]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
Darren Tucker [Tue, 14 Jan 2020 03:41:47 +0000 (14:41 +1100)]
Wrap stdint.h inside HAVE_STDINT_H.
Darren Tucker [Tue, 14 Jan 2020 03:26:41 +0000 (14:26 +1100)]
Include compat header for definitions.
Darren Tucker [Mon, 13 Jan 2020 22:42:52 +0000 (09:42 +1100)]
Improve search for 'struct timespec'.
Make struct timespec test consistent with existing timeval test.
Include time.h for timespec in compat header where required.
Darren Tucker [Tue, 14 Jan 2020 01:43:03 +0000 (12:43 +1100)]
Update depend to remove rmd160.h.
Darren Tucker [Mon, 13 Jan 2020 20:24:46 +0000 (07:24 +1100)]
Remove configure test & compat code for ripemd160.
RIPEMD160 support was removed upstream in 2017, however we still had
a configure test and compat code for it, so clean those up now.
djm@openbsd.org [Thu, 9 Jan 2020 03:28:38 +0000 (03:28 +0000)]
upstream: fix reversed arguments on expand_proxy_command(); spotted
by anton@
OpenBSD-Commit-ID:
db1c32478a01dfbc9c4db171de0f25907bea5775
jmc@openbsd.org [Mon, 6 Jan 2020 07:43:28 +0000 (07:43 +0000)]
upstream: put the fido options in a list, and tidy up the text a
little; ok djm
OpenBSD-Commit-ID:
491ce15ae52a88b7a6a2b3b6708a14b4aacdeebb
Jeremy Drake [Sat, 12 Oct 2019 01:31:05 +0000 (18:31 -0700)]
Deny (non-fatal) ipc in preauth privsep child.
As noted in openssh/openssh-portable#149, i386 does not have have
_NR_shmget etc. Instead, it has a single ipc syscall (see man 2 ipc,
https://linux.die.net/man/2/ipc). Add this syscall, if present, to the
list of syscalls that seccomp will deny non-fatally.
Khem Raj [Wed, 8 Jan 2020 00:26:45 +0000 (16:26 -0800)]
seccomp: Allow clock_gettime64() in sandbox.
This helps sshd accept connections on mips platforms with
upcoming glibc ( 2.31 )
djm@openbsd.org [Mon, 6 Jan 2020 02:39:30 +0000 (02:39 +0000)]
upstream: missing else in check_enroll_options()
OpenBSD-Commit-ID:
e058fb918fda56ddbbf0bee910101004cec421d4
djm@openbsd.org [Mon, 6 Jan 2020 02:24:28 +0000 (02:24 +0000)]
upstream: fix error message
OpenBSD-Commit-ID:
1eb52025658eb78ea6223181e552862198d3d505
djm@openbsd.org [Mon, 6 Jan 2020 02:07:50 +0000 (02:07 +0000)]
upstream: adapt sk-dummy to SK API changes
also, make it pull prototypes directly from sk-api.c and #error
if the expected version changes. This will make any future regress
test breakage because of SK API changes much more apparent
OpenBSD-Regress-ID:
79b07055de4feb988e31da71a89051ad5969829d
djm@openbsd.org [Mon, 6 Jan 2020 02:00:46 +0000 (02:00 +0000)]
upstream: Extends the SK API to accept a set of key/value options
for all operations. These are intended to future-proof the API a little by
making it easier to specify additional fields for without having to change
the API version for each.
At present, only two options are defined: one to explicitly specify
the device for an operation (rather than accepting the middleware's
autoselection) and another to specify the FIDO2 username that may
be used when generating a resident key. These new options may be
invoked at key generation time via ssh-keygen -O
This also implements a suggestion from Markus to avoid "int" in favour
of uint32_t for the algorithm argument in the API, to make implementation
of ssh-sk-client/helper a little easier.
feedback, fixes and ok markus@
OpenBSD-Commit-ID:
973ce11704609022ab36abbdeb6bc23c8001eabc
beck@openbsd.org [Sun, 5 Jan 2020 16:28:22 +0000 (16:28 +0000)]
upstream: fix CanonicalizeHostname, broken by rev 1.507
Issue noticed and reported by Pierre-Olivier Martel <pom@apple.com>
ok dtucker@ markus@ djm@
OpenBSD-Commit-ID:
749f3168ec520609c35b0c4e1984e5fa47f16094
Darren Tucker [Sun, 5 Jan 2020 22:02:53 +0000 (09:02 +1100)]
Fix typo: 'you' -> 'your'.
bz#3108 from jmckitrick@gmail.com.
Darren Tucker [Sun, 5 Jan 2020 21:56:46 +0000 (08:56 +1100)]
Remove auth-skey.c.
S/Key support was removed in OpenSSH 7.8 but this file was missed.
jmc@openbsd.org [Fri, 3 Jan 2020 07:33:33 +0000 (07:33 +0000)]
upstream: the download resident keys option is -K (upper) not -k
(lower); ok djm
OpenBSD-Commit-ID:
71dc28a3e1fa7c553844abc508845bcf5766e091
djm@openbsd.org [Fri, 3 Jan 2020 03:02:26 +0000 (03:02 +0000)]
upstream: what bozo decided to use 2020 as a future date in a regress
test?
OpenBSD-Regress-ID:
3b953df5a7e14081ff6cf495d4e8d40e153cbc3a
djm@openbsd.org [Fri, 3 Jan 2020 02:46:19 +0000 (02:46 +0000)]
upstream: implement recent SK API change to support resident keys
and PIN prompting in the dummy middleware that we use for the tests. Should
fix breakage spotted by dtucker@
OpenBSD-Regress-ID:
379cf9eabfea57aaf7f3f59dafde59889566c484
dtucker@openbsd.org [Thu, 2 Jan 2020 13:25:38 +0000 (13:25 +0000)]
upstream: Update keygen moduli screen test to match recent command
line option change to ssh-keygen(1).
OpenBSD-Regress-ID:
744a72755004377e9669b662c13c6aa9ead8a0c3
djm@openbsd.org [Thu, 2 Jan 2020 22:40:09 +0000 (22:40 +0000)]
upstream: ability to download FIDO2 resident keys from a token via
"ssh-keygen -K". This will save public/private keys into the current
directory.
This is handy if you move a token between hosts.
feedback & ok markus@
OpenBSD-Commit-ID:
d57c1f9802f7850f00a117a1d36682a6c6d10da6
djm@openbsd.org [Thu, 2 Jan 2020 22:38:33 +0000 (22:38 +0000)]
upstream: add sshkey_save_public(), to save a public key; ok
markus@
OpenBSD-Commit-ID:
5d6f96a966d10d7fa689ff9aa9e1d6767ad5a076
jmc@openbsd.org [Mon, 30 Dec 2019 16:10:00 +0000 (16:10 +0000)]
upstream: simplify the list for moduli options - no need for
-compact;
OpenBSD-Commit-ID:
6492c72280482c6d072be46236b365cb359fc280
Damien Miller [Thu, 2 Jan 2020 02:41:31 +0000 (13:41 +1100)]
ssh-sk-null.cc needs extern "C" {}
Damien Miller [Wed, 1 Jan 2020 23:56:29 +0000 (10:56 +1100)]
add dummy ssh-sk API for linking with fuzzers
Damien Miller [Mon, 30 Dec 2019 10:04:09 +0000 (21:04 +1100)]
refresh depend
djm@openbsd.org [Mon, 30 Dec 2019 09:49:52 +0000 (09:49 +0000)]
upstream: Remove the -x option currently used for
FIDO/U2F-specific key flags. Instead these flags may be specified via -O.
ok markus@
OpenBSD-Commit-ID:
f23ebde2a8a7e1bf860a51055a711cffb8c328c1
djm@openbsd.org [Mon, 30 Dec 2019 09:25:29 +0000 (09:25 +0000)]
upstream: document SK API changes in PROTOCOL.u2f
ok markus@
OpenBSD-Commit-ID:
52622363c103a3c4d3d546050480ffe978a32186
djm@openbsd.org [Mon, 30 Dec 2019 09:24:45 +0000 (09:24 +0000)]
upstream: translate and return error codes; retry on bad PIN
Define some well-known error codes in the SK API and pass
them back via ssh-sk-helper.
Use the new "wrong PIN" error code to retry PIN prompting during
ssh-keygen of resident keys.
feedback and ok markus@
OpenBSD-Commit-ID:
9663c6a2bb7a0bc8deaccc6c30d9a2983b481620
djm@openbsd.org [Mon, 30 Dec 2019 09:24:03 +0000 (09:24 +0000)]
upstream: improve some error messages; ok markus@
OpenBSD-Commit-ID:
4ccd8ddabb8df4f995107dd3b7ea58220e93cb81
djm@openbsd.org [Mon, 30 Dec 2019 09:23:28 +0000 (09:23 +0000)]
upstream: SK API and sk-helper error/PIN passing
Allow passing a PIN via the SK API (API major crank) and let the
ssh-sk-helper API follow.
Also enhance the ssh-sk-helper API to support passing back an error
code instead of a complete reply. Will be used to signal "wrong PIN",
etc.
feedback and ok markus@
OpenBSD-Commit-ID:
a1bd6b0a2421646919a0c139b8183ad76d28fb71
djm@openbsd.org [Mon, 30 Dec 2019 09:22:49 +0000 (09:22 +0000)]
upstream: implement loading resident keys in ssh-add
"ssh-add -O" will load resident keys from a FIDO2 token and add them
to a ssh-agent.
feedback and ok markus@
OpenBSD-Commit-ID:
608104ae957a7d65cb84e0a3a26c8f60e0df3290
djm@openbsd.org [Mon, 30 Dec 2019 09:21:59 +0000 (09:21 +0000)]
upstream: implement loading of resident keys in ssh-sk-helper
feedback and ok markus@
OpenBSD-Commit-ID:
b273c23769ea182c55c4a7b8f9cbd9181722011a
djm@openbsd.org [Mon, 30 Dec 2019 09:21:16 +0000 (09:21 +0000)]
upstream: resident keys support in SK API
Adds a sk_load_resident_keys() function to the security key
API that accepts a security key provider and a PIN and returns
a list of keys.
Implement support for this in the usbhid middleware.
feedback and ok markus@
OpenBSD-Commit-ID:
67e984e4e87f4999ce447a6178c4249a9174eff0
djm@openbsd.org [Mon, 30 Dec 2019 09:20:36 +0000 (09:20 +0000)]
upstream: Factor out parsing of struct sk_enroll_response
We'll reuse this for extracting resident keys from a device.
feedback and ok markus@
OpenBSD-Commit-ID:
9bc1efd9c6897eac4df0983746cf6578c1542273
djm@openbsd.org [Mon, 30 Dec 2019 09:19:52 +0000 (09:19 +0000)]
upstream: basic support for generating FIDO2 resident keys
"ssh-keygen -t ecdsa-sk|
ed25519 -sk -x resident" will generate a
device-resident key.
feedback and ok markus@
OpenBSD-Commit-ID:
8e1b3c56a4b11d85047bd6c6c705b7eef4d58431
djm@openbsd.org [Mon, 30 Dec 2019 03:30:09 +0000 (03:30 +0000)]
upstream: remove single-letter flags for moduli options
Move all moduli generation options to live under the -O flag.
Frees up seven single-letter flags.
NB. this change break existing ssh-keygen commandline syntax for moduli-
related operations. Very few people use these fortunately.
feedback and ok markus@
OpenBSD-Commit-ID:
d498f3eaf28128484826a4fcb343612764927935
djm@openbsd.org [Mon, 30 Dec 2019 03:28:41 +0000 (03:28 +0000)]
upstream: prepare for use of ssh-keygen -O flag beyond certs
Move list of available certificate options in ssh-keygen.1 to the
CERTIFICATES section.
Collect options specified by -O but delay parsing/validation of
certificate options until we're sure that we're acting as a CA.
ok markus@
OpenBSD-Commit-ID:
33e6bcc29cfca43606f6fa09bd84b955ee3a4106
jmc@openbsd.org [Fri, 27 Dec 2019 08:28:44 +0000 (08:28 +0000)]
upstream: sort -Y internally in the options list, as is already
done in synopsis;
OpenBSD-Commit-ID:
86d033c5764404057616690d7be992e445b42274
jmc@openbsd.org [Fri, 27 Dec 2019 08:25:07 +0000 (08:25 +0000)]
upstream: in the options list, sort -Y and -y;
OpenBSD-Commit-ID:
24c2e6a3aeab6e050a0271ffc73fdff91c10dcaa
naddy@openbsd.org [Sat, 21 Dec 2019 20:22:34 +0000 (20:22 +0000)]
upstream: Replace the term "security key" with "(FIDO)
authenticator".
The polysemous use of "key" was too confusing. Input from markus@.
ok jmc@
OpenBSD-Commit-ID:
12eea973a44c8232af89f86e4269d71ae900ca8f
djm@openbsd.org [Sat, 21 Dec 2019 02:33:07 +0000 (02:33 +0000)]
upstream: unit tests for ForwardAgent=/path; from Eric Chiang
OpenBSD-Regress-ID:
24f693f78290b2c17725dab2c614dffe4a88c8da
djm@openbsd.org [Mon, 16 Dec 2019 02:39:05 +0000 (02:39 +0000)]
upstream: test security key host keys in addition to user keys
OpenBSD-Regress-ID:
9fb45326106669a27e4bf150575c321806e275b1
djm@openbsd.org [Sat, 21 Dec 2019 02:19:13 +0000 (02:19 +0000)]
upstream: Allow forwarding a different agent socket to the path
specified by $SSH_AUTH_SOCK, by extending the existing ForwardAgent option to
accepting an explicit path or the name of an environment variable in addition
to yes/no.
Patch by Eric Chiang, manpage by me; ok markus@
OpenBSD-Commit-ID:
98f2ed80bf34ea54d8b2ddd19ac14ebbf40e9265
naddy@openbsd.org [Fri, 20 Dec 2019 20:28:55 +0000 (20:28 +0000)]
upstream: SSH U2F keys can now be used as host keys. Fix a garden
path sentence. ok markus@
OpenBSD-Commit-ID:
67d7971ca1a020acd6c151426c54bd29d784bd6b
dtucker@openbsd.org [Fri, 20 Dec 2019 02:42:42 +0000 (02:42 +0000)]
upstream: Move always unsupported keywords to be grouped with the other
ones. Move oSecurityProvider to match the order in the OpCodes enum. Patch
from openbsd@academicsolutions.ch, ok djm@
OpenBSD-Commit-ID:
061e4505861ec1e02ba3a63e3d1b3be3cad458ec
dtucker@openbsd.org [Fri, 20 Dec 2019 02:29:21 +0000 (02:29 +0000)]
upstream: Remove obsolete opcodes from the configuation enum.
Patch from openbsd@academicsolutions.ch, ok djm@
OpenBSD-Commit-ID:
395c202228872ce8d9044cc08552ac969f51e01b
dtucker@openbsd.org [Fri, 20 Dec 2019 02:11:38 +0000 (02:11 +0000)]
upstream: Remove now-obsolete config options from example in
comment. Patch from openbsd@academicsolutions.ch, ok djm@
OpenBSD-Commit-ID:
35862beb0927b1cb0af476ec23cc07f6e3006101
naddy@openbsd.org [Thu, 19 Dec 2019 15:09:30 +0000 (15:09 +0000)]
upstream: Document that security key-hosted keys can act as host
keys.
Update the list of default host key algorithms in ssh_config.5 and
sshd_config.5. Copy the description of the SecurityKeyProvider
option to sshd_config.5.
ok jmc@
OpenBSD-Commit-ID:
edadf3566ab5e94582df4377fee3b8b702c7eca0
dtucker@openbsd.org [Thu, 19 Dec 2019 03:50:01 +0000 (03:50 +0000)]
upstream: "Forward security" -> "Forward secrecy" since that's the
correct term. Add "MAC" since we use that acronym in other man pages. ok
naddy@
OpenBSD-Commit-ID:
c35529e511788586725fb63bda3459e10738c5f5
naddy@openbsd.org [Tue, 17 Dec 2019 16:21:07 +0000 (16:21 +0000)]
upstream: cut obsolete lists of crypto algorithms from outline of
how SSH works ok markus@ jmc@
OpenBSD-Commit-ID:
8e34973f232ab48c4d4f5d07df48d501708b9160
tobhe@openbsd.org [Mon, 16 Dec 2019 13:58:53 +0000 (13:58 +0000)]
upstream: strdup may return NULL if memory allocation fails. Use
the safer xstrdup which fatals on allocation failures.
ok markus@
OpenBSD-Commit-ID:
8b608d387120630753cbcb8110e0b019c0c9a0d0
djm@openbsd.org [Mon, 16 Dec 2019 03:16:58 +0000 (03:16 +0000)]
upstream: sort sk-* methods behind their plain key methods cousins
for now
OpenBSD-Commit-ID:
c97e22c2b28c0d12ee389b8b4ef5f2ada7908828
Darren Tucker [Tue, 17 Dec 2019 08:46:15 +0000 (19:46 +1100)]
Mac OS X has PAM too.
Darren Tucker [Tue, 17 Dec 2019 08:37:06 +0000 (19:37 +1100)]
Show portable tarball pattern in example.
Darren Tucker [Tue, 17 Dec 2019 08:35:59 +0000 (19:35 +1100)]
OpenSSL is now optional.
djm@openbsd.org [Sun, 15 Dec 2019 18:58:33 +0000 (18:58 +0000)]
upstream: adapt to ssh-sk-client change
OpenBSD-Regress-ID:
40481999a5928d635ab2e5b029e8239c112005ea
djm@openbsd.org [Wed, 11 Dec 2019 18:47:14 +0000 (18:47 +0000)]
upstream: it's no longer possible to disable privilege separation
in sshd, so don't double the tests' work by trying both off/on
OpenBSD-Regress-ID:
d366665466dbd09e9b707305da884be3e7619c68
djm@openbsd.org [Sun, 15 Dec 2019 20:59:23 +0000 (20:59 +0000)]
upstream: don't treat HostKeyAgent=none as a path either; avoids
spurious warnings from the cfgparse regress test
OpenBSD-Commit-ID:
ba49ea7a5c92b8a16cb9c2e975dbb163853afc54
djm@openbsd.org [Sun, 15 Dec 2019 20:57:15 +0000 (20:57 +0000)]
upstream: do not attempt to find an absolute path for sshd_config
SecurityKeyProvider=internal - unbreaks cfgparse regress test
OpenBSD-Commit-ID:
d2ddcf525c0dc3c8339522360c10b3c70f1fd641
djm@openbsd.org [Sun, 15 Dec 2019 19:47:10 +0000 (19:47 +0000)]
upstream: allow ssh-keyscan to find security key hostkeys
OpenBSD-Commit-ID:
1fe822a7f714df19a7e7184e3a3bbfbf546811d3
djm@openbsd.org [Sun, 15 Dec 2019 18:57:30 +0000 (18:57 +0000)]
upstream: allow security keys to act as host keys as well as user
keys.
Previously we didn't do this because we didn't want to expose
the attack surface presented by USB and FIDO protocol handling,
but now that this is insulated behind ssh-sk-helper there is
less risk.
ok markus@
OpenBSD-Commit-ID:
77b068dd133b8d87e0f010987bd5131e640ee64c
Darren Tucker [Mon, 16 Dec 2019 02:55:56 +0000 (13:55 +1100)]
Allow clock_nanosleep_time64 in seccomp sandbox.
Needed on Linux ARM. bz#3100, patch from jjelen@redhat.com.
Darren Tucker [Sun, 15 Dec 2019 07:27:02 +0000 (18:27 +1100)]
Put SK ECDSA bits inside ifdef OPENSSL_HAS_ECC.
Fixes build when linking against OpenSSLs built with no-ec.
Damien Miller [Fri, 13 Dec 2019 22:21:46 +0000 (09:21 +1100)]
remove a bunch of ENABLE_SK #ifdefs
The ssh-sk-helper client API gives us a nice place to disable
security key support when it is wasn't enabled at compile time,
so we don't need to check everywere.
Also, verification of security key signatures can remain enabled
all the time - it has no additional dependencies. So sshd can
accept security key pubkeys in authorized_keys, etc regardless of
the host's support for dlopen, etc.
Damien Miller [Fri, 13 Dec 2019 22:15:06 +0000 (09:15 +1100)]
ssh-sk-client.c needs includes.h
Damien Miller [Fri, 13 Dec 2019 21:40:33 +0000 (08:40 +1100)]
only link ssh-sk-helper against libfido2
Damien Miller [Fri, 13 Dec 2019 21:20:52 +0000 (08:20 +1100)]
adapt Makefile to ssh-sk-client everywhere
Damien Miller [Fri, 13 Dec 2019 20:53:11 +0000 (07:53 +1100)]
fixup
djm@openbsd.org [Fri, 13 Dec 2019 20:16:56 +0000 (20:16 +0000)]
upstream: actually commit the ssh-sk-helper client code; ok markus
OpenBSD-Commit-ID:
fd2ea776a5bbbf4d452989d3c3054cf25a5e0589
djm@openbsd.org [Fri, 13 Dec 2019 19:11:14 +0000 (19:11 +0000)]
upstream: perform security key enrollment via ssh-sk-helper too.
This means that ssh-keygen no longer needs to link against ssh-sk-helper, and
only ssh-sk-helper needs libfido2 and /dev/uhid* access;
feedback & ok markus@
OpenBSD-Commit-ID:
9464233fab95708d2ff059f8bee29c0d1f270800
djm@openbsd.org [Fri, 13 Dec 2019 19:09:37 +0000 (19:09 +0000)]
upstream: allow sshbuf_put_stringb(buf, NULL); ok markus@
OpenBSD-Commit-ID:
91482c1ada9adb283165d48dafbb88ae91c657bd
djm@openbsd.org [Fri, 13 Dec 2019 19:09:10 +0000 (19:09 +0000)]
upstream: use ssh-sk-helper for all security key signing operations
This extracts and refactors the client interface for ssh-sk-helper
from ssh-agent and generalises it for use by the other programs.
This means that most OpenSSH tools no longer need to link against
libfido2 or directly interact with /dev/uhid*
requested by, feedback and ok markus@
OpenBSD-Commit-ID:
1abcd3aea9a7460eccfbf8ca154cdfa62f1dc93f
djm@openbsd.org [Wed, 11 Dec 2019 22:19:47 +0000 (22:19 +0000)]
upstream: add a note about the 'extensions' field in the signed
object
OpenBSD-Commit-ID:
67c01e0565b258e0818c1ccfe1f1aeaf9a0d4c7b
djm@openbsd.org [Tue, 10 Dec 2019 23:37:31 +0000 (23:37 +0000)]
upstream: some more corrections for documentation problems spotted
by Ron Frederick
document certifiate private key format
correct flags type for sk-ssh-
ed25519 @openssh.com keys
OpenBSD-Commit-ID:
fc4e9a1ed7f9f7f9dd83e2e2c59327912e933e74
djm@openbsd.org [Tue, 10 Dec 2019 23:21:56 +0000 (23:21 +0000)]
upstream: loading security keys into ssh-agent used the extension
constraint "sk-provider@openssh.com", not "sk@openssh.com"; spotted by Ron
Frederick
OpenBSD-Commit-ID:
dbfba09edbe023abadd5f59c1492df9073b0e51d
djm@openbsd.org [Tue, 10 Dec 2019 22:43:19 +0000 (22:43 +0000)]
upstream: add security key types to list of keys allowed to act as
CAs; spotted by Ron Frederick
OpenBSD-Commit-ID:
9bb0dfff927b4f7aa70679f983f84c69d45656c3
djm@openbsd.org [Tue, 10 Dec 2019 22:37:20 +0000 (22:37 +0000)]
upstream: when acting as a CA and using a security key as the CA
key, remind the user to touch they key to authorise the signature.
OpenBSD-Commit-ID:
fe58733edd367362f9766b526a8b56827cc439c1
djm@openbsd.org [Tue, 10 Dec 2019 22:36:08 +0000 (22:36 +0000)]
upstream: chop some unnecessary and confusing verbiage from the
security key protocol description; feedback from Ron Frederick
OpenBSD-Commit-ID:
048c9483027fbf9c995e5a51b3ac502989085a42
djm@openbsd.org [Fri, 6 Dec 2019 03:06:08 +0000 (03:06 +0000)]
upstream: fix setting of $SSH_ASKPASS_PROMPT - it shouldn't be set
when asking passphrases, only when confirming the use of a key (i.e. for
ssh-agent keys added with "ssh-add -c keyfile")
OpenBSD-Commit-ID:
6643c82960d9427d5972eb702c917b3b838ecf89
djm@openbsd.org [Fri, 6 Dec 2019 02:55:21 +0000 (02:55 +0000)]
upstream: bring the __func__
OpenBSD-Commit-ID:
71a3a45b0fe1b8f680ff95cf264aa81f7abbff67
jmc@openbsd.org [Sat, 30 Nov 2019 07:07:59 +0000 (07:07 +0000)]
upstream: tweak the Nd lines for a bit of consistency; ok markus
OpenBSD-Commit-ID:
876651bdde06bc1e72dd4bd7ad599f42a6ce5a16
Darren Tucker [Wed, 11 Dec 2019 02:22:06 +0000 (13:22 +1100)]
Check if memmem is declared in system headers.
If the system (or one of the dependencies) implements memmem but does
not define the header, we would not declare it either resulting in
compiler warnings. Check for declaration explicitly. bz#3102.
Darren Tucker [Wed, 11 Dec 2019 02:12:01 +0000 (13:12 +1100)]
Sort depends.
Darren Tucker [Wed, 11 Dec 2019 02:09:34 +0000 (13:09 +1100)]
Sort .depend when rebuilding.
This makes diffs more stable between makedepend implementations.
Darren Tucker [Wed, 11 Dec 2019 02:06:43 +0000 (13:06 +1100)]
Update depend to include sk files.
Darren Tucker [Mon, 9 Dec 2019 09:25:26 +0000 (20:25 +1100)]
Describe how to build libcrypto as PIC.
While there, move the OpenSSL 1.1.0g caveat closer to the other version
information.
Darren Tucker [Mon, 9 Dec 2019 06:23:22 +0000 (17:23 +1100)]
Recommend running LibreSSL or OpenSSL self-tests.
Darren Tucker [Fri, 6 Dec 2019 03:17:26 +0000 (14:17 +1100)]
Wrap ECC specific bits in ifdef.
Fixes tests when built against an OpenSSL configured with no-ec.
Darren Tucker [Fri, 29 Nov 2019 09:21:36 +0000 (20:21 +1100)]
Wrap sha2.h include in ifdef.
Fixes build --without-openssl on at least Fedora.
Damien Miller [Fri, 29 Nov 2019 04:10:21 +0000 (15:10 +1100)]
compile sk-dummy.so with no-PIE version of LDFLAGS
This lets it pick up the -L path to libcrypto for example.
Damien Miller [Fri, 29 Nov 2019 03:48:46 +0000 (14:48 +1100)]
includes.h for sk-dummy.c, dummy
Damien Miller [Fri, 29 Nov 2019 01:32:23 +0000 (12:32 +1100)]
(yet) another x-platform fix for sk-dummy.so
Check for -fPIC support from compiler
Compile libopenbsd-compat -fPIC
Don't mix -fPIE and -fPIC when compiling
Damien Miller [Fri, 29 Nov 2019 00:53:57 +0000 (11:53 +1100)]
needs includes.h for WITH_OPENSSL
Damien Miller [Fri, 29 Nov 2019 00:52:23 +0000 (11:52 +1100)]
another attempt at sk-dummy.so working x-platform
include a fatal() implementation to satisfy libopenbsd-compat
clean up .lo and .so files
.gitignore .lo and .so files
djm@openbsd.org [Fri, 29 Nov 2019 00:13:29 +0000 (00:13 +0000)]
upstream: lots of dependencies go away here with
ed25519 no longer
needing the ssh_digest API.
OpenBSD-Regress-ID:
785847ec78cb580d141e29abce351a436d6b5d49
djm@openbsd.org [Fri, 29 Nov 2019 00:11:21 +0000 (00:11 +0000)]
upstream: perform hashing directly in crypto_hash_sha512() using
libcrypto or libc SHA512 functions rather than calling ssh_digest_memory();
avoids many dependencies on ssh code that complicate standalone use of
ed25519 , as we want to do in sk-dummy.so
OpenBSD-Commit-ID:
5a3c37593d3ba7add037b587cec44aaea088496d
jmc@openbsd.org [Thu, 28 Nov 2019 12:24:31 +0000 (12:24 +0000)]
upstream: improve the text for -A a little; input from naddy and
djm
OpenBSD-Commit-ID:
f9cdfb1d6dbb9887c4bf3bb25f9c7a94294c988d
jmc@openbsd.org [Thu, 28 Nov 2019 12:23:25 +0000 (12:23 +0000)]
upstream: reshuffle the text to read better; input from naddy,
djmc, and dtucker
OpenBSD-Commit-ID:
a0b2aca2b67614dda3d6618ea097bf0610c35013
Damien Miller [Thu, 28 Nov 2019 07:09:07 +0000 (18:09 +1100)]
$< doesn't work as` I thought; explicily list objs