13127 Commits

Author SHA1 Message Date
bagajjal
aa0d37b16e
Crank V8.9.1.0 (#588) 2022-03-22 14:45:16 -07:00
bagajjal
0bac502e32
Upgrade to V3.4.3.0 (#587) 2022-03-22 09:57:16 -07:00
Tess Gauthier
672c7eb270
Update install sshd (#585) 2022-03-21 15:02:15 -07:00
Tess Gauthier
6bd66d4685
update ssh-agent privileges to match install scripts for pkcs11/fido scenarios (#584) 2022-03-21 13:13:27 -07:00
pedro martelletto
b314450fe5
skip check_sk_options() in sk_sign() when interfacing with webauthn.dll (#582) 2022-03-21 10:00:29 -07:00
djm@openbsd.org
16ea8b8583 upstream: don't leak argument list; bz3404, reported by Balu
Gajjala ok dtucker@

OpenBSD-Commit-ID: fddc32d74e5dd5cff1a49ddd6297b0867eae56a6
2022-03-20 19:54:35 +11:00
djm@openbsd.org
a72bde294f upstream: make addargs() and replacearg() a little more robust and
improve error reporting

make freeargs(NULL) a noop like the other free functions

ok dtucker as part of bz3403

OpenBSD-Commit-ID: 15f86da83176978b4d1d288caa24c766dfa2983d
2022-03-20 19:54:35 +11:00
djm@openbsd.org
731087d261 upstream: don't try to resolve ListenAddress directives in the sshd
re-exec path - we're never going to use the result and if the operation fails
then it can prevent connections from being accepted. Reported by Aaron
Poffenberger; with / ok dtucker@

OpenBSD-Commit-ID: 44c53a43909a328e2f5ab26070fdef3594eded60
2022-03-20 19:54:35 +11:00
djm@openbsd.org
1c83c08212 upstream: remove blank line
OpenBSD-Commit-ID: d5e0182965b2fbfb03ad5f256d1a1ce5706bcddf
2022-03-20 19:54:35 +11:00
djm@openbsd.org
807be68684 upstream: helpful comment
OpenBSD-Commit-ID: e3315a45cb04e7feeb614d76ec80a9fe4ca0e8c7
2022-03-18 13:33:36 +11:00
djm@openbsd.org
a0b5816f8f upstream: ssh-keygen -Y check-novalidate requires namespace or SEGV
will ensue. Patch from Mateusz Adamowski via GHPR#307

OpenBSD-Commit-ID: 99e8ec38f9feb38bce6de240335be34aedeba5fd
2022-03-18 13:33:36 +11:00
djm@openbsd.org
5a252d54a6 upstream: improve DEBUG_CHANNEL_POLL debugging message
OpenBSD-Commit-ID: 2275eb7bc4707d019b1a0194b9c92c0b78da848f
2022-03-18 13:33:36 +11:00
cheloha@openbsd.org
ce324cf58b upstream: ssh: xstrdup(): use memcpy(3)
Copying the given string into the buffer with strlcpy(3) confers no
benefit in this context because we have already determined the
string's length with strlen(3) in order to allocate that buffer.

Thread: https://marc.info/?l=openbsd-tech&m=164687525802691&w=2

ok dtucker@ millert@

OpenBSD-Commit-ID: f8bfc082e36e2d2dc4e1feece02fe274155ca11a
2022-03-18 13:33:36 +11:00
bagajjal
bd0d488a3c
Update MSI with ssh-sk-helper.exe, ssh-pkcs11-helper.exe, license.txt, notice.txt (#581) v8.9.0.0 2022-03-17 16:59:44 -07:00
bagajjal
b90820169b
add ssh-pkcs11-helper.exe to build output, fix create_no_window for ssh-sk-helper.exe (#579) 2022-03-16 16:48:29 -07:00
Balu Gajjala
5d6a3f5641 Merge branch 'V8_9_test' into latestw_all 2022-03-15 16:31:47 -07:00
Balu Gajjala
73c976878e Crank V8.9 2022-03-15 13:13:19 -07:00
Balu Gajjala
d328deb956 dummy commit to trigger ci 2022-03-12 16:40:36 -08:00
Balu Gajjala
78cf768fa9 remove unnecessary changes 2022-03-11 18:09:53 -08:00
Balu Gajjala
2771541a41 fix tests 2022-03-11 17:42:15 -08:00
Balu Gajjala
affac5aedc fix tests 2022-03-11 17:15:47 -08:00
Balu Gajjala
9a8746842a Fix failed tests - 1 2022-03-11 13:53:27 -08:00
Darren Tucker
2893c5e764 Resync fmt_scaled. with OpenBSD.
Fixes underflow reported in bz#3401.
2022-03-11 18:43:58 +11:00
Darren Tucker
5ae31a0fdd Provide killpg implementation.
Based on github PR#301 for Tandem NonStop.
2022-03-09 09:41:56 +11:00
Darren Tucker
c41c84b439 Check for missing ftruncate prototype.
From github PR#301 in conjunction with rsbeckerca.
2022-03-09 09:29:30 +11:00
Andrew
f392f20ecd
3rd party notices for releases (#575) 2022-03-08 12:42:44 -08:00
Darren Tucker
8cf5275452 Default to not using sandbox when cross compiling.
On most systems poll(2) does not work when the number of FDs is reduced
with setrlimit, so assume it doesn't when cross compiling and we can't
run the test.  bz#3398.
2022-03-08 20:04:06 +11:00
bagajjal
2d3ca752f9
V8 9 test (#574) 2022-03-07 10:48:41 -08:00
Balu Gajjala
9a85082806 V8.9 build errors, unit tests successful 2022-03-04 18:40:49 -08:00
bagajjal
dcbfaa6d15
Create ssh-sk-helper.exe in user session (#573) 2022-03-04 16:59:08 -08:00
Tess Gauthier
a3023c2d09
modify key event logic to fix ctrl+space not being sent (#569) 2022-03-02 10:40:36 -08:00
Andrew
4458bbc132
Merge pull request #571 from anmenaga/notice
Added NOTICE
2022-02-28 23:59:28 -08:00
unknown
346de3ea8e Added NOTICE 2022-02-28 23:58:28 -08:00
djm@openbsd.org
379b30120d upstream: pack pollfd array before server_accept_loop() ppoll()
call, and terminate sshd if ppoll() returns errno==EINVAL

avoids spin in ppoll when MaxStartups > RLIMIT_NOFILE, reported by
Daniel Micay

feedback/ok deraadt

OpenBSD-Commit-ID: dbab1c24993ac977ec24d83283b8b7528f7c2c15
2022-03-01 13:01:01 +11:00
naddy@openbsd.org
eceafbe0bd upstream: include rejected signature algorithm in error message and
not the (useless) key type; ok djm@

OpenBSD-Commit-ID: d0c0f552a4d9161203e07e95d58a76eb602a76ff
2022-03-01 13:00:26 +11:00
dtucker@openbsd.org
f2f3269423 upstream: Remove the char * casts from arguments to do_lstat,
do_readdir and do_stat paths since the underlying functions now take a const
char *. Patch from vapier at gentoo.org.

OpenBSD-Commit-ID: 9e4d964dbfb0ed683a2a2900711b88e7f1c0297b
2022-03-01 13:00:26 +11:00
djm@openbsd.org
4a66dac052 upstream: save an unneccessary alloc/free, based on patch from
Martin Vahlensieck; ok dtucker@

OpenBSD-Commit-ID: 90ffbf1f837e509742f2c31a1fbf2c0fd376fd5f
2022-03-01 13:00:26 +11:00
Darren Tucker
6f117cb151 Remove unused ivbits argument from chacha_keysetup 2022-03-01 09:02:06 +11:00
Darren Tucker
15974235dd Add OPENBSD ORIGINAL marker. 2022-03-01 09:00:20 +11:00
Darren Tucker
f2ff669347 No unused param warnings for clang-12 and gcc-11.
These have too many false positives in -Werror tests on the github CI
since we often provide empty stub functions for functionality not needed
for particular configurations.
2022-02-28 22:21:36 +11:00
Darren Tucker
96558ecd87 Add debian-i386 test target. 2022-02-26 14:10:41 +11:00
Darren Tucker
284b6e5394 Allow ppoll_time64 in seccomp sandbox.
Should fix sandbox violations on (some? at least i386 and armhf) 32bit
Linux platforms.  Patch from chutzpahu at gentoo.org and cjwatson at
debian.org via bz#3396.
2022-02-26 14:06:14 +11:00
Darren Tucker
0132056efa Improve handling of _getshort and _getlong.
If the system native ones are exactly as required then use them,
otherwise use the local versions mapped to another name to prevent
name collisions.
2022-02-25 19:47:48 +11:00
Darren Tucker
8e206e0dd6 Constify utimes in compat library to match specs.
Patch from vapier at chromium.org.
2022-02-25 15:14:22 +11:00
Darren Tucker
1b2920e3b6 ANSIfy getshort and getlong.
These functions appear to have come from OpenBSD's lib/libc/net/res_comp.c
which made this change in 2005.
2022-02-25 13:50:56 +11:00
Darren Tucker
54a86f4f6e Use PICFLAG instead of hard coding -fPIC. 2022-02-25 13:23:04 +11:00
Balu Gajjala
ee54e6bd06 Merge upstream V8_9 2022-02-24 16:57:16 -08:00
Darren Tucker
3016ba4703 Add tests for latest releases of {Libre,Open}SSL. 2022-02-25 11:39:34 +11:00
Colin Watson
f107467179 Improve detection of -fzero-call-used-regs=all support
GCC doesn't tell us whether this option is supported unless it runs into
the situation where it would need to emit corresponding code.
2022-02-25 11:24:04 +11:00
djm@openbsd.org
2ebf478107 upstream: free(3) wants stdlib.h
OpenBSD-Commit-ID: 227a8c70a95b4428c49e46863c9ef4bd318a3b8a
2022-02-24 08:24:35 +11:00