History log of /openssh-portable/ (Results 151 - 175 of 10531)
Revision (<<< Hide revision tags) (Show revision tags >>>)Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
31c39e7806-Mar-2020 markus@openbsd.org

upstream: principalsp is optional, pubkey required; ok djm

OpenBSD-Commit-ID: 2cc3ea5018c28ed97edaccd7f17d2cc796f01024

e26a317506-Mar-2020 markus@openbsd.org

upstream: remove unused variables in ssh-pkcs11-helper; ok djm

OpenBSD-Commit-ID: 13e572846d0d1b28f1251ddd2165e9cf18135ae1

1b378c0d06-Mar-2020 markus@openbsd.org

upstream: return correct error in sshsk_ed25519_sig; ok djm

OpenBSD-Commit-ID: 52bf733df220303c260fee4f165ec64b4a977625

fbff605e06-Mar-2020 markus@openbsd.org

upstream: fix possible null-deref in check_key_not_revoked; ok

djm

OpenBSD-Commit-ID: 80855e9d7af42bb6fcc16c074ba69876bfe5e3bf

bc30b44606-Mar-2020 markus@openbsd.org

upstream: ssh_fetch_identitylist() returns the return value from

ssh_request_reply() so we should also check against != 0 ok djm

OpenBSD-Commit-ID: 28d0028769d03e665688c61bb5fd943e1

upstream: ssh_fetch_identitylist() returns the return value from

ssh_request_reply() so we should also check against != 0 ok djm

OpenBSD-Commit-ID: 28d0028769d03e665688c61bb5fd943e18614952

show more ...

7b4f70dd06-Mar-2020 markus@openbsd.org

upstream: sshkey_cert_check_authority requires reason to be set;

ok djm

OpenBSD-Commit-ID: 6f7a6f19540ed5749763c2f9530c0897c94aa552

05efe27006-Mar-2020 markus@openbsd.org

upstream: passphrase depends on kdfname, not ciphername (possible

null-deref); ok djm

OpenBSD-Commit-ID: 0d39668edf5e790b5837df4926ee1141cec5471c

1ddf568206-Mar-2020 markus@openbsd.org

upstream: consistently check packet_timeout_ms against 0; ok djm

OpenBSD-Commit-ID: e8fb8cb2c96c980f075069302534eaf830929928

31f1ee5406-Mar-2020 markus@openbsd.org

upstream: initialize cname in case ai_canonname is NULL or too

long; ok djm

OpenBSD-Commit-ID: c27984636fdb1035d1642283664193e91aab6e37

a6134b0206-Mar-2020 markus@openbsd.org

upstream: fix uninitialized pointers for forward_cancel; ok djm

OpenBSD-Commit-ID: 612778e6d87ee865d0ba97d0a335f141cee1aa37

16d4f99606-Mar-2020 markus@openbsd.org

upstream: exit on parse failures in input_service_request; ok djm

OpenBSD-Commit-ID: 6a7e1bfded26051d5aa893c030229b1ee6a0d5d2

5f25afe506-Mar-2020 markus@openbsd.org

upstream: fix null-deref on calloc failure; ok djm

OpenBSD-Commit-ID: a313519579b392076b7831ec022dfdefbec8724a

ff2acca006-Mar-2020 markus@openbsd.org

upstream: exit if ssh_krl_revoke_key_sha256 fails; ok djm

OpenBSD-Commit-ID: 0864ad4fe8bf28ab21fd1df766e0365c11bbc0dc

31c860a006-Mar-2020 markus@openbsd.org

upstream: pkcs11_register_provider: return < 0 on error; ok djm

OpenBSD-Commit-ID: cfc8321315b787e4d40da4bdb2cbabd4154b0d97

15be29e106-Mar-2020 markus@openbsd.org

upstream: sshsig: return correct error, fix null-deref; ok djm

OpenBSD-Commit-ID: 1d1af7cd538b8b23e621cf7ab84f11e7a923edcd

6fb6f18606-Mar-2020 markus@openbsd.org

upstream: vasnmprintf allocates str and returns -1; ok djm

OpenBSD-Commit-ID: dae4c9e83d88471bf3b3f89e3da7a107b44df11c

714e1cbc06-Mar-2020 markus@openbsd.org

upstream: sshpkt_fatal() does not return; ok djm

OpenBSD-Commit-ID: 7dfe847e28bd78208eb227b37f29f4a2a0929929

9b47bd7b27-Feb-2020 djm@openbsd.org

upstream: no-touch-required certificate option should be an

extension, not a critical option.

OpenBSD-Commit-ID: 626b22c5feb7be8a645e4b9a9bef89893b88600d

dd99252027-Feb-2020 djm@openbsd.org

upstream: better error message when trying to use a FIDO key

function and SecurityKeyProvider is empty

OpenBSD-Commit-ID: e56602c2ee8c82f835d30e4dc8ee2e4a7896be24

b81e66db26-Feb-2020 dtucker@openbsd.org

upstream: Drop leading space from line count that was confusing

ssh-keygen's screen mode.

OpenBSD-Commit-ID: 3bcae7a754db3fc5ad3cab63dd46774edb35b8ae

d5ba1c0326-Feb-2020 jsg@openbsd.org

upstream: change explicit_bzero();free() to freezero()

While freezero() returns early if the pointer is NULL the tests for
NULL in callers are left to avoid warnings about passing an

upstream: change explicit_bzero();free() to freezero()

While freezero() returns early if the pointer is NULL the tests for
NULL in callers are left to avoid warnings about passing an
uninitialised size argument across a function boundry.

ok deraadt@ djm@

OpenBSD-Commit-ID: 2660fa334fcc7cd05ec74dd99cb036f9ade6384a

show more ...

9e3220b526-Feb-2020 dtucker@openbsd.org

upstream: Have sftp reject "-1" in the same way as ssh(1) and

scp(1) do instead of accepting and silently ignoring it since protocol 1
support has been removed. Spotted by shivakumar269

upstream: Have sftp reject "-1" in the same way as ssh(1) and

scp(1) do instead of accepting and silently ignoring it since protocol 1
support has been removed. Spotted by shivakumar2696 at gmail.com, ok
deraadt@

OpenBSD-Commit-ID: b79f95559a1c993214f4ec9ae3c34caa87e9d5de

show more ...

ade8e67b25-Feb-2020 dtucker@openbsd.org

upstream: Remove obsolete XXX comment. ok deraadt@

OpenBSD-Commit-ID: bc462cc843947feea26a2e21c750b3a7469ff01b

7eb903f523-Feb-2020 dtucker@openbsd.org

upstream: Fix typo. Patch from itoama at live.jp via github PR#173.

OpenBSD-Commit-ID: 5cdaafab38bbdea0d07e24777d00bfe6f972568a

b2491c2812-Oct-2019 Nico Kadel-Garcia

Switch %define to %global for redhat/openssh.spec

12345678910>>...422