEADER_SHA_H.Darren Tucker2023-03-281-1/+1
* Configure with --target instead of deprecated form.Darren Tucker2023-03-281-1/+1
* Pass rpath when building 64bit Solaris.Darren Tucker2023-03-271-1/+1
* Explicitly disable OpenSSL on AIX test VM.Darren Tucker2023-03-271-0/+1
* upstream: Add RevokedHostKeys to percent expansion test.dtucker@openbsd.org2023-03-271-2/+3
* upstream: Add tilde and environment variable expansion todtucker@openbsd.org2023-03-272-3/+20
* upstream: fix test: getnameinfo returns a non-zero value on error, notdjm@openbsd.org2023-03-271-2/+2
* upstream: scp: when copying local->remote, check that source filedjm@openbsd.org2023-03-271-1/+7
* Also look for gdb error message from OpenIndiana.Darren Tucker2023-03-271-1/+1
* Explicitly disable security key test on aix51 VM.Darren Tucker2023-03-271-0/+1
* Split libcrypto and other config flags.Darren Tucker2023-03-261-3/+6
* Specify test target if we build without OpenSSL.Darren Tucker2023-03-261-0/+3
* Find suitable OpenSSL version.Darren Tucker2023-03-261-3/+12
* Github testing support for BoringSSLDamien Miller2023-03-243-0/+18
* BoringSSL doesn't support EC_POINT_point2bn()Damien Miller2023-03-241-0/+2
* another ERR_load_CRYPTO_strings() vestigeDamien Miller2023-03-241-1/+1
* don't use obsolete ERR_load_CRYPTO_strings()Damien Miller2023-03-241-1/+1
* Allow building with BoringSSLDamien Miller2023-03-242-0/+15
* put back SSLeay_version compat in configure testDamien Miller2023-03-241-1/+10
* remove support for old libcryptoDamien Miller2023-03-246-780/+40
* Test latest OpenSSL 1.1, 3.0 and LibreSSL 3.7.Darren Tucker2023-03-191-3/+3
* Show 9.3 branch instead of 9.2.Darren Tucker2023-03-161-3/+3
* dependV_9_3_P1V_9_3Damien Miller2023-03-161-26/+25
* crank versionDamien Miller2023-03-163-3/+4
* upstream: openssh-9.3djm@openbsd.org2023-03-161-2/+2
* upstream: Free KRL ptr in addition to its contents.dtucker@openbsd.org2023-03-141-1/+2
* upstream: Check pointer for NULL before deref.dtucker@openbsd.org2023-03-141-1/+3
* upstream: Limit number of entries in SSH2_MSG_EXT_INFOdtucker@openbsd.org2023-03-121-1/+6
* upstream: calloc can return NULL but xcalloc can't.dtucker@openbsd.org2023-03-121-2/+2
* upstream: Explicitly ignore return from fcntldtucker@openbsd.org2023-03-121-2/+2
* bounds checking for getrrsetbyname() replacement;Damien Miller2023-03-101-8/+39
* upstream: Plug mem leak on error path. Coverity CID 405026, ok djm@.dtucker@openbsd.org2023-03-101-1/+2
* Add prototypes for mkstemp replacements.Darren Tucker2023-03-102-0/+2
* upstream: Expliticly ignore return code from fcntl(.. FD_CLOEXEC) sincedtucker@openbsd.org2023-03-101-4/+4
* upstream: Like sshd_config, some ssh_config options are notdjm@openbsd.org2023-03-101-3/+3
* upstream: Remove no-op (int) > INT_MAX checksdtucker@openbsd.org2023-03-101-5/+3
* Wrap mkstemp calls with umask set/restore.Darren Tucker2023-03-102-0/+24
* upstream: modify parentheses in conditionals to make it clearer what isjcs@openbsd.org2023-03-103-8/+8
* upstream: Re-split the merge of the reorder-hostkeys test.dtucker@openbsd.org2023-03-091-10/+13
* upstream: include destination constraints for smartcard keys too.djm@openbsd.org2023-03-091-2/+2
* Limit the number of PAM environment variables.Darren Tucker2023-03-091-0/+4
* Limit the number of PAM environment variables.Darren Tucker2023-03-091-5/+10
* upstream: Plug mem leak. Coverity CID 405196, ok djm@dtucker@openbsd.org2023-03-081-2/+4
* upstream: ssh-pkcs11: synchronize error messages with errorstb@openbsd.org2023-03-081-4/+4
* upstream: Delete obsolete /* ARGSUSED */ lint comments.guenther@openbsd.org2023-03-0813-51/+13
* Extra brackets to prevent warning.Darren Tucker2023-03-081-1/+1
* upstream: use RSA/SHA256 when testing usability of private key indjm@openbsd.org2023-03-081-3/+6