46e5c4c8 | 06-Mar-2020 |
markus@openbsd.org |
upstream: correct return code; ok djm OpenBSD-Commit-ID: 319d09e3b7f4b2bc920c67244d9ff6426b744810 |
31c39e78 | 06-Mar-2020 |
markus@openbsd.org |
upstream: principalsp is optional, pubkey required; ok djm OpenBSD-Commit-ID: 2cc3ea5018c28ed97edaccd7f17d2cc796f01024 |
e26a3175 | 06-Mar-2020 |
markus@openbsd.org |
upstream: remove unused variables in ssh-pkcs11-helper; ok djm OpenBSD-Commit-ID: 13e572846d0d1b28f1251ddd2165e9cf18135ae1 |
1b378c0d | 06-Mar-2020 |
markus@openbsd.org |
upstream: return correct error in sshsk_ed25519_sig; ok djm OpenBSD-Commit-ID: 52bf733df220303c260fee4f165ec64b4a977625 |
fbff605e | 06-Mar-2020 |
markus@openbsd.org |
upstream: fix possible null-deref in check_key_not_revoked; ok djm OpenBSD-Commit-ID: 80855e9d7af42bb6fcc16c074ba69876bfe5e3bf |
bc30b446 | 06-Mar-2020 |
markus@openbsd.org |
upstream: ssh_fetch_identitylist() returns the return value from ssh_request_reply() so we should also check against != 0 ok djm OpenBSD-Commit-ID: 28d0028769d03e665688c61bb5fd943e1
upstream: ssh_fetch_identitylist() returns the return value from ssh_request_reply() so we should also check against != 0 ok djm OpenBSD-Commit-ID: 28d0028769d03e665688c61bb5fd943e18614952
show more ...
|
7b4f70dd | 06-Mar-2020 |
markus@openbsd.org |
upstream: sshkey_cert_check_authority requires reason to be set; ok djm OpenBSD-Commit-ID: 6f7a6f19540ed5749763c2f9530c0897c94aa552 |
05efe270 | 06-Mar-2020 |
markus@openbsd.org |
upstream: passphrase depends on kdfname, not ciphername (possible null-deref); ok djm OpenBSD-Commit-ID: 0d39668edf5e790b5837df4926ee1141cec5471c |
1ddf5682 | 06-Mar-2020 |
markus@openbsd.org |
upstream: consistently check packet_timeout_ms against 0; ok djm OpenBSD-Commit-ID: e8fb8cb2c96c980f075069302534eaf830929928 |
31f1ee54 | 06-Mar-2020 |
markus@openbsd.org |
upstream: initialize cname in case ai_canonname is NULL or too long; ok djm OpenBSD-Commit-ID: c27984636fdb1035d1642283664193e91aab6e37 |
a6134b02 | 06-Mar-2020 |
markus@openbsd.org |
upstream: fix uninitialized pointers for forward_cancel; ok djm OpenBSD-Commit-ID: 612778e6d87ee865d0ba97d0a335f141cee1aa37 |
16d4f996 | 06-Mar-2020 |
markus@openbsd.org |
upstream: exit on parse failures in input_service_request; ok djm OpenBSD-Commit-ID: 6a7e1bfded26051d5aa893c030229b1ee6a0d5d2 |
5f25afe5 | 06-Mar-2020 |
markus@openbsd.org |
upstream: fix null-deref on calloc failure; ok djm OpenBSD-Commit-ID: a313519579b392076b7831ec022dfdefbec8724a |
ff2acca0 | 06-Mar-2020 |
markus@openbsd.org |
upstream: exit if ssh_krl_revoke_key_sha256 fails; ok djm OpenBSD-Commit-ID: 0864ad4fe8bf28ab21fd1df766e0365c11bbc0dc |
31c860a0 | 06-Mar-2020 |
markus@openbsd.org |
upstream: pkcs11_register_provider: return < 0 on error; ok djm OpenBSD-Commit-ID: cfc8321315b787e4d40da4bdb2cbabd4154b0d97 |
15be29e1 | 06-Mar-2020 |
markus@openbsd.org |
upstream: sshsig: return correct error, fix null-deref; ok djm OpenBSD-Commit-ID: 1d1af7cd538b8b23e621cf7ab84f11e7a923edcd |
6fb6f186 | 06-Mar-2020 |
markus@openbsd.org |
upstream: vasnmprintf allocates str and returns -1; ok djm OpenBSD-Commit-ID: dae4c9e83d88471bf3b3f89e3da7a107b44df11c |
714e1cbc | 06-Mar-2020 |
markus@openbsd.org |
upstream: sshpkt_fatal() does not return; ok djm OpenBSD-Commit-ID: 7dfe847e28bd78208eb227b37f29f4a2a0929929 |
9b47bd7b | 27-Feb-2020 |
djm@openbsd.org |
upstream: no-touch-required certificate option should be an extension, not a critical option. OpenBSD-Commit-ID: 626b22c5feb7be8a645e4b9a9bef89893b88600d |
dd992520 | 27-Feb-2020 |
djm@openbsd.org |
upstream: better error message when trying to use a FIDO key function and SecurityKeyProvider is empty OpenBSD-Commit-ID: e56602c2ee8c82f835d30e4dc8ee2e4a7896be24 |
b81e66db | 26-Feb-2020 |
dtucker@openbsd.org |
upstream: Drop leading space from line count that was confusing ssh-keygen's screen mode. OpenBSD-Commit-ID: 3bcae7a754db3fc5ad3cab63dd46774edb35b8ae |
d5ba1c03 | 26-Feb-2020 |
jsg@openbsd.org |
upstream: change explicit_bzero();free() to freezero() While freezero() returns early if the pointer is NULL the tests for NULL in callers are left to avoid warnings about passing an
upstream: change explicit_bzero();free() to freezero() While freezero() returns early if the pointer is NULL the tests for NULL in callers are left to avoid warnings about passing an uninitialised size argument across a function boundry. ok deraadt@ djm@ OpenBSD-Commit-ID: 2660fa334fcc7cd05ec74dd99cb036f9ade6384a
show more ...
|
9e3220b5 | 26-Feb-2020 |
dtucker@openbsd.org |
upstream: Have sftp reject "-1" in the same way as ssh(1) and scp(1) do instead of accepting and silently ignoring it since protocol 1 support has been removed. Spotted by shivakumar269
upstream: Have sftp reject "-1" in the same way as ssh(1) and scp(1) do instead of accepting and silently ignoring it since protocol 1 support has been removed. Spotted by shivakumar2696 at gmail.com, ok deraadt@ OpenBSD-Commit-ID: b79f95559a1c993214f4ec9ae3c34caa87e9d5de
show more ...
|
ade8e67b | 25-Feb-2020 |
dtucker@openbsd.org |
upstream: Remove obsolete XXX comment. ok deraadt@ OpenBSD-Commit-ID: bc462cc843947feea26a2e21c750b3a7469ff01b |
7eb903f5 | 23-Feb-2020 |
dtucker@openbsd.org |
upstream: Fix typo. Patch from itoama at live.jp via github PR#173. OpenBSD-Commit-ID: 5cdaafab38bbdea0d07e24777d00bfe6f972568a |