Commit History

Autor SHA1 Mensaxe Data
  Jeff Johnson 43d66bd67e Round 1 of fixes and integrration of backports. %!s(int64=3) %!d(string=hai) anos
  Jeff Johnson 1643e89a1c multi: Port upstream patches: 1/27/21 -> 2/4/21. %!s(int64=3) %!d(string=hai) anos
  Jeff Johnson b41f7de459 multi: Backport upstream 1/23/21 through 1/26/21 %!s(int64=3) %!d(string=hai) anos
  Jeff Johnson 27cb5b64c8 multi: Backport upstream 1/18/21 through 1/22/21 %!s(int64=3) %!d(string=hai) anos
  Jeff Johnson ae5334256a Backport a34e14a5a0071de2036826a00197ce38c8b4ba8b %!s(int64=3) %!d(string=hai) anos
  Jeff Johnson ed54c058d3 Backport 0ebead6593e2441e4af2735bbe2cd097607cd0d3 %!s(int64=3) %!d(string=hai) anos
  Jeff Johnson 4745c0fbd8 Initial porting of IBM and Red Hat modifications. %!s(int64=3) %!d(string=hai) anos
  djm@openbsd.org 801c9f095e upstream: support for requiring user verified FIDO keys in sshd %!s(int64=4) %!d(string=hai) anos
  naddy@openbsd.org a47f6a6c0e upstream: Replace "security key" with "authenticator" in program %!s(int64=4) %!d(string=hai) anos
  dtucker@openbsd.org 3bf2a6ac79 upstream: Replace all calls to signal(2) with a wrapper around %!s(int64=4) %!d(string=hai) anos
  djm@openbsd.org 2e71263b80 upstream: add a "no-touch-required" option for authorized_keys and %!s(int64=5) %!d(string=hai) anos
  djm@openbsd.org 0fddf2967a upstream: Add a sshd_config PubkeyAuthOptions directive %!s(int64=5) %!d(string=hai) anos
  djm@openbsd.org b7e74ea072 upstream: Add new structure for signature options %!s(int64=5) %!d(string=hai) anos
  djm@openbsd.org be02d7cbde upstream: lots of things were relying on libcrypto headers to %!s(int64=5) %!d(string=hai) anos
  djm@openbsd.org dd8002fbe6 upstream: move advance_past_options to authfile.c and make it %!s(int64=5) %!d(string=hai) anos
  djm@openbsd.org c72d78ccbe upstream: move skip_space() to misc.c and make it public; ok %!s(int64=5) %!d(string=hai) anos
  djm@openbsd.org 16dd8b2c78 upstream: remove mostly vestigal uuencode.[ch]; moving the only unique %!s(int64=5) %!d(string=hai) anos
  djm@openbsd.org 4cd6b12cc9 upstream: print the correct AuthorizedPrincipalsCommand rather than %!s(int64=5) %!d(string=hai) anos
  djm@openbsd.org c95b90d401 upstream: for public key authentication, check AuthorizedKeysFiles %!s(int64=5) %!d(string=hai) anos
  djm@openbsd.org 3061529560 upstream: embiggen format buffer size for certificate serial number so %!s(int64=5) %!d(string=hai) anos
  djm@openbsd.org ff5d2cf4ca upstream: print the full pubkey being attempted at loglevel >= %!s(int64=6) %!d(string=hai) anos
  djm@openbsd.org 86e5737c39 upstream: Add sshd_config CASignatureAlgorithms option to allow %!s(int64=6) %!d(string=hai) anos
  mestre@openbsd.org db8bb80e3a upstream: fix misplaced parenthesis inside if-clause. it's harmless %!s(int64=6) %!d(string=hai) anos
  djm@openbsd.org 7fef173c28 upstream: memleak introduced in r1.83; from Colin Watson %!s(int64=6) %!d(string=hai) anos
  djm@openbsd.org 74287f5df9 upstream: delay bailout for invalid authentic %!s(int64=6) %!d(string=hai) anos
  markus@openbsd.org 394a842e60 upstream: treat ssh_packet_write_wait() errors as fatal; ok djm@ %!s(int64=6) %!d(string=hai) anos
  markus@openbsd.org c7d39ac8dc upstream: sshd: switch authentication to sshbuf API; ok djm@ %!s(int64=6) %!d(string=hai) anos
  djm@openbsd.org 4ba0d54794 upstream: Improve strictness and control over RSA-SHA2 signature %!s(int64=6) %!d(string=hai) anos
  markus@openbsd.org 7f90635216 upstream: switch config file parsing to getline(3) as this avoids %!s(int64=6) %!d(string=hai) anos
  djm@openbsd.org 9c935dd9bf upstream: make UID available as a %-expansion everywhere that the %!s(int64=6) %!d(string=hai) anos