djm@openbsd.org
2726764269
upstream: refactor sshkey_private_deserialize
...
feedback/ok markus@
OpenBSD-Commit-ID: f5ca6932fdaf840a5e8250becb38315a29b5fc9f
2022-10-28 12:47:01 +11:00
djm@openbsd.org
2519a7077a
upstream: refactor sshkey_private_serialize_opt()
...
feedback/ok markus@
OpenBSD-Commit-ID: 61e0fe989897901294efe7c3b6d670cefaf44cbd
2022-10-28 12:47:01 +11:00
djm@openbsd.org
11a768adf9
upstream: refactor certify
...
feedback/ok markus@
OpenBSD-Commit-ID: 35d742992e223eaca3537e6fb3d3002c08eed4f6
2022-10-28 12:47:00 +11:00
djm@openbsd.org
3fbc58bb24
upstream: refactor sshkey_sign() and sshkey_verify()
...
feedback/ok markus@
OpenBSD-Commit-ID: 368e662c128c99d05cc043b1308d2b6c71a4d3cc
2022-10-28 12:47:00 +11:00
djm@openbsd.org
a1deb6cdbb
upstream: refactor sshkey_from_blob_internal()
...
feedback/ok markus@
OpenBSD-Commit-ID: 1f46c0cbb8060ee9666a02749594ad6658c8e283
2022-10-28 12:46:59 +11:00
djm@openbsd.org
7d00799c93
upstream: refactor sshkey_from_private()
...
feedback/ok markus@
OpenBSD-Commit-ID: e5dbe7a3545930c50f70ee75c867a1e08b382b53
2022-10-28 12:46:59 +11:00
djm@openbsd.org
262647c2e9
upstream: factor out key generation
...
feedback/ok markus@
OpenBSD-Commit-ID: 5b4211bff4de8d9adb84bc72857a8c42c44e7ceb
2022-10-28 12:46:58 +11:00
djm@openbsd.org
401c74e7dc
upstream: refactor and simplify sshkey_read()
...
feedback/ok markus@
OpenBSD-Commit-ID: 0d93b7a56e31cd06a8bb0d2191d084ce254b0971
2022-10-28 12:46:57 +11:00
djm@openbsd.org
591fed94e6
upstream: factor out public key serialization
...
feedback/ok markus@
OpenBSD-Commit-ID: a3570c4b97290c5662890aea7328d87f55939033
2022-10-28 12:46:57 +11:00
djm@openbsd.org
1e78844ae2
upstream: factor out sshkey_equal_public()
...
feedback/ok markus@
OpenBSD-Commit-ID: 1368ba114cb37732fe6ec3d89c7e6d27ea6fdc94
2022-10-28 12:46:56 +11:00
djm@openbsd.org
25de1c01a8
upstream: begin big refactor of sshkey
...
Move keytype data and some of the type-specific code (allocation,
cleanup, etc) out into each key type's implementation. Subsequent
commits will move more, with the goal of having each key-*.c file
owning as much of its keytype's implementation as possible.
lots of feedback + ok markus@
OpenBSD-Commit-ID: 0f2b4334f73914344e9e5b3d33522d41762a57ec
2022-10-28 12:46:56 +11:00
djm@openbsd.org
445363433b
upstream: Be more paranoid with host/domain names coming from the
...
never write a name with bad characters to a known_hosts file.
reported by David Leadbeater, ok deraadt@
OpenBSD-Commit-ID: ba9b25fa8b5490b49398471e0c9657b0cbc7a5ad
2022-10-25 10:16:35 +11:00
djm@openbsd.org
7190154de2
upstream: regress test for unmatched glob characters; fails before
...
previous commit but passes now. bz3488; prodded by dtucker@
OpenBSD-Regress-ID: 0cc5cc9ea4a6fd170dc61b9212f15badaafb3bbd
2022-10-25 08:56:38 +11:00
djm@openbsd.org
a4821a5924
upstream: when scp(1) is using the SFTP protocol for transport (the
...
default), better match scp/rcp's handling of globs that don't match the
globbed characters but do match literally (e.g. trying to transfer
"foo.[1]").
Previously scp(1) in SFTP mode would not match these pathnames but
legacy scp/rcp mode would.
Reported by Michael Yagliyan in bz3488; ok dtucker@
OpenBSD-Commit-ID: d8a3773f53015ba811fddba7473769a2fd343e11
2022-10-25 08:55:11 +11:00
jsg@openbsd.org
18376847b8
upstream: use correct type with sizeof ok djm@
...
OpenBSD-Commit-ID: d6c882c2e8a42ff831a5b3cbc2c961ecb2dd6143
2022-10-25 08:55:11 +11:00
jmc@openbsd.org
4a4883664d
upstream: ssh-agent.1: - use Nm not Xr for self-ref - while here,
...
wrap a long line
ssh-agent.c:
- add -O to usage()
OpenBSD-Commit-ID: 855dac4695cef22e96d69c53436496bc408ca389
2022-10-25 08:55:10 +11:00
djm@openbsd.org
9fd2441113
upstream: document "-O no-restrict-websafe"; spotted by Ross L
...
Richardson
OpenBSD-Commit-ID: fe9eaa50237693a14ebe5b5614bf32a02145fe8b
2022-10-25 08:54:43 +11:00
Tess Gauthier
59a1c22f5e
retrigger appveyor
2022-10-20 11:46:26 -04:00
Tess Gauthier
67598092eb
remove rdp debug from appveyor
2022-10-19 17:49:45 -04:00
Tess Gauthier
5742e1cd57
remove in place tests from scp.sh
2022-10-19 17:28:21 -04:00
Tess Gauthier
691218cd2d
modify new scp.sh tests for windows
2022-10-19 16:16:17 -04:00
Tess Gauthier
2116c820ca
add #ifdef SUPPORT_CRLF back into auth_check_principals_line method that was moved/renamed
2022-10-19 15:56:48 -04:00
Tess Gauthier
bbb76f5c67
increase debug of failing pester test
2022-10-19 14:22:39 -04:00
Tess Gauthier
a88ae8d841
appveyor.yml
2022-10-18 14:07:12 -04:00
Tess Gauthier
803e013b3b
make key_lookup compatible with winhello
2022-10-18 14:04:50 -04:00
Darren Tucker
614252b05d
OpenSSL dev branch now identifies as 3.2.0.
2022-10-18 06:29:16 +11:00
Damien Miller
195e5a65fd
revert c64b62338b4 and guard POLL* defines instead
...
c64b62338b4 broke OSX builds, which do have poll.h but lack ppoll(2)
Spotted by dtucker
2022-10-17 09:41:47 +11:00
Damien Miller
bc2e480d99
undef _get{short,long} before redefining
2022-10-14 14:52:22 +11:00
Harmen Stoppels
5eb796a369
Fix snprintf configure test for clang 15
...
Clang 15 -Wimplicit-int defaults to an error in C99 mode and above.
A handful of tests have "main(..." and not "int main(..." which caused
the tests to produce incorrect results.
2022-10-14 07:37:16 +11:00
Tess Gauthier
ca9f04bd94
add ifdef to sftp-server.c
2022-10-13 15:51:05 -04:00
Tess Gauthier
0488165b5e
remove rdp block from appveyor since we are no longer debugging
2022-10-13 12:57:31 -04:00
Tess Gauthier
302dc2f2b4
add windows preprocessor definition in key_lookup
2022-10-13 12:36:04 -04:00
Tess Gauthier
eb2f6238fb
revert preprocessor definition for winhello
2022-10-13 12:35:46 -04:00
Tess Gauthier
0bde9952c7
add preprocessor for WinHello
2022-10-13 11:04:47 -04:00
Tess Gauthier
9b344f4466
add windows specific code back into method moved from auth.c to auth2-pubkeyfile.c
2022-10-12 11:55:55 -04:00
Tess Gauthier
5e2b081a49
modify -p tests to only run for Windows OS version 10 and above
2022-10-11 18:40:39 -04:00
Damien Miller
c64b62338b
skip bsd-poll.h if poll.h found; ok dtucker
2022-10-10 12:32:43 +11:00
Tess Gauthier
2653b08c59
remove extra sleep time from debugging scp pester tests
2022-10-07 12:45:46 -04:00
Tess Gauthier
47620db2c4
remove keys for upstream tests ( #624 )
2022-10-07 11:25:23 -04:00
djm@openbsd.org
5ee2b8ccfc
upstream: honour user's umask if it is more restrictive then the ssh
...
default (022); based on patch from Alex Henrie, ok dtucker@ deraadt@
OpenBSD-Commit-ID: fe1b9e15fc9a4f49fc338e848ce14d8727abe82d
2022-10-07 09:45:02 +11:00
Tess Gauthier
43bbf692c6
disable -p pester tests due to unreliability on older Windows versions
2022-10-06 15:47:12 -04:00
Tess Gauthier
3e3b110485
fix 9.1 compilation errors
2022-10-06 15:43:21 -04:00
Darren Tucker
a75cffc270
Add LibreSSL 3.6.0 to test suite.
...
While there, bump OpenSSL to latest 1.1.1q release.
2022-10-07 03:54:56 +11:00
Darren Tucker
fcc0f0c0e9
Add 9.1 branch to CI status page.
2022-10-06 21:18:16 +11:00
Darren Tucker
ef211eee63
Test commits to all branches of portable.
...
Only test OpenBSD upstream on commits to master since that's what it
tracks.
2022-10-05 06:31:48 +11:00
Damien Miller
fe646de03c
whitespace at EOL
2022-10-05 03:47:26 +11:00
Damien Miller
a6e1852d10
mention libfido2 autodetection
2022-10-05 03:40:01 +11:00
Damien Miller
7360c2c206
remove mention of --with-security-key-builtin
...
it is enabled by default when libfido2 is installed
2022-10-05 03:37:36 +11:00
Tess Gauthier
df96e7c7e2
attempt to fix merge conflicts
2022-10-04 12:19:24 -04:00
Damien Miller
0ffb46f2ee
update .depend
2022-10-04 01:51:42 +11:00