]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
dtucker@openbsd.org [Mon, 4 Jan 2021 21:58:58 +0000 (21:58 +0000)]
upstream: estructure sntrup761.sh to process all files in a single
list, which will make it easier to reorder. Re-inline int32_MINMAX. ok
tobhe@
OpenBSD-Commit-ID:
d145c6c19b08bb93c9e14bfaa7af589d90f144c0
tobhe@openbsd.org [Sun, 3 Jan 2021 18:05:21 +0000 (18:05 +0000)]
upstream: Prevent redefinition of `crypto_int32' error with gcc3.
Fixes compilation on luna88k.
Feedback millert@
Found by and ok aoyama@
OpenBSD-Commit-ID:
f305ddfe575a26cc53431af3fde3f4aeebed9ba6
Darren Tucker [Fri, 1 Jan 2021 11:00:49 +0000 (22:00 +1100)]
Undef int32 after sort routines.
This prevents typedef'ing crypto_int32 twice, in sntrup761.c and
crypto_api.h, which some compilers (at least some GCCs) don't accept.
Damien Miller [Thu, 31 Dec 2020 01:47:22 +0000 (12:47 +1100)]
fix: missing pieces of previous commit
tobhe@openbsd.org [Wed, 30 Dec 2020 14:13:28 +0000 (14:13 +0000)]
upstream: Use int64_t for intermediate values in int32_MINMAX to
prevent signed 32-bit integer overflow.
Found by and ok djm@
ok markus@
OpenBSD-Commit-ID:
4f0704768e34cf45fdd792bac4011c6971881bb3
Damien Miller [Tue, 29 Dec 2020 01:40:54 +0000 (12:40 +1100)]
adapt KEX fuzzer to PQ kex change
djm@openbsd.org [Tue, 29 Dec 2020 01:02:15 +0000 (01:02 +0000)]
upstream: Adapt to replacement of
sntrup4591761x25519-sha512@tinyssh.org with
sntrup761x25519-sha512@openssh.com.
Also test sntrup761x25519-sha512@openssh.com in unittests/kex
OpenBSD-Regress-ID:
cfa3506b2b077a9cac1877fb521efd2641b6030c
djm@openbsd.org [Tue, 29 Dec 2020 00:59:15 +0000 (00:59 +0000)]
upstream: Update/replace the experimental post-quantim hybrid key
exchange method based on Streamlined NTRU Prime (coupled with X25519).
The previous sntrup4591761x25519-sha512@tinyssh.org method is
replaced with sntrup761x25519-sha512@openssh.com. Per the authors,
sntrup4591761 was replaced almost two years ago by sntrup761.
The sntrup761 implementaion, like sntrup4591761 before it, is public
domain code extracted from the SUPERCOP cryptography benchmark
suite (https://bench.cr.yp.to/supercop.html).
Thanks for Daniel J Bernstein for guidance on algorithm selection.
Patch from Tobias Heider; feedback & ok markus@ and myself
(note this both the updated method and the one that it replaced are
disabled by default)
OpenBSD-Commit-ID:
2bf582b772d81ee24e911bb6f4b2aecfd39338ae
jmc@openbsd.org [Tue, 22 Dec 2020 07:40:26 +0000 (07:40 +0000)]
upstream: tweak the description of KnownHostsCommand in ssh_conf.5,
and add entries for it to the -O list in scp.1 and sftp.1;
ok djm
OpenBSD-Commit-ID:
aba31ebea03f38f8d218857f7ce16a500c3e4aff
Damien Miller [Tue, 22 Dec 2020 08:43:55 +0000 (19:43 +1100)]
whitespace at EOL
Damien Miller [Tue, 22 Dec 2020 08:42:37 +0000 (19:42 +1100)]
whitespace at EOL
Darren Tucker [Tue, 22 Dec 2020 08:21:26 +0000 (19:21 +1100)]
Improve AIX text.
Darren Tucker [Tue, 22 Dec 2020 07:56:54 +0000 (18:56 +1100)]
Include stdio.h for FILE in misc.h.
Fixes build on at least OpenBSD.
Damien Miller [Tue, 22 Dec 2020 07:31:50 +0000 (18:31 +1100)]
ensure $LOGNAME is set in tests
djm@openbsd.org [Tue, 22 Dec 2020 06:47:24 +0000 (06:47 +0000)]
upstream: more detail for failing tests
OpenBSD-Regress-ID:
c68c0e5a521cad7e7f68e54c54ebf86d6c10ee1d
djm@openbsd.org [Tue, 22 Dec 2020 06:03:36 +0000 (06:03 +0000)]
upstream: regress test for KnownHostsCommand
OpenBSD-Regress-ID:
ffc77464320b6dabdcfa0a72e0df02659233a38a
tb@openbsd.org [Tue, 22 Dec 2020 03:05:31 +0000 (03:05 +0000)]
upstream: Remove lines accidentally left behind in the ProxyJump
parsing fix r1.345.
ok djm
OpenBSD-Commit-ID:
fe767c108c8117bea33767b080ff62eef2c55f5c
djm@openbsd.org [Tue, 22 Dec 2020 00:15:22 +0000 (00:15 +0000)]
upstream: add a ssh_config KnownHostsCommand that allows the client
to obtain known_hosts data from a command in addition to the usual files.
The command accepts bunch of %-expansions, including details of the
connection and the offered server host key. Note that the command may
be invoked up to three times per connection (see the manpage for
details).
ok markus@
OpenBSD-Commit-ID:
2433cff4fb323918ae968da6ff38feb99b4d33d0
djm@openbsd.org [Tue, 22 Dec 2020 00:12:22 +0000 (00:12 +0000)]
upstream: move subprocess() from auth.c to misc.c
make privilege dropping optional but allow it via callbacks (to avoid
need to link uidswap.c everywhere)
add some other flags (keep environment, disable strict path safety check)
that make this more useful for client-side use.
feedback & ok markus@
OpenBSD-Commit-ID:
a80ea9fdcc156f1a18e9c166122c759fae1637bf
dtucker@openbsd.org [Mon, 21 Dec 2020 22:48:41 +0000 (22:48 +0000)]
upstream: Remove explicit rijndael-cbc@lysator.liu.se test since the
cipher was removed.
OpenBSD-Regress-ID:
aa93cddb4ecd9bc21446a79008a1a53050e64f17
dtucker@openbsd.org [Mon, 21 Dec 2020 11:09:32 +0000 (11:09 +0000)]
upstream: Remove the pre-standardization cipher
rijndael-cbc@lysator.liu.se. It is an alias for aes256-cbc which was
standardized in RFC4253 (2006), has been deprecated and disabled by default
since OpenSSH 7.2 (2016) and was only briefly documented in ssh.1 in 2001.
This will reduce the amount of work the cipher/kex regression tests need
to do by a little bit. ok markus@ djm@
OpenBSD-Commit-ID:
fb460acc18290a998fd70910b19c29b4e4f199ad
djm@openbsd.org [Mon, 21 Dec 2020 09:19:53 +0000 (09:19 +0000)]
upstream: properly fix ProxyJump parsing; Thanks to tb@ for
pointing out my error (parse_ssh_uri() can return -1/0/1, that I missed).
Reported by Raf Czlonka via bugs@
ok tb@
OpenBSD-Commit-ID:
a2991a3794bcaf1ca2b025212cce11cdb5f6b7d6
djm@openbsd.org [Mon, 21 Dec 2020 01:31:06 +0000 (01:31 +0000)]
upstream: adapt to API change in hostkeys_foreach()/load_hostkeys()
OpenBSD-Regress-ID:
dcb468514f32da49a446372453497dc6eeafdbf3
djm@openbsd.org [Fri, 16 Oct 2020 14:02:24 +0000 (14:02 +0000)]
upstream: few more things needs match.c and addrmatch.c now that
log.c calls match_pattern_list()
OpenBSD-Regress-ID:
f7c95c76b150d0aeb00a67858b9579b7d1b2db74
Darren Tucker [Mon, 21 Dec 2020 03:02:56 +0000 (14:02 +1100)]
Pull in missing rev 1.2.
djm@openbsd.org [Sun, 20 Dec 2020 23:40:19 +0000 (23:40 +0000)]
upstream: plumb ssh_conn_info through to sshconnect.c; feedback/ok
markus@
OpenBSD-Commit-ID:
e8d14a09cda3f1dc55df08f8a4889beff74e68b0
djm@openbsd.org [Sun, 20 Dec 2020 23:38:00 +0000 (23:38 +0000)]
upstream: allow UserKnownHostsFile=none; feedback and ok markus@
OpenBSD-Commit-ID:
c46d515eac94a35a1d50d5fd71c4b1ca53334b48
djm@openbsd.org [Sun, 20 Dec 2020 23:36:51 +0000 (23:36 +0000)]
upstream: load_hostkeys()/hostkeys_foreach() variants for FILE*
Add load_hostkeys_file() and hostkeys_foreach_file() that accept a
FILE* argument instead of opening the file directly.
Original load_hostkeys() and hostkeys_foreach() are implemented using
these new interfaces.
Add a u_int note field to the hostkey_entry and hostkey_foreach_line
structs that is passed directly from the load_hostkeys() and
hostkeys_foreach() call. This is a lightweight way to annotate results
between different invocations of load_hostkeys().
ok markus@
OpenBSD-Commit-ID:
6ff6db13ec9ee4edfa658b2c38baad0f505d8c20
tobhe@openbsd.org [Sat, 19 Dec 2020 22:09:21 +0000 (22:09 +0000)]
upstream: Print client kem key with correct length.
ok markus@
OpenBSD-Commit-ID:
91689e14a4fc6c270e265a32d1c8faba63a45755
djm@openbsd.org [Thu, 17 Dec 2020 23:28:50 +0000 (23:28 +0000)]
upstream: fix possible error("%s", NULL) on error paths
OpenBSD-Commit-ID:
0b3833c2cb985453ecca1d76803ebb8f3b736a11
djm@openbsd.org [Thu, 17 Dec 2020 23:26:11 +0000 (23:26 +0000)]
upstream: refactor client percent_expand() argument passing;
consolidate the common arguments into a single struct and pass that around
instead of using a bunch of globals. ok markus@
OpenBSD-Commit-ID:
035e6d7ca9145ad504f6af5a021943f1958cd19b
djm@openbsd.org [Thu, 17 Dec 2020 23:10:27 +0000 (23:10 +0000)]
upstream: prepare readconf.c for fuzzing; remove fatal calls and
fix some (one-off) memory leaks; ok markus@
OpenBSD-Commit-ID:
91c6aec57b0e7aae9190de188e9fe8933aad5ec5
djm@openbsd.org [Mon, 14 Dec 2020 03:13:12 +0000 (03:13 +0000)]
upstream: use _PATH_SSH_USER_DIR instead of hardcoded .ssh in path
OpenBSD-Commit-ID:
5c1048468813107baa872f5ee33ba51623630e01
Damien Miller [Fri, 4 Dec 2020 03:01:27 +0000 (14:01 +1100)]
basic KEX fuzzer; adapted from Markus' unittest
Damien Miller [Fri, 4 Dec 2020 02:57:43 +0000 (13:57 +1100)]
use options that work with recent clang
djm@openbsd.org [Fri, 4 Dec 2020 02:41:10 +0000 (02:41 +0000)]
upstream: shuffle a few utility functions into sftp-client.c; from
Jakub Jelen
OpenBSD-Commit-ID:
fdeb1aae1f6149b193f12cd2af158f948c514a2a
djm@openbsd.org [Fri, 4 Dec 2020 02:29:56 +0000 (02:29 +0000)]
upstream: make ssh_free(NULL) a no-op
OpenBSD-Commit-ID:
42cb285d94789cefe6608db89c63040ab0a80fa0
djm@openbsd.org [Fri, 4 Dec 2020 02:29:25 +0000 (02:29 +0000)]
upstream: memleak of DH public bignum; found with libfuzzer
OpenBSD-Commit-ID:
0e913b542c3764b100b1571fdb0d0e5cc086fe97
djm@openbsd.org [Fri, 4 Dec 2020 02:27:57 +0000 (02:27 +0000)]
upstream: fix minor memleak of kex->hostkey_alg on rekex
OpenBSD-Commit-ID:
2c3969c74966d4ccdfeff5e5f0df0791919aef50
djm@openbsd.org [Fri, 4 Dec 2020 02:27:08 +0000 (02:27 +0000)]
upstream: typos: s/hex/kex/ in error messages
OpenBSD-Commit-ID:
43a026c9571dd779ec148de1829cf5a6b6651905
djm@openbsd.org [Fri, 4 Dec 2020 02:25:13 +0000 (02:25 +0000)]
upstream: make program name be const
OpenBSD-Commit-ID:
ece25680ec637fdf20502721ccb0276691df5384
dtucker@openbsd.org [Mon, 30 Nov 2020 05:36:39 +0000 (05:36 +0000)]
upstream: Ignore comments at the end of config lines in ssh_config,
similar to what we already do for sshd_config. bz#2320, with & ok djm@
OpenBSD-Commit-ID:
bdbf9fc5bc72b1a14266f5f61723ed57307a6db4
dtucker@openbsd.org [Sat, 28 Nov 2020 12:52:32 +0000 (12:52 +0000)]
upstream: Include cipher.h for declaration of cipher_by_name.
OpenBSD-Commit-ID:
ddfebbca03ca0e14e00bbad9d35f94b99655d032
djm@openbsd.org [Sat, 28 Nov 2020 03:27:59 +0000 (03:27 +0000)]
upstream: check result of strchr() against NULL rather than
searched-for characters; from zhongjubin@huawei.com
OpenBSD-Commit-ID:
e6f57de1d4a4d25f8db2d44e8d58d847e247a4fe
dtucker@openbsd.org [Fri, 27 Nov 2020 10:12:30 +0000 (10:12 +0000)]
upstream: Document ssh-keygen -Z, sanity check its argument earlier and
provide a better error message if it's not correct. Prompted by bz#2879, ok
djm@ jmc@
OpenBSD-Commit-ID:
484178a173e92230fb1803fb4f206d61f7b58005
djm@openbsd.org [Fri, 27 Nov 2020 00:49:58 +0000 (00:49 +0000)]
upstream: Set the specified TOS/DSCP for interactive use prior to
TCP connect. The connection phase of the SSH session is time-sensitive (due
to server side login grace periods) and is frequently interactive (e.g.
entering passwords). The ultimate interactive/bulk TOS/DSCP will be set after
authentication completes.
ok dtucker@
OpenBSD-Commit-ID:
f31ab10d9233363a6d2c9996007083ba43a093f1
djm@openbsd.org [Fri, 27 Nov 2020 00:37:10 +0000 (00:37 +0000)]
upstream: clean up passing of struct passwd from monitor to preauth
privsep process. No longer copy entire struct w/ pointer addresses, but pass
remaining scalar fields explicitly,
Prompted by Yuichiro NAITO, feedback Thorsten Glaser; ok dtucker@
OpenBSD-Commit-ID:
9925df75a56732c43f3663e70dd15ff413ab3e53
djm@openbsd.org [Sun, 22 Nov 2020 22:38:26 +0000 (22:38 +0000)]
upstream: when loading PKCS#11 keys, include the key fingerprints
and provider/slot information in debug output.
OpenBSD-Commit-ID:
969a089575d0166a9a364a9901bb6a8d9b8a1431
djm@openbsd.org [Sun, 22 Nov 2020 22:37:11 +0000 (22:37 +0000)]
upstream: when mentioning that the host key has changed, don't
report the type because it is ambiguous as to whether it referred to the
known or new host key. bz3216; ok dtucker@
OpenBSD-Commit-ID:
2d5ce4a83dbcf44e340a572e361decad8aab7bad
Darren Tucker [Wed, 25 Nov 2020 06:38:46 +0000 (17:38 +1100)]
Use "=" not "==" in string test.
POSIX says "=" is string comparison and some shells (eg HP-UX) will
complain about "==".
Darren Tucker [Fri, 20 Nov 2020 06:16:51 +0000 (17:16 +1100)]
Restore correct flags during localtime_r check.
We were restoring the wrong thing CPPFLAGS (we used CFLAGS) for any
platform that doesn't have localtime_r.
dtucker@openbsd.org [Fri, 20 Nov 2020 03:16:56 +0000 (03:16 +0000)]
upstream: When doing an sftp recursive upload or download of a
read-only directory, ensure that the directory is created with write and
execute permissions in the interim so that we can actually complete the
transfer, then set the directory permission as the final step. (The execute
bit is only likely to be an issue with a non-POSIX server). bz#3222, ok djm@
OpenBSD-Commit-ID:
a82606212f2796e31f0e1af94a63355a7ad5d903
Darren Tucker [Fri, 20 Nov 2020 02:37:54 +0000 (13:37 +1100)]
Add new pselect6_time64 syscall on ARM.
This is apparently needed on armhfp/armv7hl. bz#3232, patch from
jjelen at redhat.com.
dtucker@openbsd.org [Fri, 20 Nov 2020 02:14:16 +0000 (02:14 +0000)]
upstream: Explicitly initialize all members of the
find_by_key_ctx struct. Initializing a single member should be enough
(the spec says the remainder should be initialized as per the static
rules) but some GCCs warn on this which prevents us testing with -Werror
on those. ok deraadt@ djm@
OpenBSD-Commit-ID:
687126e60a27d30f02614760ef3c3ae4e8d6af28
dtucker@openbsd.org [Thu, 19 Nov 2020 23:05:05 +0000 (23:05 +0000)]
upstream: draft-ietf-secsh-architecture is now RFC4251.
OpenBSD-Commit-ID:
cb0bb58c2711fb5ed519507659be1dcf179ed403
dtucker@openbsd.org [Tue, 17 Nov 2020 11:23:58 +0000 (11:23 +0000)]
upstream: Specify that the KDF function is bcrypt. Based on github
PR#214 from rafork, ok markus@, mdoc correction jmc@
OpenBSD-Commit-ID:
d8f2853e7edbcd483f31b50da77ab80ffa18b4ef
djm@openbsd.org [Sun, 15 Nov 2020 22:34:58 +0000 (22:34 +0000)]
upstream: revert r1.341; it breaks ProxyJump; reported by sthen@
OpenBSD-Commit-ID:
6ac2f945b26cb86d936eed338f77861d6da8356a
djm@openbsd.org [Fri, 13 Nov 2020 07:30:44 +0000 (07:30 +0000)]
upstream: scrub keyboard-interactive authentication prompts coming
from the server through asmprintf() prior to display; suggested by and ok
dtucker@
OpenBSD-Commit-ID:
31fe93367645c37fbfe4691596bf6cf1e3972a58
djm@openbsd.org [Fri, 13 Nov 2020 04:53:12 +0000 (04:53 +0000)]
upstream: prefix keyboard interactive prompts with (user@host) to
make it easier to determine which connection they are associated with in
cases like scp -3, ProxyJump, etc. bz#3224 ok dtucker
OpenBSD-Commit-ID:
67e6189b04b46c867662f8a6759cf3ecb5f59170
Darren Tucker [Fri, 13 Nov 2020 06:56:11 +0000 (17:56 +1100)]
Remove use of TIME_WITH_SYS_TIME.
It was only set by the recently removed AC_HEADER_TIME macro, replace
with simple inclusions of both sys/time.h and time.h. Should prevent
mis-detection of struct timespec.
Damien Miller [Fri, 13 Nov 2020 03:20:43 +0000 (14:20 +1100)]
Revert "detect Linux/X32 systems"
This reverts commit
5b56bd0affea7b02b540bdbc4d1d271b0e4fc885 .
The approach used was incorrect; discussion in bz#3085
Damien Miller [Fri, 13 Nov 2020 02:22:15 +0000 (13:22 +1100)]
SELinux has deprecated security_context_t
(it was only ever a char* anyway)
Darren Tucker [Fri, 13 Nov 2020 02:43:30 +0000 (13:43 +1100)]
Remove obsolete AC_HEADER_TIME macro.
AC_HEADER_TIME is marked as obsolete in autoconf-2.70 and as far as I
can tell everything we have that might be old enough to need it doesn't.
djm@openbsd.org [Thu, 12 Nov 2020 22:56:00 +0000 (22:56 +0000)]
upstream: when prompting the user to accept a new hostkey, display
any other host names/addresses already associated with the key. E.g.
> The authenticity of host 'test (10.0.0.1)' can't be established.
> ECDSA key fingerprint is SHA256:milU4MODXm8iJQI18wlsbPG7Yup+34fuNNmV08qDnax.
> This host key is known by the following other names/addresses:
> ~/.ssh/known_hosts:1: host.example.org,10.0.0.1
> ~/.ssh/known_hosts:2: [hashed name]
> ~/.ssh/known_hosts:3: [hashed name]
> ~/.ssh/known_hosts:4: host
> ~/.ssh/known_hosts:5: [host]:2222
> Are you sure you want to continue connecting (yes/no/[fingerprint])?
feedback and ok markus@
OpenBSD-Commit-ID:
f6f58a77b49f1368b5883b3a1f776447cfcc7ef4
dtucker@openbsd.org [Thu, 12 Nov 2020 22:38:57 +0000 (22:38 +0000)]
upstream: Prevent integer overflow when ridiculously large
ConnectTimeout is specified, capping the effective value (for most platforms)
at 24 days. bz#3229, ok djm@
OpenBSD-Commit-ID:
62d4c4b7b87d111045f8e9f28b5b532d17ac5bc0
djm@openbsd.org [Wed, 11 Nov 2020 05:22:32 +0000 (05:22 +0000)]
upstream: fix logic error that broke URI parsing in ProxyJump
directives; ok dtucker@
OpenBSD-Commit-ID:
96d48839b1704882a0e9a77898f5e14b2d222705
claudio@openbsd.org [Tue, 10 Nov 2020 07:46:20 +0000 (07:46 +0000)]
upstream: Free the previously allocated msg buffer after writing it
out. OK djm@
OpenBSD-Commit-ID:
18c055870fc75e4cb9f926c86c7543e2e21d7fa4
Darren Tucker [Wed, 11 Nov 2020 01:30:46 +0000 (12:30 +1100)]
Prevent excessively long username going to PAM.
This is a mitigation for a buffer overflow in Solaris' PAM username
handling (CVE-2020-14871), and is only enabled for Sun-derived PAM
implementations. This is not a problem in sshd itself, it only
prevents sshd from being used as a vector to attack Solaris' PAM.
It does not prevent the bug in PAM from being exploited via some other
PAM application.
Based on github PR#212 from Mike Scott but implemented slightly
differently. ok tim@ djm@
djm@openbsd.org [Sun, 8 Nov 2020 23:19:03 +0000 (23:19 +0000)]
upstream: unbreak; missing NULL check
OpenBSD-Commit-ID:
6613dfab488123f454d348ef496824476b8c11c0
djm@openbsd.org [Sun, 8 Nov 2020 22:37:24 +0000 (22:37 +0000)]
upstream: when requesting a security key touch on stderr, inform the
user once the touch has been recorded; requested by claudio@ ok markus@
OpenBSD-Commit-ID:
3b76ee444490e546b9ea7f879e4092ee0d256233
Darren Tucker [Sun, 8 Nov 2020 13:33:35 +0000 (00:33 +1100)]
Remove preprocessor directive from log macro calls.
Preprocessor directives inside macro calls, such as the new log macros,
are undefined behaviour and do not work with, eg old GCCs. Put the
entire log call inside the ifdef for OPENSSL_HAS_NISTP521.
dtucker@openbsd.org [Sun, 8 Nov 2020 12:10:20 +0000 (12:10 +0000)]
upstream: Add a comment documenting the source of the moduli group
sizes.
OpenBSD-Commit-ID:
aec0725ce607630caaa62682624c6763b350391c
dtucker@openbsd.org [Sun, 8 Nov 2020 11:46:12 +0000 (11:46 +0000)]
upstream: Replace WITH_OPENSSL ifdefs in log calls with a macro.
The log calls are themselves now macros, and preprocessor directives inside
macro arguments are undefined behaviour which some compilers (eg old GCCs)
choke on. It also makes the code tidier. ok deraadt@
OpenBSD-Commit-ID:
cc12a9029833d222043aecd252d654965c351a69
Darren Tucker [Fri, 6 Nov 2020 06:11:16 +0000 (17:11 +1100)]
Fix function body for variadic macro test.
AC_LANG_PROGRAM puts its second argument inside main() so we don't need
to do it ourselves.
Darren Tucker [Fri, 6 Nov 2020 05:53:24 +0000 (16:53 +1100)]
Remove AC_PROC_CC_C99 obsoleted in autoconf 2.70.
Since we only use it to make sure we can handle variadic macros,
explicitly check only for that. with & ok djm@
Darren Tucker [Fri, 6 Nov 2020 02:56:41 +0000 (13:56 +1100)]
Replace AC_TRY_COMPILE obsoleted in autoconf 2.70.
Replace with the equivalent AC_COMPILE_IFELSE.
Darren Tucker [Fri, 6 Nov 2020 02:55:33 +0000 (13:55 +1100)]
Move AC_PROG_CC_C99 to immediately afer AC_PROG_CC.
This puts the related C version selection output in the same place.
Darren Tucker [Fri, 6 Nov 2020 02:54:17 +0000 (13:54 +1100)]
AC_CHECK_HEADER() is obsoleted in autoconf 2.70.
Replace with the non-obsoleted AC_CHECK_HEADERS().
djm@openbsd.org [Tue, 3 Nov 2020 22:53:12 +0000 (22:53 +0000)]
upstream: fold consecutive '*' wildcards to mitigate combinatorial
explosion of recursive searches; ok dtucker
OpenBSD-Commit-ID:
d18bcb39c40fb8a1ab61153db987e7d11dd3792b
djm@openbsd.org [Fri, 30 Oct 2020 01:50:07 +0000 (01:50 +0000)]
upstream: print reason in fatal error message when
kex_assemble_namelist() fails
OpenBSD-Commit-ID:
a9975ee8db6c98d6f32233d88051b2077ca63dab
djm@openbsd.org [Thu, 29 Oct 2020 03:13:06 +0000 (03:13 +0000)]
upstream: fix sshd_config SetEnv directive inside Match blocks; part of
github PR#201 from github user manuelm
OpenBSD-Commit-ID:
9772e3748abff3ad65ae8fc43d026ed569b1d2bc
djm@openbsd.org [Thu, 29 Oct 2020 03:01:18 +0000 (03:01 +0000)]
upstream: fix type of nid in type_bits_valid(); github PR#202 from
github user thingsconnected
OpenBSD-Commit-ID:
769d2b040dec7ab32d323daf54b854dd5dcb5485
djm@openbsd.org [Thu, 29 Oct 2020 02:52:43 +0000 (02:52 +0000)]
upstream: whitespace; no code change
OpenBSD-Commit-ID:
efefc1c47e880887bdee8cd2127ca93177eaad79
djm@openbsd.org [Thu, 29 Oct 2020 02:47:23 +0000 (02:47 +0000)]
upstream: UpdateHostkeys: fixed/better detection of host keys that
exist under other names and addresses; spotted by and debugged with lots of
help from jca@
OpenBSD-Commit-ID:
5113d7f550bbd48243db1705afbf16b63792d4b7
Duncan Eastoe [Wed, 21 Oct 2020 09:11:10 +0000 (10:11 +0100)]
session.c: use "denylist" terminology
Follow upstream (
6d755706a0059eb9e2d63517f288b75cbc3b4701 ) language
improvements in this portable-specific code.
Damien Miller [Tue, 27 Oct 2020 05:46:31 +0000 (16:46 +1100)]
Remove checks for strict POSIX mkdtemp()
We needed a mkdtemp() that accepted template paths that did not
end in XXXXXX a long time ago for KRB4, but that code is long
deprecated. We no longer need to replace mkdtemp() for strictly
following POSIX. ok dtucker@
dtucker@openbsd.org [Mon, 26 Oct 2020 00:39:04 +0000 (00:39 +0000)]
upstream: Minor man page fixes (capitalization, commas) identified by
the manpage-l10n project via bz#3223. feedback deraadt@, ok jmc@
OpenBSD-Commit-ID:
ab83af0daf18369244a72daaec6c4a58a9eb7e2c
dtucker@openbsd.org [Mon, 19 Oct 2020 22:49:23 +0000 (22:49 +0000)]
upstream: Adapt XMSS to new logging infrastructure. With markus@, ok
djm@.
OpenBSD-Commit-ID:
9c35ec3aa0f710e4e3325187ceff4fa3791686de
djm@openbsd.org [Mon, 19 Oct 2020 08:07:08 +0000 (08:07 +0000)]
upstream: fix SEGV on fatal() errors spotted by dtucker@
OpenBSD-Commit-ID:
75f155a1ac61e364ed00dc379e2c42df81067ce2
Darren Tucker [Sun, 18 Oct 2020 23:54:41 +0000 (10:54 +1100)]
Use fatal_fr not fatal_r when passing r.
Caught by the PAM -Werror tinderbox build.
djm@openbsd.org [Sun, 18 Oct 2020 11:32:01 +0000 (11:32 +0000)]
upstream: use the new variant log macros instead of prepending
__func__ and appending ssh_err(r) manually; ok markus@
OpenBSD-Commit-ID:
1f14b80bcfa85414b2a1a6ff714fb5362687ace8
djm@openbsd.org [Sun, 18 Oct 2020 11:21:59 +0000 (11:21 +0000)]
upstream: variants of the log methods that append a ssherr.h string
from a supplied error code; ok markus@
OpenBSD-Commit-ID:
aed98c4435d48d036ae6740300f6a8357b7cc0bf
djm@openbsd.org [Sun, 18 Oct 2020 11:14:27 +0000 (11:14 +0000)]
upstream: remove a level of macro indirection; ok markus@
OpenBSD-Commit-ID:
0c529d06e902c5d1a6b231e1bec6157f76dc67c9
djm@openbsd.org [Sun, 18 Oct 2020 11:13:45 +0000 (11:13 +0000)]
upstream: add some variant log.h calls that prepend the calling
function name; ok markus@
OpenBSD-Commit-ID:
4be1b2e2455b271ddb7457bc195c5367644f4e48
Damien Miller [Sat, 17 Oct 2020 11:55:24 +0000 (22:55 +1100)]
missing header
Damien Miller [Sat, 17 Oct 2020 11:47:52 +0000 (22:47 +1100)]
sync regress/misc/sk-dummy/fatal.c
djm@openbsd.org [Sat, 17 Oct 2020 01:28:20 +0000 (01:28 +0000)]
upstream: make the log functions that exit (sshlogdie(),
sshfatal(), etc) have identical signatures. Makes things a bit more
consistent...
OpenBSD-Commit-ID:
bd0ae124733389d7c0042e135c71ee9091362eb9
jmc@openbsd.org [Fri, 16 Oct 2020 14:34:33 +0000 (14:34 +0000)]
upstream: add space between macro arg and punctuation;
OpenBSD-Commit-ID:
bb81e2ed5a77832fe62ab30a915ae67cda57633e
Damien Miller [Sat, 17 Oct 2020 01:03:34 +0000 (12:03 +1100)]
check for and require a C99 capable compiler
recent logging changes use __VA_ARGS__.
Damien Miller [Sat, 17 Oct 2020 00:51:20 +0000 (11:51 +1100)]
logging is now macros, remove function pointers