12937 Commits

Author SHA1 Message Date
djm@openbsd.org
8a74a96d25 upstream: ssh is almost out of getopt() characters; note the
remaining remaining available ones in a comment

OpenBSD-Commit-ID: 48d38cef59d6bc8e84c6c066f6d601875d3253fd
2022-03-30 15:34:33 +11:00
djm@openbsd.org
6d4fc51adb upstream: avoid NULL deref via ssh-keygen -Y find-principals.
bz3409, reported by Mateusz Adamowski

OpenBSD-Commit-ID: a3b2c02438052ee858e0ee18e5a288586b5df2c5
2022-03-30 15:34:33 +11:00
Darren Tucker
e937514920 Add AIX 5.1 test target. 2022-03-28 17:51:03 +11:00
Darren Tucker
4bbe815ba9 Drop leading "v" from release version identifier.
It's present in the git tags but not in the release tarball names.
Also drop extra "/" from URL path.
2022-03-26 22:01:31 +11:00
Darren Tucker
f5cdd3b3c2 Use tarballs when testing LibreSSL releases.
This means they'll still work when the combination of -portable and
openbsd github repos no longer match.
2022-03-26 16:28:04 +11:00
Darren Tucker
24dc37d198 Remove now-unused passwd variable. 2022-03-26 15:02:45 +11:00
Darren Tucker
5b467ceef2 Missing semicolon. 2022-03-26 13:15:44 +11:00
Darren Tucker
2923d026e5 Factor out platform-specific locked account check.
Also fixes an incorrect free on platforms with both libiaf and shadow
passwords (probably only Unixware).  Prompted by github PR#284,
originally from @c3h2_ctf and stoeckmann@.
2022-03-26 12:49:50 +11:00
Darren Tucker
d23efe4b12 Add OpenWRT mips and mipsel test targets. 2022-03-26 08:13:46 +11:00
Tess Gauthier
9598cec2fc
fix install-sshd incompatability with windows pwsh 5.1 (#590) 2022-03-24 10:32:32 -07:00
bagajjal
aa0d37b16e
Crank V8.9.1.0 (#588) 2022-03-22 14:45:16 -07:00
bagajjal
0bac502e32
Upgrade to V3.4.3.0 (#587) 2022-03-22 09:57:16 -07:00
Tess Gauthier
672c7eb270
Update install sshd (#585) 2022-03-21 15:02:15 -07:00
Tess Gauthier
6bd66d4685
update ssh-agent privileges to match install scripts for pkcs11/fido scenarios (#584) 2022-03-21 13:13:27 -07:00
pedro martelletto
b314450fe5
skip check_sk_options() in sk_sign() when interfacing with webauthn.dll (#582) 2022-03-21 10:00:29 -07:00
djm@openbsd.org
16ea8b8583 upstream: don't leak argument list; bz3404, reported by Balu
Gajjala ok dtucker@

OpenBSD-Commit-ID: fddc32d74e5dd5cff1a49ddd6297b0867eae56a6
2022-03-20 19:54:35 +11:00
djm@openbsd.org
a72bde294f upstream: make addargs() and replacearg() a little more robust and
improve error reporting

make freeargs(NULL) a noop like the other free functions

ok dtucker as part of bz3403

OpenBSD-Commit-ID: 15f86da83176978b4d1d288caa24c766dfa2983d
2022-03-20 19:54:35 +11:00
djm@openbsd.org
731087d261 upstream: don't try to resolve ListenAddress directives in the sshd
re-exec path - we're never going to use the result and if the operation fails
then it can prevent connections from being accepted. Reported by Aaron
Poffenberger; with / ok dtucker@

OpenBSD-Commit-ID: 44c53a43909a328e2f5ab26070fdef3594eded60
2022-03-20 19:54:35 +11:00
djm@openbsd.org
1c83c08212 upstream: remove blank line
OpenBSD-Commit-ID: d5e0182965b2fbfb03ad5f256d1a1ce5706bcddf
2022-03-20 19:54:35 +11:00
djm@openbsd.org
807be68684 upstream: helpful comment
OpenBSD-Commit-ID: e3315a45cb04e7feeb614d76ec80a9fe4ca0e8c7
2022-03-18 13:33:36 +11:00
djm@openbsd.org
a0b5816f8f upstream: ssh-keygen -Y check-novalidate requires namespace or SEGV
will ensue. Patch from Mateusz Adamowski via GHPR#307

OpenBSD-Commit-ID: 99e8ec38f9feb38bce6de240335be34aedeba5fd
2022-03-18 13:33:36 +11:00
djm@openbsd.org
5a252d54a6 upstream: improve DEBUG_CHANNEL_POLL debugging message
OpenBSD-Commit-ID: 2275eb7bc4707d019b1a0194b9c92c0b78da848f
2022-03-18 13:33:36 +11:00
cheloha@openbsd.org
ce324cf58b upstream: ssh: xstrdup(): use memcpy(3)
Copying the given string into the buffer with strlcpy(3) confers no
benefit in this context because we have already determined the
string's length with strlen(3) in order to allocate that buffer.

Thread: https://marc.info/?l=openbsd-tech&m=164687525802691&w=2

ok dtucker@ millert@

OpenBSD-Commit-ID: f8bfc082e36e2d2dc4e1feece02fe274155ca11a
2022-03-18 13:33:36 +11:00
bagajjal
bd0d488a3c
Update MSI with ssh-sk-helper.exe, ssh-pkcs11-helper.exe, license.txt, notice.txt (#581) v8.9.0.0 2022-03-17 16:59:44 -07:00
bagajjal
b90820169b
add ssh-pkcs11-helper.exe to build output, fix create_no_window for ssh-sk-helper.exe (#579) 2022-03-16 16:48:29 -07:00
Balu Gajjala
5d6a3f5641 Merge branch 'V8_9_test' into latestw_all 2022-03-15 16:31:47 -07:00
Balu Gajjala
73c976878e Crank V8.9 2022-03-15 13:13:19 -07:00
Balu Gajjala
d328deb956 dummy commit to trigger ci 2022-03-12 16:40:36 -08:00
Balu Gajjala
78cf768fa9 remove unnecessary changes 2022-03-11 18:09:53 -08:00
Balu Gajjala
2771541a41 fix tests 2022-03-11 17:42:15 -08:00
Balu Gajjala
affac5aedc fix tests 2022-03-11 17:15:47 -08:00
Balu Gajjala
9a8746842a Fix failed tests - 1 2022-03-11 13:53:27 -08:00
Darren Tucker
2893c5e764 Resync fmt_scaled. with OpenBSD.
Fixes underflow reported in bz#3401.
2022-03-11 18:43:58 +11:00
Darren Tucker
5ae31a0fdd Provide killpg implementation.
Based on github PR#301 for Tandem NonStop.
2022-03-09 09:41:56 +11:00
Darren Tucker
c41c84b439 Check for missing ftruncate prototype.
From github PR#301 in conjunction with rsbeckerca.
2022-03-09 09:29:30 +11:00
Andrew
f392f20ecd
3rd party notices for releases (#575) 2022-03-08 12:42:44 -08:00
Darren Tucker
8cf5275452 Default to not using sandbox when cross compiling.
On most systems poll(2) does not work when the number of FDs is reduced
with setrlimit, so assume it doesn't when cross compiling and we can't
run the test.  bz#3398.
2022-03-08 20:04:06 +11:00
bagajjal
2d3ca752f9
V8 9 test (#574) 2022-03-07 10:48:41 -08:00
Balu Gajjala
9a85082806 V8.9 build errors, unit tests successful 2022-03-04 18:40:49 -08:00
bagajjal
dcbfaa6d15
Create ssh-sk-helper.exe in user session (#573) 2022-03-04 16:59:08 -08:00
Tess Gauthier
a3023c2d09
modify key event logic to fix ctrl+space not being sent (#569) 2022-03-02 10:40:36 -08:00
Andrew
4458bbc132
Merge pull request #571 from anmenaga/notice
Added NOTICE
2022-02-28 23:59:28 -08:00
unknown
346de3ea8e Added NOTICE 2022-02-28 23:58:28 -08:00
djm@openbsd.org
379b30120d upstream: pack pollfd array before server_accept_loop() ppoll()
call, and terminate sshd if ppoll() returns errno==EINVAL

avoids spin in ppoll when MaxStartups > RLIMIT_NOFILE, reported by
Daniel Micay

feedback/ok deraadt

OpenBSD-Commit-ID: dbab1c24993ac977ec24d83283b8b7528f7c2c15
2022-03-01 13:01:01 +11:00
naddy@openbsd.org
eceafbe0bd upstream: include rejected signature algorithm in error message and
not the (useless) key type; ok djm@

OpenBSD-Commit-ID: d0c0f552a4d9161203e07e95d58a76eb602a76ff
2022-03-01 13:00:26 +11:00
dtucker@openbsd.org
f2f3269423 upstream: Remove the char * casts from arguments to do_lstat,
do_readdir and do_stat paths since the underlying functions now take a const
char *. Patch from vapier at gentoo.org.

OpenBSD-Commit-ID: 9e4d964dbfb0ed683a2a2900711b88e7f1c0297b
2022-03-01 13:00:26 +11:00
djm@openbsd.org
4a66dac052 upstream: save an unneccessary alloc/free, based on patch from
Martin Vahlensieck; ok dtucker@

OpenBSD-Commit-ID: 90ffbf1f837e509742f2c31a1fbf2c0fd376fd5f
2022-03-01 13:00:26 +11:00
Darren Tucker
6f117cb151 Remove unused ivbits argument from chacha_keysetup 2022-03-01 09:02:06 +11:00
Darren Tucker
15974235dd Add OPENBSD ORIGINAL marker. 2022-03-01 09:00:20 +11:00
Darren Tucker
f2ff669347 No unused param warnings for clang-12 and gcc-11.
These have too many false positives in -Werror tests on the github CI
since we often provide empty stub functions for functionality not needed
for particular configurations.
2022-02-28 22:21:36 +11:00