deraadt@openbsd.org
dc5dc45662
upstream commit
...
These shutdown() SHUT_RDWR are not needed before close()
ok djm markus claudio
Upstream-ID: 36f13ae4ba10f5618cb9347933101eb4a98dbcb5
2017-06-01 14:54:46 +10:00
markus@openbsd.org
1e0cdf8efb
upstream commit
...
clear session keys from memory; ok djm@
Upstream-ID: ecd178819868975affd5fd6637458b7c712b6a0f
2017-06-01 14:54:46 +10:00
markus@openbsd.org
92e9fe6331
upstream commit
...
remove now obsolete ctx from ssh_dispatch_run; ok djm@
Upstream-ID: 9870aabf7f4d71660c31fda91b942b19a8e68d29
2017-06-01 14:53:33 +10:00
markus@openbsd.org
17ad5b3460
upstream commit
...
use the ssh_dispatch_run_fatal variant
Upstream-ID: 28c5b364e37c755d1b22652b8cd6735a05c625d8
2017-05-31 18:39:10 +10:00
djm@openbsd.org
39896b7773
upstream commit
...
another ctx => ssh conversion (in GSSAPI code)
Upstream-ID: 4d6574c3948075c60608d8e045af42fe5b5d8ae0
2017-05-31 15:09:24 +10:00
Damien Miller
6116bd4ed3
fix conversion of kexc25519s.c to struct ssh too
...
git cvsimport missed this commit for some reason
2017-05-31 14:56:07 +10:00
djm@openbsd.org
d40dbdc85b
upstream commit
...
spell out that custom options/extensions should follow the
usual SSH naming rules, e.g. "extension@example.com"
Upstream-ID: ab326666d2fad40769ec96b5a6de4015ffd97b8d
2017-05-31 14:30:52 +10:00
djm@openbsd.org
2a108277f9
upstream commit
...
one more void *ctx => struct ssh *ssh conversion
Upstream-ID: d299d043471c10214cf52c03daa10f1c232759e2
2017-05-31 14:17:41 +10:00
djm@openbsd.org
c04e979503
upstream commit
...
fix possible OOB strlen() in SOCKS4A hostname parsing;
ok markus@
Upstream-ID: c67297cbeb0e5a19d81752aa18ec44d31270cd11
2017-05-31 10:51:09 +10:00
jmc@openbsd.org
a3bb250c93
upstream commit
...
tweak previous;
Upstream-ID: 66987651046c42d142f7318c9695fb81a6d14031
2017-05-31 10:51:09 +10:00
bluhm@openbsd.org
1112b534a6
upstream commit
...
Add RemoteCommand option to specify a command in the
ssh config file instead of giving it on the client's command line. This
command will be executed on the remote host. The feature allows to automate
tasks using ssh config. OK markus@
Upstream-ID: 5d982fc17adea373a9c68cae1021ce0a0904a5ee
2017-05-31 10:51:09 +10:00
markus@openbsd.org
eb272ea409
upstream commit
...
switch auth2 to ssh_dispatch API; ok djm@
Upstream-ID: a752ca19e2782900dd83060b5c6344008106215f
2017-05-31 10:50:33 +10:00
markus@openbsd.org
5a146bbd4f
upstream commit
...
switch auth2-none.c to modern APIs; ok djm@
Upstream-ID: 07252b58e064d332214bcabbeae8e08c44b2001b
2017-05-31 10:50:20 +10:00
markus@openbsd.org
60306b2d2f
upstream commit
...
switch auth2-passwd.c to modern APIs; ok djm@
Upstream-ID: cba0a8b72b4f97adfb7e3b3fd2f8ba3159981fc7
2017-05-31 10:50:05 +10:00
markus@openbsd.org
eb76698b91
upstream commit
...
switch auth2-hostbased.c to modern APIs; ok djm@
Upstream-ID: 146af25c36daeeb83d5dbbb8ca52b5d25de88f4e
2017-05-31 10:50:05 +10:00
markus@openbsd.org
2ae666a8fc
upstream commit
...
protocol handlers all get struct ssh passed; ok djm@
Upstream-ID: 0ca9ea2a5d01a6d2ded94c5024456a930c5bfb5d
2017-05-31 10:50:05 +10:00
markus@openbsd.org
94583beb24
upstream commit
...
ssh: pass struct ssh to auth functions, too; ok djm@
Upstream-ID: d13c509cc782f8f19728fbea47ac7cf36f6e85dd
2017-05-31 10:49:50 +10:00
markus@openbsd.org
5f4082d886
upstream commit
...
sshd: pass struct ssh to auth functions; ok djm@
Upstream-ID: b00a80c3460884ebcdd14ef550154c761aebe488
2017-05-31 10:49:50 +10:00
markus@openbsd.org
7da5df11ac
upstream commit
...
remove unused wrapper functions from key.[ch]; ok djm@
Upstream-ID: ea0f4016666a6817fc11f439dd4be06bab69707e
2017-05-31 10:49:50 +10:00
markus@openbsd.org
ff7371afd0
upstream commit
...
sshkey_new() might return NULL (pkcs#11 code only); ok
djm@
Upstream-ID: de9f2ad4a42c0b430caaa7d08dea7bac943075dd
2017-05-31 10:47:31 +10:00
markus@openbsd.org
beb965bbc5
upstream commit
...
switch sshconnect.c to modern APIs; ok djm@
Upstream-ID: 27be17f84b950d5e139b7a9b281aa487187945ad
2017-05-31 10:47:31 +10:00
markus@openbsd.org
00ed75c92d
upstream commit
...
switch auth2-pubkey.c to modern APIs; with & ok djm@
Upstream-ID: 8f08d4316eb1b0c4ffe4a206c05cdd45ed1daf07
2017-05-31 10:47:31 +10:00
markus@openbsd.org
54d90ace1d
upstream commit
...
switch from Key typedef with struct sshkey; ok djm@
Upstream-ID: 3067d33e04efbe5131ce8f70668c47a58e5b7a1f
2017-05-31 10:47:31 +10:00
markus@openbsd.org
c221219b1f
upstream commit
...
remove ssh1 references; ok djm@
Upstream-ID: fc23b7578e7b0a8daaec72946d7f5e58ffff5a3d
2017-05-31 10:46:44 +10:00
markus@openbsd.org
afbfa68fa1
upstream commit
...
revise sshkey_load_public(): remove ssh1 related
comments, remove extra open()/close() on keyfile, prevent leak of 'pub' if
'keyp' is NULL, replace strlcpy+cat with asprintf; ok djm@
Upstream-ID: 6175e47cab5b4794dcd99c1175549a483ec673ca
2017-05-31 10:46:03 +10:00
markus@openbsd.org
813f55336a
upstream commit
...
sshbuf_consume: reset empty buffer; ok djm@
Upstream-ID: 0d4583ba57f69e369d38bbd7843d85cac37fa821
2017-05-27 15:35:52 +10:00
markus@openbsd.org
6cf711752c
upstream commit
...
remove SSH_CHANNEL_XXX_DRAINING (ssh1 only); ok djm@
Upstream-ID: e2e225b6ac67b84dd024f38819afff2554fafe42
2017-05-27 15:35:52 +10:00
markus@openbsd.org
364f0d5ede
upstream commit
...
remove channel_input_close_confirmation (ssh1 only); ok
djm@
Upstream-ID: 8e7c8c38f322d255bb0294a5c0ebef53fdf576f1
2017-05-27 15:35:52 +10:00
djm@openbsd.org
8ba0fd4008
upstream commit
...
fix references to obsolete v00 cert format; spotted by
Jakub Jelen
Upstream-ID: 7600ce193ab8fd19451acfe24fc2eb39d46b2c4f
2017-05-27 15:35:52 +10:00
Oleg S
1d53705be5
win32: Fix enumerate root dir content on SFTP-server ( #148 )
...
https://github.com/PowerShell/Win32-OpenSSH/issues/539
2017-05-26 15:54:34 -07:00
bagajjal
4879602b69
Docker#666 keyscan#731 posixcompatnewunittests ( #152 )
...
docker ssh issue
PowerShell/Win32-OpenSSH#666
a) fdopen changes to accept the /dev/null device
b) fix the select (using same fdset as readfdset, exceptfdset) issue with the unix opensssh code.
changed keyscan pester test to refer to localhost (127.0.0.1) instead of GitHub.com
PowerShell/Win32-OpenSSH#731
Fix the ASSERT_HANDLE issue..
ASSERT_HANDLE should fail if handle is either NULL or INVALID_HANDLE.
Added new testcases for the null device.
2017-05-26 15:40:59 -07:00
Yanbing
5989efcad6
fix issue when checking file permission and generate key under system context ( #150 )
...
PowerShell/Win32-OpenSSH#736
PowerShell/Win32-OpenSSH#735
2017-05-26 14:24:23 -07:00
bagajjal
921aafc728
fix for #561 and code cleanup ( #151 )
...
https://github.com/PowerShell/Win32-OpenSSH/issues/561
2017-05-25 12:41:44 -07:00
Manoj Ampalam
4df71693c2
Fix agent to recognize calls from sshd service ( #149 )
...
https://github.com/PowerShell/Win32-OpenSSH/issues/734
2017-05-24 21:52:20 -07:00
Mike Frysinger
dcc714c65c
configure: actually set cache vars when cross-compiling
...
The cross-compiling fallback message says it's assuming the test
passed, but it didn't actually set the cache var which causes
later tests to fail.
2017-05-25 14:34:52 +10:00
Manoj Ampalam
2060a413d5
updated .gitignore to ignore LibreSSL
2017-05-23 22:02:34 -07:00
Yanbing
81bcaaa7cf
Add mode support in open() and onboard file perm related changes and tests ( #145 )
...
PowerShell/Win32-OpenSSH#710
PowerShell/Win32-OpenSSH#725
PowerShell/Win32-OpenSSH#729
PowerShell/Win32-OpenSSH#731
PowerShell/Win32-OpenSSH#732
2017-05-23 21:45:38 -07:00
Markus Kuhn
a4250afadc
strip drive letter from %HOMEPATH% ( #103 )
...
Many programs access the user's home directory as %HOMEDRIVE%%HOMEPATH%.
Without removing the drive letter from %HOMEPATH%, the result of this
concatenation is something like "C:C:\Users\mgkuhn" and results
in applications not finding the home directory.
After this change, OpenSSH will set %HOMEPATH% without a drive letter,
like Windows does, as documented at
https://support.microsoft.com/en-us/help/101507/how-windows-nt-determines-a-user-s-home-directory
I also added a safety check to test that pw_dir_w is not empty.
2017-05-23 12:04:23 -07:00
bagajjal
e296463fc8
Add new unit testcases ( #139 )
...
PowerShell/Win32-OpenSSH#605
PowerShell/Win32-OpenSSH#602
PowerShell/Win32-OpenSSH#603
2017-05-22 22:50:51 -07:00
bagajjal
4dbee0d15a
Onboard sshkeyscan ( #143 )
...
PowerShell/Win32-OpenSSH#124
PowerShell/Win32-OpenSSH#728
2017-05-22 22:18:41 -07:00
Manoj Ampalam
ba7cf86417
Merge branch 'master' of https://github.com/openssh/openssh-portable into latestw
2017-05-19 23:08:42 -07:00
djm@openbsd.org
947a3e829a
upstream commit
...
there's no reason to artificially limit the key path
here, just check that it fits PATH_MAX; spotted by Matthew Patton
Upstream-ID: 858addaf2009c9cf04d80164a41b2088edb30b58
2017-05-20 14:30:14 +10:00
djm@openbsd.org
773224802d
upstream commit
...
Now that we no longer support SSHv1, replace the contents
of this file with a pointer to
https://tools.ietf.org/html/draft-miller-ssh-agent-00 It's better edited,
doesn't need to document stuff we no longer implement and does document stuff
that we do implement (RSA SHA256/512 signature flags)
Upstream-ID: da8cdc46bbcc266efabd565ddddd0d8e556f846e
2017-05-20 14:30:14 +10:00
Manoj Ampalam
894f6dd79c
Changes to remove Impersonation Privilege requirement in sshd ( #142 )
...
https://github.com/PowerShell/Win32-OpenSSH/issues/726
2017-05-18 22:57:42 -07:00
Yanbing
afc6ca91f7
Fixes for #648 and #718
...
PowerShell/Win32-OpenSSH#648
PowerShell/Win32-OpenSSH#718
2017-05-18 12:15:18 -07:00
djm@openbsd.org
54cd41a466
upstream commit
...
allow LogLevel in sshd_config Match blocks; ok dtucker
bz#2717
Upstream-ID: 662e303be63148f47db1aa78ab81c5c2e732baa8
2017-05-17 11:25:22 +10:00
djm@openbsd.org
277abcda3f
upstream commit
...
remove duplicate check; spotted by Jakub Jelen
Upstream-ID: 30c2996c1767616a8fdc49d4cee088efac69c3b0
2017-05-17 11:25:22 +10:00
djm@openbsd.org
adb47ce839
upstream commit
...
mention that Ed25519 keys are valid as CA keys; spotted
by Jakub Jelen
Upstream-ID: d3f6db58b30418cb1c3058211b893a1ffed3dfd4
2017-05-17 11:25:22 +10:00
Yanbing
79662b9a6f
Suspended File permissions logic, cranked version.
2017-05-15 22:08:01 -07:00
Manoj Ampalam
b4a38796b9
Fixed ssh client title
...
https://github.com/PowerShell/Win32-OpenSSH/issues/722
2017-05-15 11:25:41 -07:00