]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
djm@openbsd.org [Mon, 22 Dec 2025 03:36:43 +0000 (03:36 +0000)]
upstream: correctly quote wildcard host certificate principal name,
lest it expand to an unrelated filename in the working directory
OpenBSD-Regress-ID:
8a9eb716d3ea7986d26c1a931758b996aa93c58e
djm@openbsd.org [Mon, 22 Dec 2025 03:12:05 +0000 (03:12 +0000)]
upstream: return 0 in void function; spotted by clang -Wextra
OpenBSD-Commit-ID:
fe7461c93dfaef98a007a246af837a8275a1e539
djm@openbsd.org [Mon, 22 Dec 2025 01:50:46 +0000 (01:50 +0000)]
upstream: regression tests for certificates with empty principals
sections (which are now unconditionally refused) and for certificates with
wildcard principals (which should only be accepted in host certs)
OpenBSD-Regress-ID:
fdca88845a68424060547b4f9f32f90a7cf82e73
djm@openbsd.org [Mon, 22 Dec 2025 01:31:07 +0000 (01:31 +0000)]
upstream: don't try to test webauthn signatures. Nothing in OpenSSH
generates these (yet)
OpenBSD-Regress-ID:
48d59b7c4768c2a22ce3d8cf3b455e6ada9fc7b0
djm@openbsd.org [Mon, 22 Dec 2025 01:49:03 +0000 (01:49 +0000)]
upstream: When certificate support was added to OpenSSH,
certificates were originally specified to represent any principal if the
principals list was empty.
This was, in retrospect, a mistake as it created a fail-open
situation if a CA could be convinced to accidentally sign a
certificate with no principals. This actually happened in a 3rd-
party CA product (CVE-2024-7594).
Somewhat fortunately, the main pathway for using certificates in
sshd (TrustedUserCAKeys) never supported empty-principals
certificates, so the blast radius of such mistakes was
substantially reduced.
This change removes this footcannon and requires all certificates
include principals sections. It also fixes interpretation of
wildcard principals, and properly enables them for host
certificates only.
This is a behaviour change that will permanently break uses of
certificates with empty principals sections.
ok markus@
OpenBSD-Commit-ID:
0a901f03c567c100724a492cf91e02939904712e
djm@openbsd.org [Mon, 22 Dec 2025 01:20:39 +0000 (01:20 +0000)]
upstream: Don't misuse the sftp limits extension's open-handles
field. This value is supposed to be the number of handles a server will allow
to be opened and not a number of outstanding read/write requests that can be
sent during an upload/download.
ok markus@
OpenBSD-Commit-ID:
14ebb6690acbd488e748ce8ce3302bd7e1e8a5b0
djm@openbsd.org [Mon, 22 Dec 2025 01:17:31 +0000 (01:17 +0000)]
upstream: add a "ssh -O channels user@host" multiplexing command to
get a running mux process to show information about what channels are
currently open; ok dtucker@ markus@
OpenBSD-Commit-ID:
80bb3953b306a50839f9a4bc5679faebc32e5bb8
djm@openbsd.org [Fri, 19 Dec 2025 01:27:19 +0000 (01:27 +0000)]
upstream: typo in comment
OpenBSD-Commit-ID:
f72306b86953e74f358096db141b4f9c00d33ed7
djm@openbsd.org [Fri, 19 Dec 2025 01:26:39 +0000 (01:26 +0000)]
upstream: correctly check subsystem command is not the empty string
(was repeatedly checking the subsystem name) spotted by Coverity (CID 898836)
OpenBSD-Commit-ID:
dabea2b499de8280f76f7291dd52086df6831cb0
djm@openbsd.org [Fri, 19 Dec 2025 00:57:42 +0000 (00:57 +0000)]
upstream: regression test for bz3906: sshd crashing at connection
time if the config lacks a subsystem directive but one is defined in a match
block.
OpenBSD-Regress-ID:
5290553665307ccddaec2499ec1eb196bb2efc84
djm@openbsd.org [Fri, 19 Dec 2025 00:48:47 +0000 (00:48 +0000)]
upstream: check that invalid subsystem directives inside Match
blocks are noticed at startup; bz#3906
OpenBSD-Regress-ID:
b9171bde4cc24757a826b3da0e9eadc33995a453
djm@openbsd.org [Fri, 19 Dec 2025 00:56:34 +0000 (00:56 +0000)]
upstream: don't crash at connection time if the main sshd_config
lacks any subsystem directive but one is defined in a Match block
bz#3906; ok dtucker
OpenBSD-Commit-ID:
2eb9024726d6f10eaa41958faeca9c9ba5ca7d8a
djm@openbsd.org [Fri, 19 Dec 2025 00:48:04 +0000 (00:48 +0000)]
upstream: detect invalid sshd_config Subsystem directives inside
Match blocks at startup rather than failing later at runtime;
noticed via bz#3906; ok dtucker
OpenBSD-Commit-ID:
e6035ff0baa375de6c9f22c883ed530a8649dfed
jsg@openbsd.org [Thu, 18 Dec 2025 23:54:10 +0000 (23:54 +0000)]
upstream: new sentence, new line
OpenBSD-Commit-ID:
23974d7c98b2ba4fea7f5143676c34e04ffd4128
jsg@openbsd.org [Thu, 18 Dec 2025 23:51:56 +0000 (23:51 +0000)]
upstream: fix markup, .CM -> .Cm
OpenBSD-Commit-ID:
4db8cb254792df8a4dce11825852e089ae3d053a
dtucker@openbsd.org [Tue, 16 Dec 2025 08:36:43 +0000 (08:36 +0000)]
upstream: Plug leak in ssh_digest_memory on error path.
Bonehead mistake spotted by otto@, ok djm@
OpenBSD-Commit-ID:
4ad67ac402e0b4c013f4f4e386d22b88969a5dd7
dtucker@openbsd.org [Tue, 16 Dec 2025 08:32:50 +0000 (08:32 +0000)]
upstream: Add 'invaliduser' penalty to PerSourcePenalties, which is
applied to login attempts for usernames that do not match real accounts.
Defaults to 5s to match 'authfail' but allows administrators to block such
sources for longer if desired. with & ok djm@
OpenBSD-Commit-ID:
bb62797bcf2adceb96f608ce86d0bb042aff5834
djm@openbsd.org [Mon, 8 Dec 2025 03:55:22 +0000 (03:55 +0000)]
upstream: add a GssDelegateCreds option for the server, controlling
whether it accepts delgated credentials offered by the client. This option
mirrors GssDelegateCreds in ssh_config.
From Dmitry Belyavskiy via GHPR614; ok dtucker@
OpenBSD-Commit-ID:
ac419354edb26cef9ad15692e0bed17a03997786
djm@openbsd.org [Mon, 8 Dec 2025 00:45:00 +0000 (00:45 +0000)]
upstream: errant line
OpenBSD-Commit-ID:
8542d59f5ba48a67c3ebd5de17f9fa408ec54ca5
djm@openbsd.org [Mon, 8 Dec 2025 00:44:16 +0000 (00:44 +0000)]
upstream: There is a warning next to the authorized_keys command=""
flag that forcing a command doesn't automatically disable forwarding. Add one
next to the sshd_config(5) ForceCommand directive too.
feedback deraadt@
OpenBSD-Commit-ID:
bfe38b4d3cfbadbb8bafe38bc256f5a17a0ee75c
djm@openbsd.org [Mon, 8 Dec 2025 00:41:46 +0000 (00:41 +0000)]
upstream: increment correct variable when counting group
memberships. Reported by Kevin Day via bz3903
OpenBSD-Commit-ID:
772b9aafd5165a7c407f08cb95f8b94cc5a4c1c0
Darren Tucker [Sun, 7 Dec 2025 09:10:42 +0000 (20:10 +1100)]
Add OpenBSD 7.8 VM test target.
Darren Tucker [Sun, 7 Dec 2025 02:43:02 +0000 (13:43 +1100)]
Remove generated compat includes during distclean.
Darren Tucker [Sun, 7 Dec 2025 03:17:20 +0000 (14:17 +1100)]
Define IPTOS_DSCP_VA if not already defined.
phessler@openbsd.org [Fri, 5 Dec 2025 17:48:47 +0000 (17:48 +0000)]
upstream: allow network programs select DSCP_VA for network ToS
OK stsp@
OpenBSD-Commit-ID:
8019fd6e8c522b4b5f291a2c0e3bf2437cc70dc1
dtucker@openbsd.org [Sun, 7 Dec 2025 02:59:53 +0000 (02:59 +0000)]
upstream: Avoid "if ! thing || ! otherthing; then" constructs since
they seem to cause portability problems.
OpenBSD-Regress-ID:
ff001be683de43bf396cd5f9f6a54e0c7a99c3cf
dtucker@openbsd.org [Sun, 7 Dec 2025 02:49:41 +0000 (02:49 +0000)]
upstream: spaces->tab
OpenBSD-Regress-ID:
c78eb430da0ec2c4b6919ff4d27ef8e565ef52ff
dtucker@openbsd.org [Sat, 6 Dec 2025 07:10:24 +0000 (07:10 +0000)]
upstream: Append a newline, otherwise some sed's won't output anything.
OpenBSD-Regress-ID:
507cb8c36bb7fc338f60a55bf7040f479536b3f7
dtucker@openbsd.org [Sat, 6 Dec 2025 03:23:27 +0000 (03:23 +0000)]
upstream: Don't check compressions stats when ssh does not support
compression.
OpenBSD-Regress-ID:
026db51b2654a949e9a10b908443dab83b64c74a
djm@openbsd.org [Fri, 5 Dec 2025 11:13:35 +0000 (11:13 +0000)]
upstream: ASSERT_DOUBLE_* test helpers
OpenBSD-Regress-ID:
cdb5c4e95c0f00efb773ddba4056a49e33702cf9
Darren Tucker [Fri, 5 Dec 2025 09:02:39 +0000 (20:02 +1100)]
Set SSH_REGRESS_TMP after making tmpdir.
Put both of these later in the script so the cvsids don't cause
conflicts on every synced patch.
dtucker@openbsd.org [Fri, 5 Dec 2025 08:09:34 +0000 (08:09 +0000)]
upstream: Shell compatibility fix.
OpenBSD-Regress-ID:
bceaeb267d49c13e4a797c42e93b8f0cdb14dbd7
djm@openbsd.org [Fri, 5 Dec 2025 07:43:24 +0000 (07:43 +0000)]
upstream: unit tests for convtime_double()
OpenBSD-Regress-ID:
d3ba7b894019b4128845d638c78fca37b3b6eecf
djm@openbsd.org [Fri, 5 Dec 2025 07:49:45 +0000 (07:49 +0000)]
upstream: convert PerSourcePenalties to using floating point time,
allowing penalties to be less than a second. This is useful if you need to
penalise things you expect to occur at >=1 QPS.
feedback dtucker / deraadt; ok deraadt@
OpenBSD-Commit-ID:
89198be755722131b45a52d22d548e4c602201f0
djm@openbsd.org [Fri, 5 Dec 2025 07:43:12 +0000 (07:43 +0000)]
upstream: Add convtime_double() that converts a string interval,
such as "3w2d4h5m10.5s", into a floating point number of seconds.
Reimplement the existing convtime() function using convtime_double()
(it just drops the fractional seconds)
lots of feedback deraadt@ / dtucker@; ok deraadt@
OpenBSD-Commit-ID:
053cdd0c72325a20efc6613caa847473fb89e36f
dtucker@openbsd.org [Fri, 5 Dec 2025 06:55:22 +0000 (06:55 +0000)]
upstream: Add test for ssh -Oconninfo mux command.
OpenBSD-Regress-ID:
e939edc41caad8b6ad00ff294f33b61ed32a1edd
dtucker@openbsd.org [Fri, 5 Dec 2025 06:16:27 +0000 (06:16 +0000)]
upstream: Add an ssh -Oconninfo command
that shows connection information, similar to the ~I escapechar.
This is the first use of the mux extension mechanism, so it should be
both forward and backward compatible: a new client talking to an old
server will not allow the "conninfo" request to be sent, but everything
else should work seamlessly. feedback and ok djm@
OpenBSD-Commit-ID:
50f047a85da277360558cabdfed59cb66f754341
djm@openbsd.org [Wed, 3 Dec 2025 06:29:50 +0000 (06:29 +0000)]
upstream: correctly quote filenames in verbose output for local->local
copies; from Colin Watson via bz3900; ok dtucker@
OpenBSD-Commit-ID:
5c09b030e2024651ebc8c1f9af6a8a2d37912150
dtucker@openbsd.org [Sat, 29 Nov 2025 06:49:56 +0000 (06:49 +0000)]
upstream: Add local hostname and pid to ~I escape connection info,
only display peer information for TCP connections including source address
and port This provides enough information to uniquely identify a connection
on the host or network.
OpenBSD-Commit-ID:
aa18a4af2de41c298d1195d2566808585f8ce964
dtucker@openbsd.org [Sat, 29 Nov 2025 05:00:50 +0000 (05:00 +0000)]
upstream: Add compression stats to ~I connection info escape
option.
OpenBSD-Commit-ID:
83424b71fc226ea6b3dc8dda39f993475fdbd775
dtucker@openbsd.org [Thu, 27 Nov 2025 02:18:48 +0000 (02:18 +0000)]
upstream: Add Escape option ~I that shows information about the current
SSH connection. ok djm@, "I like/want" sthen@ florian@
OpenBSD-Commit-ID:
0483fc0188ec899077e4bc8e1e353f7dfa9f5c1d
djm@openbsd.org [Tue, 25 Nov 2025 01:14:33 +0000 (01:14 +0000)]
upstream: move mention of default MaxStartups (which uses the
form.
GHPR568 from Santiago Vila
OpenBSD-Commit-ID:
7e68771f3cad61ec67303607afb3b85639288b29
djm@openbsd.org [Tue, 25 Nov 2025 01:08:35 +0000 (01:08 +0000)]
upstream: Support writing
ED25519 keys in PKCS8 format. GHPR570 from
Josh Brobst
OpenBSD-Commit-ID:
4f36019a38074b2929335fbe9cb8d9801e3177af
djm@openbsd.org [Tue, 25 Nov 2025 00:57:04 +0000 (00:57 +0000)]
upstream: avoid leak of fingerprint on error path; from Lidong Yan via
GHPR611
OpenBSD-Commit-ID:
253f6f7d729d8636da23ac9925b60b494e85a810
djm@openbsd.org [Tue, 25 Nov 2025 00:52:00 +0000 (00:52 +0000)]
upstream: don't set the PerSourceNetBlockSize IPv6 mask if sscanf
didn't decode it. From Mingjie Shen via GHPR598
OpenBSD-Commit-ID:
c722014e735cbd87adb2fa968ce4c47b43cf98b0
djm@openbsd.org [Mon, 24 Nov 2025 23:56:58 +0000 (23:56 +0000)]
upstream: give ssh-agent more time to start in tests; requested in
GHPR602
OpenBSD-Regress-ID:
7d771db2c1d4a422e83c3f632ba1e96f72a262b8
djm@openbsd.org [Mon, 24 Nov 2025 23:54:15 +0000 (23:54 +0000)]
upstream: When testing PKCS11, explicitly allow the module path in
ssh-agent.
Allows testing of PKCS11 modules outside system directories.
From Morgan Jones via GHPR602
OpenBSD-Regress-ID:
548d6e0362a8d9f7d1cc01444b697a00811ff488
djm@openbsd.org [Mon, 24 Nov 2025 23:43:10 +0000 (23:43 +0000)]
upstream: When loading FIDO2 resident keys, set the comment to the
FIDO application string. This matches the behaviour of ssh-keygen -K
From Arian van Putten via GHPR608
OpenBSD-Commit-ID:
3fda54b44ed6a8a6f94cd3e39e69c1e672095712
tb@openbsd.org [Sun, 23 Nov 2025 07:04:18 +0000 (07:04 +0000)]
upstream: pkcs11_fetch_ecdsa_pubkey: use ASN1_STRING accessors
In anticipation of davidben and beck making ASN1_STRING opaque in
OpenSSL 4 with the aim of enabling surgery to make the X509 data
structure less bad [1], we need to use dumb accessors to avoid build
breakage. Fortunately only in one spot.
This is OpenSSL 1.1 API and available in all members of the fork family.
ok beck djm
[1]: https://github.com/openssl/openssl/issues/29117
OpenBSD-Commit-ID:
0bcaf691d20624ef43f3515c983cd5aa69547d4f
Darren Tucker [Fri, 21 Nov 2025 03:28:20 +0000 (14:28 +1100)]
Update OSSFuzz link to current bug tracker.
Darren Tucker [Fri, 21 Nov 2025 03:21:07 +0000 (14:21 +1100)]
Add VM CI and CIFuzz status badges.
djm@openbsd.org [Fri, 21 Nov 2025 01:29:27 +0000 (01:29 +0000)]
upstream: unit tests for sshbuf_get_nulterminated_string()
OpenBSD-Regress-ID:
cb0af1e4d6dcc94e263942bc4dcf5f4466d1f086
djm@openbsd.org [Fri, 21 Nov 2025 01:29:06 +0000 (01:29 +0000)]
upstream: add a sshbuf_get_nulterminated_string() function to pull a
\0- terminated string from a sshbuf. Intended to be used to improve parsing
of SOCKS headers for dynamic forwarding.
ok deraadt; feedback Tim van der Molen
OpenBSD-Commit-ID:
cf93d6db4730f7518d5269c279e16b172b484b36
dtucker@openbsd.org [Thu, 20 Nov 2025 05:07:57 +0000 (05:07 +0000)]
upstream: Free opts in FAIL_TEST. It should always be NULL anyway so
this is a no-op, but it should placate Coverity CID 405064.
OpenBSD-Regress-ID:
06789754de0741f26432c668fad8b9881c14c153
dtucker@openbsd.org [Thu, 20 Nov 2025 05:10:56 +0000 (05:10 +0000)]
upstream: Plug leaks while parsing Match blocks. Coverity CID
469304, ok djm@
OpenBSD-Commit-ID:
f9b79b86879a953ad034e6b92a398265b251bea7
dtucker@openbsd.org [Thu, 20 Nov 2025 05:10:11 +0000 (05:10 +0000)]
upstream: Plug leaks while parsing Match blocks. Coverity CID
515634, ok miod@ djm@
OpenBSD-Commit-ID:
c7932eddecd47e5122e945246a40c56ffa42a546
Darren Tucker [Tue, 18 Nov 2025 09:14:44 +0000 (20:14 +1100)]
Pull in rev 1.17 for spelling fix.
Prompted by github PR#609 from Edge-Seven.
jca@openbsd.org [Mon, 17 Nov 2025 12:59:29 +0000 (12:59 +0000)]
upstream: Export XDG_RUNTIME_DIR to child ssh sessions
Currently setusercontext(LOGIN_SETALL) does create the directory in
/tmp/run/user, since LOGIN_SETXDGENV is part of LOGIN_SETALL, but the
env variable wasn't exported.
ok djm@
OpenBSD-Commit-ID:
02b8433f72759b3a07b55cbc5a7cdb84391b0017
djm@openbsd.org [Mon, 17 Nov 2025 05:24:42 +0000 (05:24 +0000)]
upstream: don't strnvis() log messages that are going to be logged
by sshd-auth via its parent sshd-session process, as the parent will also run
them though strnvis().
Prevents double-escaping of non-printing characters in some log
messages. bz3896 ok dtucker@
OpenBSD-Commit-ID:
d78faad96a98af5269d66ddceee553cf7d396dfe
Darren Tucker [Mon, 17 Nov 2025 10:36:45 +0000 (21:36 +1100)]
Remove obsolete CVSID.
dtucker@openbsd.org [Mon, 17 Nov 2025 09:59:13 +0000 (09:59 +0000)]
upstream: Ensure both sides of the test are non-NULL instead of just
either. Coverity CID 443285.
OpenBSD-Regress-ID:
aa90e57b1bc8efce9e50734a07a8ffec0680059a
Darren Tucker [Thu, 13 Nov 2025 12:30:48 +0000 (23:30 +1100)]
Move libcrypto init check into entropy.c.
This prevents link errors with the openbsd-compat tests when the linker
tries to bring in all the logging bits.
Icenowy Zheng [Fri, 7 Nov 2025 06:27:35 +0000 (14:27 +0800)]
seccomp sandbox: allow uname(3)
The uname(3) syscall is utilized by zlib-ng on RISC-V to decide whether
the kernel handles VILL bit of V extension properly (by checking the
kernel version against 6.5).
Allow it in the seccomp sandbox.
Signed-off-by: Icenowy Zheng <uwu@icenowy.me>
Darren Tucker [Thu, 13 Nov 2025 11:04:19 +0000 (22:04 +1100)]
Remove remaining OpenSSL_add_all_algorithms() calls.
We already have OPENSSL_init_crypto() in the compat layer (now with a
check of its return code, prompted by tb@). Prompted by github PR#606
from Dimitri John Ledkov. ok beck@
dtucker@openbsd.org [Thu, 13 Nov 2025 10:35:14 +0000 (10:35 +0000)]
upstream: Remove calls to OpenSSL_add_all_algorithms()
and ERR_load_crypto_strings(). These are no-ops in LibreSSL, and in
Portable have been mostly replaced by a call to OPENSSL_init_crypto()
in the compat layer. ok tb@
OpenBSD-Commit-ID:
4c3e0af10fe276766054eda34428a37a5606d3ea
djm@openbsd.org [Thu, 13 Nov 2025 05:13:06 +0000 (05:13 +0000)]
upstream: sync support for systems that lack __builtin_popcount() from
portable
unused on OpenBSD (nothing sets MISSING_BUILTIN_POPCOUNT), but it
makes syncing much easier.
OpenBSD-Commit-ID:
496446300d82615b24f83eca886b8fabdbee445b
djm@openbsd.org [Thu, 13 Nov 2025 04:56:23 +0000 (04:56 +0000)]
upstream: update our ML-KEM implementation to upstream libcrux
v0.0.4
tested/ok tb@
OpenBSD-Commit-ID:
525a62549efbf53492adcb2c57e4872cdbaeed62
tb@openbsd.org [Fri, 7 Nov 2025 06:29:45 +0000 (06:29 +0000)]
upstream: sshkey_ec_validate_public: zap trailing blank I missed on
review
OpenBSD-Commit-ID:
b296bd6056f33fd567ca0d5e9123dac1ec00f037
Darren Tucker [Wed, 12 Nov 2025 23:23:45 +0000 (10:23 +1100)]
Simplify git command to avoid yaml syntax error.
Darren Tucker [Wed, 12 Nov 2025 22:53:17 +0000 (09:53 +1100)]
Don't use OpenSSL's
ed25519 if built without EC.
Explicitly check for OPENSSL_NO_EC, since otherwise the test will link
but then fail at runtime.
Damien Miller [Fri, 7 Nov 2025 04:49:55 +0000 (15:49 +1100)]
octal-escape the colon character
Apparently these are YAML magic when followed by whitespace
Damien Miller [Fri, 7 Nov 2025 04:44:18 +0000 (15:44 +1100)]
try single quotes instead of escaped quotes
Damien Miller [Fri, 7 Nov 2025 04:42:57 +0000 (15:42 +1100)]
escape quotes in yaml
djm@openbsd.org [Fri, 7 Nov 2025 04:33:52 +0000 (04:33 +0000)]
upstream: Escape SSH_AUTH_SOCK paths that are sent to the shell as
setenv commands.
Unbreaks ssh-agent for home directory paths that contain whitespace.
Based on fix from Beat Bolli via bz3884; feedback/ok dtucker@
OpenBSD-Commit-ID:
aaf06594e299940df8b4c4b9f0a1d14bef427e02
djm@openbsd.org [Thu, 6 Nov 2025 17:24:28 +0000 (17:24 +0000)]
upstream: sk-dummy.so needs sshlog() stub after
ed25519 -openssl.c
change
OpenBSD-Regress-ID:
50b7f49021b8085728d0544275e141fb1bf4a2b5
djm@openbsd.org [Thu, 6 Nov 2025 01:33:26 +0000 (01:33 +0000)]
upstream: unit test for stringlist_append() and stringlist_free()
OpenBSD-Regress-ID:
a3a4dae538c831b3810f69abc34ad8504dc3c460
djm@openbsd.org [Thu, 6 Nov 2025 01:33:03 +0000 (01:33 +0000)]
upstream: link against
ed25519 -openssl.c instead of
ed25519 .c
OpenBSD-Regress-ID:
f789d46e99d2598929e3c2d00b45c47cc3102501
anton@openbsd.org [Sat, 1 Nov 2025 05:39:25 +0000 (05:39 +0000)]
upstream: Cope with recent changes and don't link hash.c.
OpenBSD-Regress-ID:
577ef2f36ee592528448e8c0f33499e2e3512054
djm@openbsd.org [Fri, 7 Nov 2025 04:11:59 +0000 (04:11 +0000)]
upstream: Remove some unnecessary checks in
sshkey_ec_validate_public()
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Checking nQ == infinity is not needed for cofactor 1 curves.
Checking x and y coordinates against order is not needed either.
patch from Szilárd Pfeiffer, with further refinement by tb@
ok tb@
OpenBSD-Commit-ID:
ef985e2be7c64e215d064757d3fc65eb181e8ede
djm@openbsd.org [Thu, 6 Nov 2025 01:31:11 +0000 (01:31 +0000)]
upstream: move stringlist_append() and stringlist_free() to misc.c
OpenBSD-Commit-ID:
7d047bbff6964b9abbc04e9b3e2e1b4cc1db0aea
djm@openbsd.org [Fri, 31 Oct 2025 01:50:43 +0000 (01:50 +0000)]
upstream: cleanup file descriptors across PKCS#11 client/helper
execution; ok markus
OpenBSD-Commit-ID:
993628a5b361e30aa48bbb4c07667a280f3f23ab
Darren Tucker [Fri, 31 Oct 2025 21:34:15 +0000 (08:34 +1100)]
Support using git for OpenBSD src tree tests.
Darren Tucker [Fri, 31 Oct 2025 21:33:07 +0000 (08:33 +1100)]
Add OpenBSD 7.8 test target.
Damien Miller [Fri, 31 Oct 2025 02:47:49 +0000 (13:47 +1100)]
check PAM user against previous user, not pw_name
Avoids early fatal() if the user doesn't exist.
Reported by Viswesh Narayanan; ok dtucker@
Damien Miller [Fri, 31 Oct 2025 01:19:47 +0000 (12:19 +1100)]
skip pkcs11 tests when built --without-openssl
Damien Miller [Fri, 31 Oct 2025 01:19:34 +0000 (12:19 +1100)]
add sshlog() replacement to sk-dummy.so
Damien Miller [Fri, 31 Oct 2025 00:16:29 +0000 (11:16 +1100)]
rename openbsd-compat sha2.h -> bsd-sha2.h
avoids confusion with system header when included from files under
openbsd-compat/
Damien Miller [Fri, 31 Oct 2025 00:07:17 +0000 (11:07 +1100)]
fix linking for sk-dummy.so, used in tests
djm@openbsd.org [Thu, 30 Oct 2025 23:55:09 +0000 (23:55 +0000)]
upstream: don't link hash.c
OpenBSD-Regress-ID:
a145f09c1efb1fcd3924544463f1f94f5d4805c0
miod@openbsd.org [Thu, 23 Oct 2025 19:06:10 +0000 (19:06 +0000)]
upstream: Prepare for gcc 3 leaving the building, COMPILER_VERSION
can no longer get set to "gcc3".
OpenBSD-Regress-ID:
02351ea947975b80be60b9a8c6e4dbb57789e890
dtucker@openbsd.org [Thu, 23 Oct 2025 06:15:26 +0000 (06:15 +0000)]
upstream: Check tmux version and skip if too old. ok djm@
OpenBSD-Regress-ID:
fb62024eb753c61b4d78402ec8378af839fad26c
djm@openbsd.org [Thu, 30 Oct 2025 23:19:33 +0000 (23:19 +0000)]
upstream: move crypto_hash_sha512() to be inline in crypto_api.h, saves
about 0.5kb per binary and makes life easier for portable; with/ok dtucker@
OpenBSD-Commit-ID:
672d7390f78bb6581c12661d7f5adc8a9c6be564
djm@openbsd.org [Thu, 30 Oct 2025 20:49:10 +0000 (20:49 +0000)]
upstream: support
ed25519 signatures via libcrypto. Mostly by Jeremy
Allison Feedback tb@, ok tb@ markus@
OpenBSD-Commit-ID:
e8edf8adffd5975d05769dde897df882d7933526
djm@openbsd.org [Thu, 30 Oct 2025 03:19:54 +0000 (03:19 +0000)]
upstream: Activate UnusedConnectionTimeout only after last channel
has closed. Previously UnusedConnectionTimeout could fire early after a
ChannelTimeout.
This was not a problem for the OpenSSH client because it terminates
once all channels have closed but could cause problems for other
clients (e.g. API clients) that do things differently.
bz3827; ok dtucker
OpenBSD-Commit-ID:
ff2e4607cbd4e600de3c8a5ece3b0e4bb641ed8f
miod@openbsd.org [Thu, 23 Oct 2025 19:06:10 +0000 (19:06 +0000)]
upstream: Prepare for gcc 3 leaving the building, COMPILER_VERSION
can no longer get set to "gcc3".
OpenBSD-Commit-ID:
98eefed432ff8253b307002e20d28da14b93e7e3
djm@openbsd.org [Wed, 22 Oct 2025 06:22:58 +0000 (06:22 +0000)]
upstream: more explicit synchronisation around killing tmux sessions
between runs.
OpenBSD-Regress-ID:
1735f5cb13ad281e869ab998c7d49b692ee3ed47
djm@openbsd.org [Wed, 22 Oct 2025 05:22:31 +0000 (05:22 +0000)]
upstream: remove debugging junk
OpenBSD-Regress-ID:
3247e0ac98ae4cfe4eede871ef424d166e29e828
djm@openbsd.org [Tue, 21 Oct 2025 23:30:01 +0000 (23:30 +0000)]
upstream: just skip the test if $PATH or $HOME has whitespace in it
OpenBSD-Regress-ID:
ccf75a29d1a300a35f63be0e4f11ad5276756275
djm@openbsd.org [Tue, 21 Oct 2025 22:13:27 +0000 (22:13 +0000)]
upstream: quote paths; avoids test failure when run from a path with a
space in it
OpenBSD-Regress-ID:
e4b7bffc289f10d47c50c02dd70b0323078a83b4
djm@openbsd.org [Tue, 21 Oct 2025 08:35:22 +0000 (08:35 +0000)]
upstream: fix test for executability of tmux
OpenBSD-Regress-ID:
a18119876ecfd95edb78225b086ac668eb0977ab