]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
dtucker@openbsd.org [Mon, 29 Sep 2025 21:29:22 +0000 (21:29 +0000)]
upstream: Include misc.h. Removes diff vs portable.
OpenBSD-Commit-ID:
8aa48451fe5c37f04a339450c4ed9cfb8f4c288f
dtucker@openbsd.org [Mon, 29 Sep 2025 21:28:33 +0000 (21:28 +0000)]
upstream: Sort headers as per KNF. Removes diff vs portable.
OpenBSD-Commit-ID:
55f5b9eaeb826a25cfb506a78136094275a71bcb
dtucker@openbsd.org [Mon, 29 Sep 2025 07:40:55 +0000 (07:40 +0000)]
upstream: Null out keys after freeing in tests in the case where we
potentially reuse the variable. Fixes Coverity CID 405057.
OpenBSD-Regress-ID:
c52e86502b33bfa6e448448a74a0217dd519dd58
djm@openbsd.org [Mon, 29 Sep 2025 03:17:54 +0000 (03:17 +0000)]
upstream: avoid spurious error message when loading certificates
only bz3869
OpenBSD-Commit-ID:
e7848fec50d15cc142fed946aa8f79abef3c5be7
djm@openbsd.org [Mon, 29 Sep 2025 02:32:15 +0000 (02:32 +0000)]
upstream: kbd-interactive device names should be matched against
the full device name, not a prefix. Doesn't matter in practice as there is
only one kbd-int device supported (PAM xor BSD auth), and an attacker would
still need to successfully authenticate against an incorrectly-selected
device.
reported by ashamedbit, NobleMathews; ok deraadt@
OpenBSD-Commit-ID:
cf75d4f99405fbb41354c4ae724a3b39a3b58f82
jsg@openbsd.org [Thu, 25 Sep 2025 12:52:21 +0000 (12:52 +0000)]
upstream: avoid use-after-free in update_krl_from_file() found with
clang scan-build, ok dtucker@
OpenBSD-Commit-ID:
8ec86eca573740c94d5bc7e252959174555f4eb8
Darren Tucker [Sat, 27 Sep 2025 10:20:34 +0000 (20:20 +1000)]
Stop testing OpenBSD ubsan until fixed upstream.
dtucker@openbsd.org [Fri, 26 Sep 2025 04:40:45 +0000 (04:40 +0000)]
upstream: Use $OBJ for temp file in maxstartups idempotence test.
Fixes test in -portable when run out-of-tree.
OpenBSD-Regress-ID:
8578be08238af4abe2dc91af1c199f7f71f1a7a2
Darren Tucker [Fri, 26 Sep 2025 12:28:13 +0000 (22:28 +1000)]
Shorten workflow names to fit in a single line.
Darren Tucker [Fri, 26 Sep 2025 12:26:33 +0000 (22:26 +1000)]
Update link to oss-fuzz bug tracker.
Remove 9.8 branch.
dtucker@openbsd.org [Thu, 25 Sep 2025 22:17:29 +0000 (22:17 +0000)]
upstream: Check return codes of sshbuf functions.
Fixes Coverity CIDs 405059 and 405061.
OpenBSD-Regress-ID:
defa55d32892172251bbd5efd15731ce55888247
Darren Tucker [Thu, 25 Sep 2025 22:23:21 +0000 (08:23 +1000)]
Replace hand-rolled modulo with arc4random_uniform.
Fixes potential modulo-by-zero UB flagged by Coverity CID 405068
Darren Tucker [Thu, 25 Sep 2025 07:50:07 +0000 (17:50 +1000)]
Remove status bits from OpenSSL >=3 version check.
OpenSSL traditionally did not guarantee ABI compatibility across release
(and development) versions. Because of this, OpenSSH checked the lower 4
"status" bits returned by OpenSSL_version_num(), which were originally
set to 0 for development versions and 0xf for release versions and, if
they did not match, would report the discrepancy and exit.
OpenSSL (unintentionally) changed these bits in the 3.0.0 and subsequent
3.x releases, setting them to zero in the release versions (which happened
to also match the documentation), then changed them back in the 3.5.3
release. If OpenSSL was upgraded to (or from) this version without
recompiling OpenSSH, it would cause OpenSSH flag it as potentially
incompatible and refuse to use it. Ultimately OpenSSL rolled this
back, but the check now has no value so is being removed for OpenSSL
versions >=3.
bz#3865 and https://github.com/openssl/openssl/issues/28575, ok djm@
Darren Tucker [Thu, 25 Sep 2025 08:06:55 +0000 (18:06 +1000)]
Update pledge() interface to match current OpenBSD.
ok djm@
Darren Tucker [Tue, 23 Sep 2025 12:12:19 +0000 (22:12 +1000)]
Merge all putty tests into a single test.
The lets us reuse the built OpenSSH binaries and replaces 12*4min of
tests with a single 14min one.
Darren Tucker [Thu, 25 Sep 2025 08:20:53 +0000 (18:20 +1000)]
Add #ifdefs in pwfree to match those in pwcopy.
Fixes build on many platforms.
djm@openbsd.org [Thu, 25 Sep 2025 07:05:11 +0000 (07:05 +0000)]
upstream: fix some one-off leaks in ssh.c; ok dtucker@
OpenBSD-Commit-ID:
bf3c27ffe4b3cccb6553b554ec4c04929065a2bc
djm@openbsd.org [Thu, 25 Sep 2025 07:04:38 +0000 (07:04 +0000)]
upstream: fix some one-off leaks in ssh-keygen; ok dtucker@
OpenBSD-Commit-ID:
32f51289c93246474659aa49067926fcab9e02e8
djm@openbsd.org [Thu, 25 Sep 2025 07:00:43 +0000 (07:00 +0000)]
upstream: fix some leaks in ssh-add; feedback/ok dtucker@
OpenBSD-Commit-ID:
441302917de31a128c1d6d63acccc67042fcf349
djm@openbsd.org [Thu, 25 Sep 2025 06:57:54 +0000 (06:57 +0000)]
upstream: fix some leaks; feedback/ok dtucker@
OpenBSD-Commit-ID:
05bdbc2e494b87a4a79e509020bd8249c86a4ff0
djm@openbsd.org [Thu, 25 Sep 2025 06:45:50 +0000 (06:45 +0000)]
upstream: wait for the unprivileged sshd-auth process to exit
before closing the fd it uses to report log messages
This avoids a race where the child process notices the
fd was closed before exiting and spams the logs.
ok dtucker@
OpenBSD-Commit-ID:
7cddaa41be3b955e6bed570900db7ab8817b1e76
djm@openbsd.org [Thu, 25 Sep 2025 06:33:19 +0000 (06:33 +0000)]
upstream: add some functions to free various structs, including
channels data and packet state; ok dtucker@ tb@
OpenBSD-Commit-ID:
a8b3705309d632cdae370d4147a03e703087b0d1
djm@openbsd.org [Thu, 25 Sep 2025 06:31:42 +0000 (06:31 +0000)]
upstream: fix leaks of config objects in
mm_decode_activate_server_options ok dtucker@ tb@
OpenBSD-Commit-ID:
211f4d7d02e847bd1bcb460f6beb11658809a742
djm@openbsd.org [Thu, 25 Sep 2025 06:25:38 +0000 (06:25 +0000)]
upstream: clarify intent and avoid (harmess, defined behaviour)
unsigned underflow. ok tb@
OpenBSD-Commit-ID:
b73bf5f1f381c3e4561a6cc706fb1cd77c939cd8
jsg@openbsd.org [Thu, 25 Sep 2025 06:23:19 +0000 (06:23 +0000)]
upstream: consistently use NULL for null pointer constants found
with sparse, ok djm@
OpenBSD-Commit-ID:
1067504b63732d809d0d57ad4bc626818d112772
jsg@openbsd.org [Thu, 25 Sep 2025 02:15:39 +0000 (02:15 +0000)]
upstream: remove unneeded externs ok djm@
OpenBSD-Commit-ID:
fe553193e910a122505142a4e1db7358cc1ae653
jsg@openbsd.org [Thu, 25 Sep 2025 02:12:16 +0000 (02:12 +0000)]
upstream: remove prototype for removed ssh_packet_set_tos() ok
djm@
OpenBSD-Commit-ID:
396f82995074ef4d7b9ce44168266ef4640d9985
jsg@openbsd.org [Wed, 24 Sep 2025 00:51:28 +0000 (00:51 +0000)]
upstream: spelling; ok dtucker@
OpenBSD-Commit-ID:
93870117b0153859dd8baa80b97e44d4558c786b
Darren Tucker [Tue, 23 Sep 2025 06:51:34 +0000 (16:51 +1000)]
Merge VM tests into a single workflow file.
Should make it easier to manage, although it may cause a few extra runs.
Darren Tucker [Tue, 23 Sep 2025 06:38:45 +0000 (16:38 +1000)]
Test openssl-3.6 branch not beta1.
Darren Tucker [Tue, 23 Sep 2025 05:51:14 +0000 (15:51 +1000)]
Test openssl-3.6.0-beta1.
Darren Tucker [Tue, 23 Sep 2025 01:32:57 +0000 (11:32 +1000)]
Specify rpath when building OpenSSL.
Darren Tucker [Mon, 22 Sep 2025 05:26:17 +0000 (15:26 +1000)]
Factor out OpenSSL install and test more versions.
Move OpenSSL installation into its own script with a "-a" option to
install the "next" version to test for ABI compatibility.
Darren Tucker [Mon, 22 Sep 2025 06:55:49 +0000 (16:55 +1000)]
Exclude generated openbsd-compat/include directory.
Darren Tucker [Sat, 20 Sep 2025 05:07:36 +0000 (15:07 +1000)]
Add OpenSSL 3.x ABI cross-compatibility test.
Darren Tucker [Sat, 20 Sep 2025 05:05:19 +0000 (15:05 +1000)]
Add tests for OpenSSL 3.4 and 3.5 versions.
Darren Tucker [Sat, 20 Sep 2025 05:53:04 +0000 (15:53 +1000)]
Build OpenSSL with -j4 to speed it up.
Darren Tucker [Sat, 20 Sep 2025 05:16:30 +0000 (15:16 +1000)]
Rerun tests if run_tests.sh changes.
djm@openbsd.org [Fri, 19 Sep 2025 01:32:45 +0000 (01:32 +0000)]
upstream: log at level INFO when PerSourcePenalties actually blocks
access to a source address range. Previously this was logged at level
VERBOSE, which hid enforcement actions under default config settings.
ok dtucker, markus
OpenBSD-Commit-ID:
ea2b0d7c2253ff5205719d74b526cf2870df894d
Darren Tucker [Wed, 17 Sep 2025 07:41:41 +0000 (17:41 +1000)]
Whitespace.
Darren Tucker [Wed, 17 Sep 2025 07:33:25 +0000 (17:33 +1000)]
Move Gihub VMs to their own status line.
Darren Tucker [Tue, 16 Sep 2025 13:00:14 +0000 (23:00 +1000)]
Use relative URLs for status
Darren Tucker [Mon, 15 Sep 2025 07:21:15 +0000 (17:21 +1000)]
Add VM test targets via vmaction on Github.
djm@openbsd.org [Mon, 15 Sep 2025 03:00:22 +0000 (03:00 +0000)]
upstream: memory leaks in unit tests
OpenBSD-Regress-ID:
af11ac7b8034b99ca324af4dae1ef5cd7700b273
djm@openbsd.org [Mon, 15 Sep 2025 05:17:37 +0000 (05:17 +0000)]
upstream: fix leaks of struct sftp_conn in scp; ok dtucker@
OpenBSD-Commit-ID:
76bea50b5b87b750c3771bf80feb6067d994a9d2
djm@openbsd.org [Mon, 15 Sep 2025 04:52:41 +0000 (04:52 +0000)]
upstream: leak of principals file lines; ok dtucker@
OpenBSD-Commit-ID:
918bf1b70e5a969059300f3c23d45911690d9015
djm@openbsd.org [Mon, 15 Sep 2025 04:52:12 +0000 (04:52 +0000)]
upstream: leak of authentication options at exit; ok dtucker@
OpenBSD-Commit-ID:
ba559799c2ff9b10afc3abefb1797c0843a6ff24
djm@openbsd.org [Mon, 15 Sep 2025 04:51:35 +0000 (04:51 +0000)]
upstream: memleak of keys not used for authentication; ok
dtucker@
OpenBSD-Commit-ID:
ddfda79d243150fbd382d8f2cd75a90a072b3669
djm@openbsd.org [Mon, 15 Sep 2025 04:50:42 +0000 (04:50 +0000)]
upstream: memleak of certificate path; ok dtucker@
OpenBSD-Commit-ID:
90dc5390f2756ba339e2e6df54d4b8651d64c1e7
djm@openbsd.org [Mon, 15 Sep 2025 04:49:41 +0000 (04:49 +0000)]
upstream: memleak of hostkey when downgrading host cert->key; ok
dtucker
OpenBSD-Commit-ID:
f6f1f38a8ec144fb615434f6877066cf4610b826
djm@openbsd.org [Mon, 15 Sep 2025 04:49:00 +0000 (04:49 +0000)]
upstream: memleak of editline history; ok dtucker@
OpenBSD-Commit-ID:
a244c54eb074cf7fbe28f7ac4f03ace270f7a999
djm@openbsd.org [Mon, 15 Sep 2025 04:48:29 +0000 (04:48 +0000)]
upstream: memleak of rfwd callback context; ok dtucker@
OpenBSD-Commit-ID:
70b2aafeaace90703dd16a44a2a0b723d9155f33
djm@openbsd.org [Mon, 15 Sep 2025 04:47:49 +0000 (04:47 +0000)]
upstream: memleaks of request packet and hostkeys blob; ok
dtucker@
OpenBSD-Commit-ID:
313b13a8e36b4ca8e064ee56792e67e0670a386a
djm@openbsd.org [Mon, 15 Sep 2025 04:41:20 +0000 (04:41 +0000)]
upstream: memleak of KRL revoked certs struct; ok dtucker
OpenBSD-Commit-ID:
f319868e0b2de49c41c735e75b87c403f009f5f9
djm@openbsd.org [Mon, 15 Sep 2025 04:40:34 +0000 (04:40 +0000)]
upstream: memleak of kex->server_sig_algs; ok dtucker@
OpenBSD-Commit-ID:
41a3f64edd2c9b8addb2e445514ae25c24819e2c
djm@openbsd.org [Mon, 15 Sep 2025 04:39:58 +0000 (04:39 +0000)]
upstream: fix memleak of channel forwarding permissions; ok
dtucker@
OpenBSD-Commit-ID:
069745547109bc8fcc09fab5b19c53599cae99fd
djm@openbsd.org [Mon, 15 Sep 2025 04:39:15 +0000 (04:39 +0000)]
upstream: when merging auth options into the active set, don't
leak the old struct sshauthopt; ok dtucker@
OpenBSD-Commit-ID:
c6bfd7bc2932e37f811b3c53272c3b919d33e75b
djm@openbsd.org [Mon, 15 Sep 2025 04:38:00 +0000 (04:38 +0000)]
upstream: fix memleak when applying certificate options; ok
dtucker
OpenBSD-Commit-ID:
36c219dcc05f4df82a0f9c500bdf5dbfea925289
djm@openbsd.org [Thu, 11 Sep 2025 07:23:32 +0000 (07:23 +0000)]
upstream: disable ssh-add autoexpiry of certificates when testing
expired certificates
OpenBSD-Regress-ID:
64aadd23d37fd0b3a06498151f2cf83be7ac342c
djm@openbsd.org [Thu, 11 Sep 2025 07:22:37 +0000 (07:22 +0000)]
upstream: correct getopt() string
OpenBSD-Commit-ID:
05ef9581a3dab32ec93aa5b9c3349ed1e7da9ec8
djm@openbsd.org [Thu, 11 Sep 2025 03:29:58 +0000 (03:29 +0000)]
upstream: need time.h for time(3)
OpenBSD-Commit-ID:
530964039cccab679432b6c5b28d2b0aa9760b00
djm@openbsd.org [Thu, 11 Sep 2025 02:54:42 +0000 (02:54 +0000)]
upstream: When adding certificates to an agent, set the expiry to
the certificate expiry time plus a short (5 min) grace period.
This will cause the agent to automtically remove certificates shortly
after they expire.
A new ssh-add -N option disables this behaviour.
Feedback/ok deraadt@
OpenBSD-Commit-ID:
92fed1bba1025069ad45deebb534be7530e181df
jsg@openbsd.org [Mon, 8 Sep 2025 00:31:54 +0000 (00:31 +0000)]
upstream: remove unused 0-sized files; ok deraadt@
OpenBSD-Commit-ID:
7e8178786157e863f6ff63c5d55200d7b6b04f9e
dtucker@openbsd.org [Fri, 5 Sep 2025 10:34:35 +0000 (10:34 +0000)]
upstream: Tabs->spaces. Removes diff vs portable.
OpenBSD-Commit-ID:
06598021a9f08188dab29ac956b2baa002a0ff85
Tim Rice [Mon, 8 Sep 2025 19:53:10 +0000 (12:53 -0700)]
modified: regress/rekey.sh
Fix for when building out of tree.
Darren Tucker [Sun, 7 Sep 2025 03:35:22 +0000 (13:35 +1000)]
Accept OpenSSL 4.0.0-dev versions.
They seem to work, at least for now.
Maxim Khon [Mon, 18 Aug 2025 12:05:42 +0000 (12:05 +0000)]
Use SSH_TUN_COMPAT_AF on FreeBSD.
Otherwise tun forwarding from other OSes fails as soon as the first IPv6
message is sent by the other side (which is usually a Router Solicitation
ICMPv6 message which is sent as soon as the interface is up): all other
OS'es use SSH_TUN_COMPAT_AF or SSH_TUN_PREPEND_AF which effectively uses
OpenBSD AF_INET/AF_INET6 values.
Darren Tucker [Fri, 5 Sep 2025 11:32:30 +0000 (21:32 +1000)]
Check for nlist function.
Check for nlist function presence before attenmpting to use it instead
of relying on the presence of the nlist.h header. Mac OS X, in particular
has the header, but only has the function in the 32bit libraries.
dtucker@openbsd.org [Fri, 5 Sep 2025 10:23:55 +0000 (10:23 +0000)]
upstream: Order includes as per KNF and add time.h. Removes diff
vs portable.
OpenBSD-Commit-ID:
38043f0bfa17c48ef6d1a744c2834b4405bc9311
dtucker@openbsd.org [Fri, 5 Sep 2025 10:17:21 +0000 (10:17 +0000)]
upstream: Order headers as per KNF. Removes diff vs portable.
OpenBSD-Commit-ID:
4df519fd9fa13ce9653adf7a3d1076e20591d886
dtucker@openbsd.org [Fri, 5 Sep 2025 10:01:35 +0000 (10:01 +0000)]
upstream: Order headers as per KNF.
OpenBSD-Commit-ID:
7156b69b0364c68e181e0f6fa17c0f05c72e8670
Darren Tucker [Fri, 5 Sep 2025 10:39:16 +0000 (20:39 +1000)]
Resync header order with upstream.
Darren Tucker [Fri, 5 Sep 2025 10:37:04 +0000 (20:37 +1000)]
Resync header order with upstream.
Darren Tucker [Fri, 5 Sep 2025 10:30:20 +0000 (20:30 +1000)]
Sync includes with upstream.
Darren Tucker [Fri, 5 Sep 2025 10:26:14 +0000 (20:26 +1000)]
Move ssh-pkcs11.h include to match upstream.
Darren Tucker [Fri, 5 Sep 2025 10:20:27 +0000 (20:20 +1000)]
Reorder includes to match upstream.
dtucker@openbsd.org [Fri, 5 Sep 2025 09:58:08 +0000 (09:58 +0000)]
upstream: Order headers as per KNF. Removes diff vs portable.
OpenBSD-Commit-ID:
db72be57429418f6a4319bbe34c98fc103e11ce0
dtucker@openbsd.org [Fri, 5 Sep 2025 09:49:26 +0000 (09:49 +0000)]
upstream: Order headers as per KNF. Also removes diff vs
-portable.
OpenBSD-Commit-ID:
2061307dc938712e524bc9da48a52f545e43670e
dtucker@openbsd.org [Fri, 5 Sep 2025 09:31:31 +0000 (09:31 +0000)]
upstream: Remove unused rmd160.h header. ripemd160 support was
removed in 2017.
OpenBSD-Commit-ID:
937fca21498b921adf6e04bac120f4a2e7975b3c
Darren Tucker [Fri, 5 Sep 2025 10:07:16 +0000 (20:07 +1000)]
Create replacement nlist.h if needed.
Remove #ifdef HAVE_NLIST_H wrapper. ok djm@
Darren Tucker [Fri, 5 Sep 2025 09:55:20 +0000 (19:55 +1000)]
Create replacement endian.h if needed.
Remove #ifdef HAVE_ENDIAN_H wrapper. ok djm@
Darren Tucker [Fri, 5 Sep 2025 09:52:48 +0000 (19:52 +1000)]
Add /* WITH_OPENSSL */ comments.
Removes diffs vs upstream.
Darren Tucker [Fri, 5 Sep 2025 09:22:37 +0000 (19:22 +1000)]
Move sys/time.h include to match upstream.
Darren Tucker [Fri, 5 Sep 2025 09:13:52 +0000 (19:13 +1000)]
Create replacement netgroup.h if needed.
Remove #ifdef HAVE_NETGROUP_H wrapper. ok djm@
Darren Tucker [Fri, 5 Sep 2025 08:24:59 +0000 (18:24 +1000)]
Remove stray #endif left from previous.
Darren Tucker [Fri, 5 Sep 2025 08:08:51 +0000 (18:08 +1000)]
Create replacement libgen.h if needed.
Remove #ifdef HAVE_LIBGEN_H wrapper. ok djm@
Darren Tucker [Fri, 5 Sep 2025 08:05:15 +0000 (18:05 +1000)]
Create replacement sys/un.h if needed.
Remove #ifdef HAVE_SYS_UN_H wrapper. ok djm@
Darren Tucker [Fri, 5 Sep 2025 08:03:55 +0000 (18:03 +1000)]
Reformat replacement header check one per line.
Darren Tucker [Fri, 5 Sep 2025 07:55:33 +0000 (17:55 +1000)]
Create replacement time.h if needed.
Remove #ifdef HAVE_TIME_H wrapper. ok djm@
Darren Tucker [Fri, 5 Sep 2025 07:50:18 +0000 (17:50 +1000)]
Create replacement sys/stat.h if needed.
Remove #ifdef HAVE_SYS_STAT_H wrapper. ok djm@
Darren Tucker [Fri, 5 Sep 2025 07:44:07 +0000 (17:44 +1000)]
Create replacement sys/time.h if needed.
Remove #ifdef HAVE_SYS_TIME_H wrapper. ok djm@
Darren Tucker [Fri, 5 Sep 2025 07:31:15 +0000 (17:31 +1000)]
Create replacement ifaddrs.h if needed.
Remove #ifdef HAVE_IFADDRS_H wrapper. ok djm@
Darren Tucker [Fri, 5 Sep 2025 07:27:43 +0000 (17:27 +1000)]
Create replacement util.h if needed.
Remove #ifdef HAVE_UTIL_H wrapper. ok djm@
Darren Tucker [Fri, 5 Sep 2025 07:24:50 +0000 (17:24 +1000)]
Create replacement paths.h if needed.
Remove #ifdef HAVE_PATHS_H wrapper. ok djm@
Darren Tucker [Fri, 5 Sep 2025 07:17:52 +0000 (17:17 +1000)]
Create replacement poll.h if needed.
Remove #ifdef HAVE_POLL_H wrapper. ok djm@
Darren Tucker [Fri, 5 Sep 2025 07:06:14 +0000 (17:06 +1000)]
Fill in missing system header files.
Create replacement header files inside openbsd-compat for common headers
that are missing on a given platform. Usually these are just empty,
but in some cases they'll include the equivalent file. This avoids
having to wrap those includes in '#ifdef HAVE_FOO_H' and reduces the
diff vs OpenBSD.
If we create any such headers, add the path to includes.
Initially just stdint.h, more to follow.
ok djm@
djm@openbsd.org [Thu, 4 Sep 2025 03:04:44 +0000 (03:04 +0000)]
upstream: repair test after changes to percent expansion of usernames
on the commandline.
Test more cases that should/shouldn't expand and lightly test
username validity checks.
OpenBSD-Regress-ID:
ad4c12c70bdf1f959abfebd1637ecff1b49a484c
djm@openbsd.org [Thu, 4 Sep 2025 00:37:10 +0000 (00:37 +0000)]
upstream: unit tests for sshbuf_equals and sshbuf_dtourlb64; ok
deraadt@
OpenBSD-Regress-ID:
bab54e2d4caa813036a63ee67e92c93e6712a5b9
djm@openbsd.org [Thu, 4 Sep 2025 00:34:17 +0000 (00:34 +0000)]
upstream: unit tests for a bunch of misc.c functions; ok deraadt@
OpenBSD-Regress-ID:
886cf142605405e777ee77a96b48694dc2e9235d
djm@openbsd.org [Thu, 4 Sep 2025 00:32:31 +0000 (00:32 +0000)]
upstream: fix sshbuf_dtourlb64() to not choke on empty buffers;
previously it incorrectly returned an error in this situation; ok deraadt
OpenBSD-Commit-ID:
e62773d6e8cb95a19aab54f0af0edbcd47b345c0