Commit message (Collapse) | Author | Files | Lines | ||
---|---|---|---|---|---|
2020-03-13 | upstream: initialize cname in case ai_canonname is NULL or too | markus@openbsd.org | 1 | -2/+3 | |
long; ok djm OpenBSD-Commit-ID: c27984636fdb1035d1642283664193e91aab6e37 | |||||
2020-03-13 | upstream: fix uninitialized pointers for forward_cancel; ok djm | markus@openbsd.org | 1 | -3/+3 | |
OpenBSD-Commit-ID: 612778e6d87ee865d0ba97d0a335f141cee1aa37 | |||||
2020-03-13 | upstream: exit on parse failures in input_service_request; ok djm | markus@openbsd.org | 1 | -2/+2 | |
OpenBSD-Commit-ID: 6a7e1bfded26051d5aa893c030229b1ee6a0d5d2 | |||||
2020-03-13 | upstream: fix null-deref on calloc failure; ok djm | markus@openbsd.org | 1 | -4/+6 | |
OpenBSD-Commit-ID: a313519579b392076b7831ec022dfdefbec8724a | |||||
2020-03-13 | upstream: exit if ssh_krl_revoke_key_sha256 fails; ok djm | markus@openbsd.org | 1 | -1/+4 | |
OpenBSD-Commit-ID: 0864ad4fe8bf28ab21fd1df766e0365c11bbc0dc | |||||
2020-03-13 | upstream: pkcs11_register_provider: return < 0 on error; ok djm | markus@openbsd.org | 1 | -1/+3 | |
OpenBSD-Commit-ID: cfc8321315b787e4d40da4bdb2cbabd4154b0d97 | |||||
2020-03-13 | upstream: sshsig: return correct error, fix null-deref; ok djm | markus@openbsd.org | 1 | -5/+7 | |
OpenBSD-Commit-ID: 1d1af7cd538b8b23e621cf7ab84f11e7a923edcd | |||||
2020-03-13 | upstream: vasnmprintf allocates str and returns -1; ok djm | markus@openbsd.org | 1 | -4/+6 | |
OpenBSD-Commit-ID: dae4c9e83d88471bf3b3f89e3da7a107b44df11c | |||||
2020-03-13 | upstream: sshpkt_fatal() does not return; ok djm | markus@openbsd.org | 1 | -2/+3 | |
OpenBSD-Commit-ID: 7dfe847e28bd78208eb227b37f29f4a2a0929929 | |||||
2020-02-28 | upstream: no-touch-required certificate option should be an | djm@openbsd.org | 1 | -2/+2 | |
extension, not a critical option. OpenBSD-Commit-ID: 626b22c5feb7be8a645e4b9a9bef89893b88600d | |||||
2020-02-28 | upstream: better error message when trying to use a FIDO key | djm@openbsd.org | 1 | -1/+5 | |
function and SecurityKeyProvider is empty OpenBSD-Commit-ID: e56602c2ee8c82f835d30e4dc8ee2e4a7896be24 | |||||
2020-02-28 | upstream: Drop leading space from line count that was confusing | dtucker@openbsd.org | 1 | -0/+1 | |
ssh-keygen's screen mode. OpenBSD-Commit-ID: 3bcae7a754db3fc5ad3cab63dd46774edb35b8ae | |||||
2020-02-28 | upstream: change explicit_bzero();free() to freezero() | jsg@openbsd.org | 23 | -149/+86 | |
While freezero() returns early if the pointer is NULL the tests for NULL in callers are left to avoid warnings about passing an uninitialised size argument across a function boundry. ok deraadt@ djm@ OpenBSD-Commit-ID: 2660fa334fcc7cd05ec74dd99cb036f9ade6384a | |||||
2020-02-26 | upstream: Have sftp reject "-1" in the same way as ssh(1) and | dtucker@openbsd.org | 1 | -7/+4 | |
scp(1) do instead of accepting and silently ignoring it since protocol 1 support has been removed. Spotted by shivakumar2696 at gmail.com, ok deraadt@ OpenBSD-Commit-ID: b79f95559a1c993214f4ec9ae3c34caa87e9d5de | |||||
2020-02-26 | upstream: Remove obsolete XXX comment. ok deraadt@ | dtucker@openbsd.org | 1 | -4/+1 | |
OpenBSD-Commit-ID: bc462cc843947feea26a2e21c750b3a7469ff01b | |||||
2020-02-24 | upstream: Fix typo. Patch from itoama at live.jp via github PR#173. | dtucker@openbsd.org | 1 | -3/+3 | |
OpenBSD-Commit-ID: 5cdaafab38bbdea0d07e24777d00bfe6f972568a | |||||
2020-02-22 | Switch %define to %global for redhat/openssh.spec | Nico Kadel-Garcia | 1 | -25/+25 | |
2020-02-21 | fix some typos and sentence | mkontani | 1 | -2/+2 | |
2020-02-21 | upstream: Fix some typos and an incorrect word in docs. Patch from | dtucker@openbsd.org | 3 | -7/+7 | |
itoama at live.jp via github PR#172. OpenBSD-Commit-ID: 166ee8f93a7201fef431b9001725ab8b269d5874 | |||||
2020-02-21 | upstream: Update moduli generation script to new ssh-keygen | dtucker@openbsd.org | 1 | -0/+1 | |
generation and screening command line flags. OpenBSD-Commit-ID: 5010ff08f7ad92082e87dde098b20f5c24921a8f | |||||
2020-02-21 | upstream: Import regenerated moduli. | dtucker@openbsd.org | 1 | -0/+1 | |
OpenBSD-Commit-ID: 7b7b619c1452a459310b0cf4391c5757c6bdbc0f | |||||
2020-02-20 | Import regenerated moduli. | Darren Tucker | 1 | -405/+414 | |
2020-02-18 | Fix typos in INSTALL: s/avilable/available/ s/suppports/supports/ | HARUYAMA Seigo | 1 | -2/+2 | |
2020-02-18 | upstream: Ensure that the key lifetime provided fits within the | dtucker@openbsd.org | 1 | -6/+7 | |
values allowed by the wire format (u32). Prevents integer wraparound of the timeout values. bz#3119, ok markus@ djm@ OpenBSD-Commit-ID: 8afe6038b5cdfcf63360788f012a7ad81acc46a2 | |||||
2020-02-18 | upstream: Detect and prevent simple configuration loops when using | dtucker@openbsd.org | 1 | -1/+9 | |
ProxyJump. bz#3057, ok djm@ OpenBSD-Commit-ID: 077d21c564c886c98309d871ed6f8ef267b9f037 | |||||
2020-02-18 | upstream: document -F none; with jmc@ | naddy@openbsd.org | 1 | -2/+5 | |
OpenBSD-Commit-ID: 0eb93b75473d2267aae9200e02588e57778c84f2 | |||||
2020-02-17 | Remove unused variable warning. | Darren Tucker | 1 | -1/+4 | |
2020-02-17 | Constify aix_krb5_get_principal_name. | Darren Tucker | 2 | -5/+7 | |
Prevents warning about discarding type qualifiers on AIX. | |||||
2020-02-17 | Check if TILDE is already defined and undef. | Darren Tucker | 1 | -0/+4 | |
Prevents redefinition warning on AIX. | |||||
2020-02-17 | Prevent unused variable warning. | Darren Tucker | 1 | -0/+2 | |
2020-02-17 | Check if getpeereid is actually declared. | Darren Tucker | 2 | -2/+3 | |
Check in sys/socket.h (AIX) and unistd.h (FreeBSD, DragonFLy and OS X). Prevents undeclared function warning on at least some versions of AIX. | |||||
2020-02-14 | upstream: openssh-8.2V_8_2_P1 | djm@openbsd.org | 1 | -2/+2 | |
OpenBSD-Commit-ID: 0a1340ff65fad0d84b997ac58dd1b393dec7c19b | |||||
2020-02-11 | crank version numbers | Damien Miller | 3 | -3/+3 | |
2020-02-11 | Minor documentation update: | Darren Tucker | 3 | -24/+14 | |
- remove duplication of dependency information (it's all in INSTALL). - SSHFP is now an RFC. | |||||
2020-02-09 | Check if UINT32_MAX is defined before redefining. | Darren Tucker | 1 | -3/+5 | |
2020-02-07 | typo; reported by Phil Pennock | Damien Miller | 1 | -1/+1 | |
2020-02-07 | upstream: sync the description of the $SSH_SK_PROVIDER environment | djm@openbsd.org | 2 | -6/+10 | |
variable with that of the SecurityKeyProvider ssh/sshd_config(5) directive, as the latter was more descriptive. OpenBSD-Commit-ID: 0488f09530524a7e53afca6b6e1780598022552f | |||||
2020-02-07 | upstream: Add ssh -Q key-sig for all key and signature types. | dtucker@openbsd.org | 4 | -17/+34 | |
Teach ssh -Q to accept ssh_config(5) and sshd_config(5) algorithm keywords as an alias for the corresponding query. Man page help jmc@, ok djm@. OpenBSD-Commit-ID: 1e110aee3db2fc4bc5bee2d893b7128fd622e0f8 | |||||
2020-02-07 | upstream: fix two PIN entry bugs on FIDO keygen: 1) it would allow more | djm@openbsd.org | 1 | -6/+12 | |
than the intended number of prompts (3) and 2) it would SEGV too many incorrect PINs were entered; based on patch by Gabriel Kihlman OpenBSD-Commit-ID: 9c0011f28ba8bd8adf2014424b64960333da1718 | |||||
2020-02-06 | upstream: When using HostkeyAlgorithms to merely append or remove | djm@openbsd.org | 1 | -15/+26 | |
algorithms from the default set (i.e. HostkeyAlgorithms=+/-...), retain the default behaviour of preferring those algorithms that have existing keys in known_hosts; ok markus OpenBSD-Commit-ID: 040e7fcc38ea00146b5d224ce31ce7a1795ee6ed | |||||
2020-02-06 | upstream: expand HostkeyAlgorithms prior to config dump, matching | djm@openbsd.org | 1 | -3/+15 | |
other algorithm lists; ok markus@ OpenBSD-Commit-ID: a66f0fca8cc5ce30405a2867bc115fff600671d0 | |||||
2020-02-06 | upstream: Add Include to the list of permitted keywords after a | naddy@openbsd.org | 1 | -2/+3 | |
Match keyword. ok markus@ OpenBSD-Commit-ID: 342e940538b13dd41e0fa167dc9ab192b9f6e2eb | |||||
2020-02-06 | upstream: Replace "security key" with "authenticator" in program | naddy@openbsd.org | 8 | -39/+40 | |
messages. This replaces "security key" in error/usage/verbose messages and distinguishes between "authenticator" and "authenticator-hosted key". ok djm@ OpenBSD-Commit-ID: 7c63800e9c340c59440a054cde9790a78f18592e | |||||
2020-02-06 | Don't look for UINT32_MAX in inttypes.h | Darren Tucker | 1 | -3/+0 | |
... unless we are actually going to use it. Fixes build on HP-UX without the potential impact to other platforms of a header change shortly before release. | |||||
2020-02-06 | depend | Damien Miller | 1 | -5/+5 | |
2020-02-06 | Fix sha2 MAKE_CLONE no-op definition | Michael Forney | 1 | -1/+1 | |
The point of the dummy declaration is so that MAKE_CLONE(...) can have a trailing semicolon without introducing an empty declaration. So, the macro replacement text should *not* have a trailing semicolon, just like DEF_WEAK. | |||||
2020-02-04 | upstream: require FIDO application strings to start with "ssh:"; ok | djm@openbsd.org | 2 | -3/+9 | |
markus@ OpenBSD-Commit-ID: 94e9c1c066d42b76f035a3d58250a32b14000afb | |||||
2020-02-04 | upstream: revert enabling UpdateHostKeys by default - there are still | djm@openbsd.org | 1 | -14/+3 | |
corner cases we need to address; ok markus OpenBSD-Commit-ID: ff7ad941bfdc49fb1d8baa95fd0717a61adcad57 | |||||
2020-02-04 | upstream: use better markup for challenge and write-attestation, and | jmc@openbsd.org | 1 | -9/+7 | |
rejig the challenge text a little; ok djm OpenBSD-Commit-ID: 9f351e6da9edfdc907d5c3fdaf2e9ff3ab0a7a6f | |||||
2020-02-03 | mention libfido2 in dependencies section | Damien Miller | 1 | -1/+3 | |