summaryrefslogtreecommitdiff
AgeCommit message (Expand)Author
2019-11-15Add wrappers for other ultrix headers.Darren Tucker
2019-11-15Add SSIZE_MAX when we define ssize_t.Darren Tucker
2019-11-15Remove ultrix realpath hack.Darren Tucker
2019-11-15upstream: unshield security key privkey before attempting signaturedjm@openbsd.org
2019-11-15upstream: rewrite c99-ismderaadt@openbsd.org
2019-11-15upstream: only clang understands those new -W optionsderaadt@openbsd.org
2019-11-15configure flag to built-in security key supportDamien Miller
2019-11-15upstream commitDamien Miller
2019-11-15upstream commitDamien Miller
2019-11-15upstream commitDamien Miller
2019-11-15upstream commitDamien Miller
2019-11-15upstream commitDamien Miller
2019-11-15upstream commitDamien Miller
2019-11-15upstream commitDamien Miller
2019-11-15upstream: don't consult dlopen whitelist for internal security keydjm@openbsd.org
2019-11-15upstream commitDamien Miller
2019-11-15upstream commitDamien Miller
2019-11-15upstream: U2F tokens may return FIDO_ERR_USER_PRESENCE_REQUIRED whendjm@openbsd.org
2019-11-15Add libfido2 to INSTALL.Darren Tucker
2019-11-15libcrypto is now optional.Darren Tucker
2019-11-15upstream: show the "please touch your security key" notifier whendjm@openbsd.org
2019-11-15upstream: close the "touch your security key" notifier on the errordjm@openbsd.org
2019-11-15upstream: correct function name in debug messagedjm@openbsd.org
2019-11-15upstream: follow existing askpass logic for security key notifier:djm@openbsd.org
2019-11-15upstream: remove debugging goop that snuck in to last commitdjm@openbsd.org
2019-11-15don't fatal if libfido2 not foundDamien Miller
2019-11-15correct object dependencyDamien Miller
2019-11-15upstream: directly support U2F/FIDO2 security keys in OpenSSH bydjm@openbsd.org
2019-11-15upstream: in order to be able to figure out the number ofmarkus@openbsd.org
2019-11-15upstream: fix check for sig_s; noted by qsa at qualys.commarkus@openbsd.org
2019-11-15upstream: When clients get denied by MaxStartups, send adtucker@openbsd.org
2019-11-15upstream: fix shield/unshield for xmss keys: - in ssh-agent we needmarkus@openbsd.org
2019-11-15upstream: remove size_t gl_pathc < 0 test, it is invalid. thederaadt@openbsd.org
2019-11-15upstream: stdarg.h required more broadly; ok djmderaadt@openbsd.org
2019-11-14Put sshsk_sign call inside ifdef ENABLE_SK.Darren Tucker
2019-11-13Remove duplicate __NR_clock_nanosleepDarren Tucker
2019-11-13seccomp: Allow clock_nanosleep() in sandbox.Darren Tucker
2019-11-13Include stdarg.h for va_list in xmalloc.h.Darren Tucker
2019-11-13Put headers inside ifdef _AIX.Darren Tucker
2019-11-13Fix comment in match_usergroup_pattern_list.Darren Tucker
2019-11-13upstream: allow an empty attestation certificate returned by adjm@openbsd.org
2019-11-13upstream: security keys typically need to be tapped/touched indjm@openbsd.org
2019-11-13upstream: pass SSH_ASKPASS_PROMPT hint to y/n key confirm toodjm@openbsd.org
2019-11-13upstream: dd API for performing one-shot notifications via tty ordjm@openbsd.org
2019-11-13upstream: add xvasprintf()djm@openbsd.org
2019-11-13Remove leftover if statement from sync.Darren Tucker
2019-11-13upstream: remove extra layer for ed25519 signature; ok djm@markus@openbsd.org
2019-11-13upstream: check sig_r and sig_s for ssh-sk keys; ok djmmarkus@openbsd.org
2019-11-13upstream: enable ed25519 support; ok djmmarkus@openbsd.org
2019-11-13upstream: update sk-api to version 2 for ed25519 support; ok djmmarkus@openbsd.org