History log of /openssh-portable/ (Results 901 - 925 of 11017)
Revision (<<< Hide revision tags) (Show revision tags >>>)Date Author Comments
(<<< Hide modified files)
(Show modified files >>>)
b218055e28-Nov-2019 Damien Miller

(yet) another x-platform fix for sk-dummy.so

Check for -fPIC support from compiler

Compile libopenbsd-compat -fPIC

Don't mix -fPIE and -fPIC when compiling

0dedb70328-Nov-2019 Damien Miller

needs includes.h for WITH_OPENSSL

ef3853bb28-Nov-2019 Damien Miller

another attempt at sk-dummy.so working x-platform

include a fatal() implementation to satisfy libopenbsd-compat

clean up .lo and .so files

.gitignore .lo and .so files

d46ac56f28-Nov-2019 djm@openbsd.org

upstream: lots of dependencies go away here with ed25519 no longer

needing the ssh_digest API.

OpenBSD-Regress-ID: 785847ec78cb580d141e29abce351a436d6b5d49

7404b81f28-Nov-2019 djm@openbsd.org

upstream: perform hashing directly in crypto_hash_sha512() using

libcrypto or libc SHA512 functions rather than calling ssh_digest_memory();
avoids many dependencies on ssh code that com

upstream: perform hashing directly in crypto_hash_sha512() using

libcrypto or libc SHA512 functions rather than calling ssh_digest_memory();
avoids many dependencies on ssh code that complicate standalone use of
ed25519, as we want to do in sk-dummy.so

OpenBSD-Commit-ID: 5a3c37593d3ba7add037b587cec44aaea088496d

show more ...

d39a865b28-Nov-2019 jmc@openbsd.org

upstream: improve the text for -A a little; input from naddy and

djm

OpenBSD-Commit-ID: f9cdfb1d6dbb9887c4bf3bb25f9c7a94294c988d

9a0e01bd28-Nov-2019 jmc@openbsd.org

upstream: reshuffle the text to read better; input from naddy,

djmc, and dtucker

OpenBSD-Commit-ID: a0b2aca2b67614dda3d6618ea097bf0610c35013

5ca52c0f28-Nov-2019 Damien Miller

$< doesn't work as` I thought; explicily list objs

18e84bfd28-Nov-2019 djm@openbsd.org

upstream: tweak wording

OpenBSD-Commit-ID: bd002ca1599b71331faca735ff5f6de29e32222e

8ef5bf9d27-Nov-2019 Damien Miller

missing .SUFFIXES line makes make sad

323da82b27-Nov-2019 Damien Miller

(hopefully) fix out of tree builds of sk-dummy.so

d8b2838c27-Nov-2019 djm@openbsd.org

upstream: remove stray semicolon after closing brace of function;

from Michael Forney

OpenBSD-Commit-ID: fda95acb799bb160d15e205ee126117cf33da3a7

6e1d1bbf27-Nov-2019 dtucker@openbsd.org

upstream: Revert previous commit. The channels code still uses int

in many places for channel ids so the INT_MAX check still makes sense.

OpenBSD-Commit-ID: 532e4b644791b826956c3c61

upstream: Revert previous commit. The channels code still uses int

in many places for channel ids so the INT_MAX check still makes sense.

OpenBSD-Commit-ID: 532e4b644791b826956c3c61d6ac6da39bac84bf

show more ...

4898924427-Nov-2019 Damien Miller

wire sk-dummy.so into test suite

f79364ba27-Nov-2019 djm@openbsd.org

upstream: use error()+_exit() instead of fatal() to avoid running

cleanup handlers in child process; spotted via weird regress failures in
portable

OpenBSD-Commit-ID: 6902a9bb39

upstream: use error()+_exit() instead of fatal() to avoid running

cleanup handlers in child process; spotted via weird regress failures in
portable

OpenBSD-Commit-ID: 6902a9bb3987c7d347774444f7979b8a9ba7f412

show more ...

70ec5e5e26-Nov-2019 dtucker@openbsd.org

upstream: Make channel_id u_int32_t and remove unnecessary check

and cast that were left over from the type conversion. Noted by
t-hashida@amiya.co.jp in bz#3098, ok markus@ djm@

upstream: Make channel_id u_int32_t and remove unnecessary check

and cast that were left over from the type conversion. Noted by
t-hashida@amiya.co.jp in bz#3098, ok markus@ djm@

OpenBSD-Commit-ID: 3ad105b6a905284e780b1fd7ff118e1c346e90b5

show more ...

ad44ca8126-Nov-2019 djm@openbsd.org

upstream: test FIDO2/U2F key types; ok markus@

OpenBSD-Regress-ID: 367e06d5a260407619b4b113ea0bd7004a435474

c6efa8a926-Nov-2019 djm@openbsd.org

upstream: add dummy security key middleware based on work by

markus@

This will allow us to test U2F/FIDO2 support in OpenSSH without
requiring real hardware.

ok markus@

upstream: add dummy security key middleware based on work by

markus@

This will allow us to test U2F/FIDO2 support in OpenSSH without
requiring real hardware.

ok markus@

OpenBSD-Regress-ID: 88b309464b8850c320cf7513f26d97ee1fdf9aae

show more ...

8635afa126-Nov-2019 jmc@openbsd.org

upstream: tweak previous;

OpenBSD-Commit-ID: a4c097364c75da320f1b291568db830fb1ee4883

e0d38ae925-Nov-2019 djm@openbsd.org

upstream: more debugging; behind DEBUG_SK

OpenBSD-Commit-ID: a978896227118557505999ddefc1f4c839818b60

9281d43125-Nov-2019 Damien Miller

unbreak fuzzers for recent security key changes

c5f1cc9925-Nov-2019 djm@openbsd.org

upstream: unbreak tests for recent security key changes

OpenBSD-Regress-ID: 2cdf2fcae9962ca4d711338f3ceec3c1391bdf95

6498826625-Nov-2019 djm@openbsd.org

upstream: unbreak after security key support landed

OpenBSD-Regress-ID: 3ab578b0dbeb2aa6d9969b54a9c1bad329c0dcba

e65e25c821-Nov-2019 tb@openbsd.org

upstream: Remove workaround for broken 'openssl rsa -text' output

that was fixed in libcrypto/rsa/rsa_ameth.c r1.24.

ok dtucker inoguchi

OpenBSD-Regress-ID: c260edfac177daa

upstream: Remove workaround for broken 'openssl rsa -text' output

that was fixed in libcrypto/rsa/rsa_ameth.c r1.24.

ok dtucker inoguchi

OpenBSD-Regress-ID: c260edfac177daa8fcce90141587cf04a95c4f5f

show more ...

21377ec225-Nov-2019 djm@openbsd.org

upstream: redundant test

OpenBSD-Commit-ID: 38fa7806c528a590d91ae560e67bd8b246c2d7a3

1...<<31323334353637383940>>...441