History log of /openssh-portable/ (Results 51 - 75 of 10531)
Revision (<<< Hide revision tags) (Show revision tags >>>)Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
c13403e504-May-2020 Darren Tucker

Skip security key tests if ENABLE_SK not set.

4da393f801-May-2020 djm@openbsd.org

upstream: sure enough, some of the test data that we though were in

new format were actually in the old format; fix from Michael Forney

OpenBSD-Regress-ID: a41a5c43a61b0f0b1691994db

upstream: sure enough, some of the test data that we though were in

new format were actually in the old format; fix from Michael Forney

OpenBSD-Regress-ID: a41a5c43a61b0f0b1691994dbf16dfb88e8af933

show more ...

15bfafc101-May-2020 djm@openbsd.org

upstream: make mktestdata.sh generate old/new format keys that we

expect. This script was written before OpenSSH switched to new-format private
keys by default and was never updated to t

upstream: make mktestdata.sh generate old/new format keys that we

expect. This script was written before OpenSSH switched to new-format private
keys by default and was never updated to the change (until now) From Michael
Forney

OpenBSD-Regress-ID: 38cf354715c96852e5b71c2393fb6e7ad28b7ca7

show more ...

7882d2ed30-Apr-2020 djm@openbsd.org

upstream: portability fix for sed that always emil a newline even

if the input does not contain one; from Michael Forney

OpenBSD-Regress-ID: 9190c3ddf0d2562ccc02c4a95fce0e392196bfc7

8074f94930-Apr-2020 djm@openbsd.org

upstream: remove obsolete RSA1 test keys; spotted by Michael Forney

OpenBSD-Regress-ID: 6384ba889594e217d166908ed8253718ab0866da

c697e46c02-May-2020 Darren Tucker

Update .depend.

83657eac02-May-2020 Darren Tucker

Remove use of tail for 'make depend'.

Not every tail supports +N and we can do with out it so just remove it.
Prompted by mforney at mforney.org.

d25d630d02-May-2020 djm@openbsd.org

upstream: we have a sshkey_save_public() function to save public keys;

use it and save a bunch of redundant code.

Patch from loic AT venez.fr; ok markus@ djm@

OpenBSD-Commi

upstream: we have a sshkey_save_public() function to save public keys;

use it and save a bunch of redundant code.

Patch from loic AT venez.fr; ok markus@ djm@

OpenBSD-Commit-ID: f93e030a0ebcd0fd9054ab30db501ec63454ea5f

show more ...

e9dc986301-May-2020 Darren Tucker

Use LONG_LONG_MAX and friends if available.

If we don't have LLONG_{MIN,MAX} but do have LONG_LONG_{MIN,MAX}
then use those instead. We do calculate these values in configure,
but i

Use LONG_LONG_MAX and friends if available.

If we don't have LLONG_{MIN,MAX} but do have LONG_LONG_{MIN,MAX}
then use those instead. We do calculate these values in configure,
but it turns out that at least one compiler (old HP ANSI C) can't
parse "-9223372036854775808LL" without mangling it. (It can parse
"-9223372036854775807LL" which is presumably why its limits.h defines
LONG_LONG_MIN as the latter minus 1.)

Fixes rekey test when compiled with the aforementioned compiler.

show more ...

aad87b8801-May-2020 djm@openbsd.org

upstream: when receving a file in sink(), be careful to send at

most a single error response after the file has been opened. Otherwise the
source() and sink() can become desyncronised. R

upstream: when receving a file in sink(), be careful to send at

most a single error response after the file has been opened. Otherwise the
source() and sink() can become desyncronised. Reported by Daniel Goujot,
Georges-Axel Jaloyan, Ryan Lahfa, and David Naccache.

ok deraadt@ markus@

OpenBSD-Commit-ID: 6c14d233c97349cb811a8f7921ded3ae7d9e0035

show more ...

3190969601-May-2020 djm@openbsd.org

upstream: expose vasnmprintf(); ok (as part of other commit) markus

deraadt

OpenBSD-Commit-ID: 2e80cea441c599631a870fd40307d2ade5a7f9b5

99ce9cef01-May-2020 djm@openbsd.org

upstream: avoid NULL dereference when attempting to convert invalid

ssh.com private keys using "ssh-keygen -i"; spotted by Michael Forney

OpenBSD-Commit-ID: 2e56e6d26973967d11d13f56

upstream: avoid NULL dereference when attempting to convert invalid

ssh.com private keys using "ssh-keygen -i"; spotted by Michael Forney

OpenBSD-Commit-ID: 2e56e6d26973967d11d13f56ea67145f435bf298

show more ...

6c6072ba01-May-2020 Darren Tucker

See if SA_RESTART signals will interrupt select().

On some platforms (at least older HP-UXes such as 11.11, possibly others)
setting SA_RESTART on signal handers will cause it to not int

See if SA_RESTART signals will interrupt select().

On some platforms (at least older HP-UXes such as 11.11, possibly others)
setting SA_RESTART on signal handers will cause it to not interrupt
select(), at least for calls that do not specify a timeout. Try to
detect this and if found, don't use SA_RESTART.

POSIX says "If SA_RESTART has been set for the interrupting signal, it
is implementation-dependent whether select() restarts or returns with
[EINTR]" so this behaviour is within spec.

show more ...

90a0b43430-Apr-2020 Damien Miller

fix reversed test

c0dfd18d30-Apr-2020 Damien Miller

wrap sha2.h inclusion in #ifdef HAVE_SHA2_H

a01817a928-Apr-2020 djm@openbsd.org

upstream: adapt dummy FIDO middleware to API change; ok markus@

OpenBSD-Regress-ID: 8bb84ee500c2eaa5616044314dd0247709a1790f

261571dd30-Apr-2020 jmc@openbsd.org

upstream: tweak previous; ok markus

OpenBSD-Commit-ID: 41895450ce2294ec44a5713134491cc31f0c09fd

5de21c8230-Apr-2020 markus@openbsd.org

upstream: bring back debug() removed in rev 1.74; noted by pradeep

kumar

OpenBSD-Commit-ID: 8d134d22ab25979078a3b48d058557d49c402e65

ea14103c30-Apr-2020 markus@openbsd.org

upstream: run the 2nd ssh with BatchMode for scp -3

OpenBSD-Commit-ID: 77994fc8c7ca02d88e6d0d06d0f0fe842a935748

59d2de9528-Apr-2020 djm@openbsd.org

upstream: when signing a challenge using a FIDO toke, perform the

hashing in the middleware layer rather than in ssh code. This allows
middlewares that call APIs that perform the hashing

upstream: when signing a challenge using a FIDO toke, perform the

hashing in the middleware layer rather than in ssh code. This allows
middlewares that call APIs that perform the hashing implicitly (including
Microsoft's AFAIK). ok markus@

OpenBSD-Commit-ID: c9fc8630aba26c75d5016884932f08a5a237f37d

show more ...

c9d10dbc26-Apr-2020 dtucker@openbsd.org

upstream: Fix comment typo. Patch from mforney at mforney.org.

OpenBSD-Commit-ID: 3565f056003707a5e678e60e03f7a3efd0464a2b

4d2c87b425-Apr-2020 dtucker@openbsd.org

upstream: We've standardized on memset over bzero, replace a couple

that had slipped in. ok deraadt markus djm.

OpenBSD-Commit-ID: f5be055554ee93e6cc66b0053b590bef3728dbd6

7f23f42130-Apr-2020 Darren Tucker

Include sys/byteorder.h for htons and friends.

These are usually in netinet/in.h but on HP-UX they are not defined if
_XOPEN_SOURCE_EXTENDED is set. Only needed for netcat in the regres

Include sys/byteorder.h for htons and friends.

These are usually in netinet/in.h but on HP-UX they are not defined if
_XOPEN_SOURCE_EXTENDED is set. Only needed for netcat in the regression
tests.

show more ...

d27cba5830-Apr-2020 Darren Tucker

Fix conditional for openssl-based chacha20.

Fixes warnings or link errors when building against older OpenSSLs.
ok djm

20819b9624-Apr-2020 Darren Tucker

Error out if given RDomain if unsupported.

If the config contained 'RDomain %D' on a platform that did not support
it, the error would not be detected until runtime resulting in a broken

Error out if given RDomain if unsupported.

If the config contained 'RDomain %D' on a platform that did not support
it, the error would not be detected until runtime resulting in a broken
sshd. Detect this earlier and error out if found. bz#3126, based on a
patch from jjelen at redhat.com, tweaks and ok djm@

show more ...

12345678910>>...422