Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-11-01 | Add missing bracket in realpath macro. | Darren Tucker | |
2019-11-01 | Import fnmatch.c from OpenBSD. | Darren Tucker | |
2019-11-01 | Use sftp_realpath if no native realpath. | Darren Tucker | |
2019-11-01 | Configure flags for haiku from haikuports. | Darren Tucker | |
Should build with the default flags with ./configure | |||
2019-11-01 | upstream: fix a race condition in the SIGCHILD handler that could turn | djm@openbsd.org | |
in to a kill(-1); bz3084, reported by Gao Rui, ok dtucker@ OpenBSD-Commit-ID: ac2742e04a69d4c34223505b6a32f6d686e18896 | |||
2019-11-01 | conditionalise SK sign/verify on ENABLE_SK | Damien Miller | |
Spotted by Darren and his faux-Vax | |||
2019-11-01 | Add prototype for localtime_r if needed. | Darren Tucker | |
2019-11-01 | Check if IP_TOS is defined before using. | Darren Tucker | |
2019-11-01 | autoconf pieces for U2F support | Damien Miller | |
Mostly following existing logic for PKCS#11 - turning off support when either libcrypto or dlopen(3) are unavailable. | |||
2019-11-01 | upstream: remove duplicate PUBKEY_DEFAULT_PK_ALG on !WITH_OPENSSL path | djm@openbsd.org | |
OpenBSD-Commit-ID: 95a7cafad2a4665d57cabacc28031fabc0bea9fc | |||
2019-11-01 | upstream: more additional source files | djm@openbsd.org | |
OpenBSD-Regress-ID: 8eaa25fb901594aee23b76eda99dca5b8db94c6f | |||
2019-11-01 | upstream: additional source files here too | djm@openbsd.org | |
OpenBSD-Regress-ID: 8809f8e1c8f7459e7096ab6b58d8e56cb2f483fd | |||
2019-11-01 | upstream: additional source files here too | djm@openbsd.org | |
OpenBSD-Regress-ID: 09297e484327f911fd353489518cceaa0c1b95ce | |||
2019-11-01 | upstream: adapt to extra sshkey_sign() argument and additional | djm@openbsd.org | |
dependencies OpenBSD-Regress-ID: 7a25604968486c4d6f81d06e8fbc7d17519de50e | |||
2019-11-01 | upstream: skip security-key key types for tests until we have a | djm@openbsd.org | |
dummy U2F middleware to use. OpenBSD-Regress-ID: 37200462b44334a4ad45e6a1f7ad1bd717521a95 | |||
2019-11-01 | upstream: sort; | jmc@openbsd.org | |
OpenBSD-Commit-ID: 8264b0be01ec5a60602bd50fd49cc3c81162ea16 | |||
2019-11-01 | upstream: undo debugging bits that shouldn't have been committed | djm@openbsd.org | |
OpenBSD-Commit-ID: 4bd5551b306df55379afe17d841207990eb773bf | |||
2019-11-01 | depend | Damien Miller | |
2019-11-01 | upstream: fix -Wshadow warning | djm@openbsd.org | |
OpenBSD-Commit-ID: 3441eb04f872a00c2483c11a5f1570dfe775103c | |||
2019-11-01 | upstream: Refactor signing - use sshkey_sign for everything, | djm@openbsd.org | |
including the new U2F signatures. Don't use sshsk_ecdsa_sign() directly, instead make it reachable via sshkey_sign() like all other signature operations. This means that we need to add a provider argument to sshkey_sign(), so most of this change is mechanically adding that. Suggested by / ok markus@ OpenBSD-Commit-ID: d5193a03fcfa895085d91b2b83d984a9fde76c8c | |||
2019-11-01 | upstream: ssh-agent support for U2F/FIDO keys | djm@openbsd.org | |
feedback & ok markus@ OpenBSD-Commit-ID: bb544a44bc32e45d2ec8bf652db2046f38360acb | |||
2019-11-01 | upstream: ssh AddKeysToAgent support for U2F/FIDO keys | djm@openbsd.org | |
feedback & ok markus@ OpenBSD-Commit-ID: ac08e45c7f995fa71f8d661b3f582e38cc0a2f91 | |||
2019-11-01 | upstream: ssh-add support for U2F/FIDO keys | djm@openbsd.org | |
OpenBSD-Commit-ID: 7f88a5181c982687afedf3130c6ab2bba60f7644 | |||
2019-11-01 | upstream: add new agent key constraint for U2F/FIDO provider | djm@openbsd.org | |
feedback & ok markus@ OpenBSD-Commit-ID: d880c380170704280b4003860a1744d286c7a172 | |||
2019-11-01 | upstream: ssh client support for U2F/FIDO keys | djm@openbsd.org | |
OpenBSD-Commit-ID: eb2cfa6cf7419a1895e06e398ea6d41516c5b0bc | |||
2019-11-01 | upstream: Separate myproposal.h userauth pubkey types | djm@openbsd.org | |
U2F/FIDO keys are not supported for host authentication, so we need a separate list for user keys. feedback & ok markus@ OpenBSD-Commit-ID: 7fe2e6ab85f9f2338866e5af8ca2d312abbf0429 | |||
2019-11-01 | upstream: ssh-keygen support for generating U2F/FIDO keys | djm@openbsd.org | |
OpenBSD-Commit-ID: 6ce04f2b497ac9dd8c327f76f1e6c724fb1d1b37 | |||
2019-11-01 | upstream: U2F/FIDO middleware interface | djm@openbsd.org | |
Supports enrolling (generating) keys and signatures. feedback & ok markus@ OpenBSD-Commit-ID: 73d1dd5939454f9c7bd840f48236cba41e8ad592 | |||
2019-11-01 | upstream: Initial infrastructure for U2F/FIDO support | djm@openbsd.org | |
Key library support: including allocation, marshalling public/private keys and certificates, signature validation. feedback & ok markus@ OpenBSD-Commit-ID: a17615ba15e0f7932ac4360cb18fc9a9544e68c7 | |||
2019-11-01 | upstream: Protocol documentation for U2F/FIDO keys in OpenSSH | djm@openbsd.org | |
OpenBSD-Commit-ID: 8f3247317c2909870593aeb306dff848bc427915 | |||
2019-11-01 | Missing unit test files | Damien Miller | |
2019-10-29 | Add implementation of localtime_r. | Darren Tucker | |
2019-10-29 | upstream: Signal handler cleanup: remove leftover support for | dtucker@openbsd.org | |
unreliable signals and now-unneeded save and restore of errno. ok deraadt@ markus@ OpenBSD-Commit-ID: 01dd8a1ebdd991c8629ba1f5237283341a93cd88 | |||
2019-10-29 | upstream: fixes from lucas; | jmc@openbsd.org | |
OpenBSD-Commit-ID: 4c4bfd2806c5bbc753788ffe19c5ee13aaf418b2 | |||
2019-10-29 | upstream: Import regenerated moduli file. | dtucker@openbsd.org | |
OpenBSD-Commit-ID: 58ec755be4e51978ecfee73539090eb68652a987 | |||
2019-10-28 | Fix ifdefs to not mask needed bits. | Darren Tucker | |
2019-10-28 | Only use RLIMIT_NOFILE if it's defined. | Darren Tucker | |
2019-10-28 | Make sure we have struct statfs before using. | Darren Tucker | |
2019-10-28 | Define UINT32_MAX if needed. | Darren Tucker | |
2019-10-28 | Move utimensat definition into timespec section. | Darren Tucker | |
Since utimensat uses struct timespec, move it to the section where we define struct timespec when needed. | |||
2019-10-28 | Wrap OpenSSL bits in WITH_OPENSSL. | Darren Tucker | |
2019-10-28 | Wrap poll.h includes in HAVE_POLL_H. | Darren Tucker | |
2019-10-24 | Add a function call stackprotector tests. | Darren Tucker | |
Including a function call in the test programs for the gcc stack protector flag tests exercises more of the compiler and makes it more likely it'll detect problems. | |||
2019-10-22 | Import regenerated moduli file. | Darren Tucker | |
2019-10-16 | upstream: potential NULL dereference for revoked hostkeys; reported | djm@openbsd.org | |
by krishnaiah bommu OpenBSD-Commit-ID: 35ff685e7cc9dd2e3fe2e3dfcdcb9bc5c79f6506 | |||
2019-10-16 | upstream: free buf before return; reported by krishnaiah bommu | djm@openbsd.org | |
OpenBSD-Commit-ID: 091bb23a6e913af5d4f72c50030b53ce1cef4de1 | |||
2019-10-14 | upstream: memleak in error path; spotted by oss-fuzz, ok markus@ | djm@openbsd.org | |
OpenBSD-Commit-ID: d6ed260cbbc297ab157ad63931802fb1ef7a4266 | |||
2019-10-11 | Re-add SA_RESTART to mysignal. | Darren Tucker | |
This makes mysignal implement reliable BSD semantics according to Stevens' APUE. This was first attempted in 2001 but was reverted due to problems with HP-UX 10.20 and select() and possibly grantpt(). Modern systems should be fine with it, but if any current platforms have a problem with it now we can disable it just for those. ok djm@ | |||
2019-10-10 | Fix ifdef typo for declaration of memmem. | Darren Tucker | |
Fixes build on IRIX. bz#3081. | |||
2019-10-09 | Update README.md | Abhishek Arya | |