]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
Darren Tucker [Sat, 26 Nov 2022 22:28:20 +0000 (09:28 +1100)]
Rename "os" in matrix to "target".
This is in preparation to distinguish this from the host that the runner
runs on in case where they are separate (eg VMs).
Darren Tucker [Sat, 26 Nov 2022 22:23:04 +0000 (09:23 +1100)]
Remove unused self-hosted test targets.
Darren Tucker [Sat, 26 Nov 2022 22:16:15 +0000 (09:16 +1100)]
Remove explicit "default" test config argument.
Not specifying the test config implicitly selects default args.
Darren Tucker [Wed, 23 Nov 2022 02:18:54 +0000 (13:18 +1100)]
Add fallback for old platforms w/out MAP_ANON.
Darren Tucker [Wed, 23 Nov 2022 02:09:11 +0000 (13:09 +1100)]
If we haven't found it yet, recheck for sys/stat.h.
On some very old platforms, sys/stat.h needs sys/types.h, however
autoconf 2.71's AC_CHECK_INCLUDES_DEFAULT checks for them in the
opposite order, which in combination with modern autoconf's
"present but cannot be compiled" behaviour causes it to not be
detected.
Darren Tucker [Fri, 11 Nov 2022 00:25:37 +0000 (11:25 +1100)]
Add dfly62 test target.
dtucker@openbsd.org [Thu, 10 Nov 2022 23:03:10 +0000 (23:03 +0000)]
upstream: Handle dynamic remote port forwarding in escape commandline's
-R processing. bz#3499, ok djm@
OpenBSD-Commit-ID:
194ee4cfe7ed0e2b8ad0727f493c798a50454208
Darren Tucker [Thu, 10 Nov 2022 01:44:51 +0000 (12:44 +1100)]
Remove seed passing over reexec.
This was added for the benefit of platforms using ssh-rand-helper to
prevent a delay on each connection as sshd reseeded itself.
ssh-random-helper is long gone, and since the re-exec happens before the
chroot the re-execed sshd can reseed itself normally. ok djm@
Darren Tucker [Wed, 9 Nov 2022 09:59:20 +0000 (20:59 +1100)]
Skip reexec test on OpenSSL 1.1.1 specifically.
OpenSSL 1.1.1 has a bug in its RNG that breaks reexec fallback, so skip
that test. See bz#3483 for details.
dtucker@openbsd.org [Wed, 9 Nov 2022 09:04:12 +0000 (09:04 +0000)]
upstream: Fix typo in fatal error message.
Patch from vapier at chromium.org.
OpenBSD-Commit-ID:
8a0c164a6a25eef0eedfc30df95bfa27644e35cf
dtucker@openbsd.org [Wed, 9 Nov 2022 09:01:52 +0000 (09:01 +0000)]
upstream: Remove errant colon and simplify format
string in error messages. Patch from vapier at chromium.org.
OpenBSD-Commit-ID:
fc28466ebc7b74e0072331947a89bdd239c160d3
djm@openbsd.org [Wed, 9 Nov 2022 01:37:44 +0000 (01:37 +0000)]
upstream: rename client_global_hostkeys_private_confirm() to
client_global_hostkeys_prove_confirm(), as it handles the
"hostkeys-prove00@openssh.com" message; no functional change
OpenBSD-Commit-ID:
31e09bd3cca6eed26855b88fb8beed18e9bd026d
djm@openbsd.org [Wed, 9 Nov 2022 00:15:59 +0000 (00:15 +0000)]
upstream: typo in comment
OpenBSD-Commit-ID:
39c58f41e0f32d1ff31731fa6f5bbbc3ad25084a
Darren Tucker [Tue, 8 Nov 2022 22:23:47 +0000 (09:23 +1100)]
Defer seed_rng until after closefrom call.
seed_rng will initialize OpenSSL, and some engine providers (eg Intel's
QAT) will open descriptors for their own use. bz#3483, patch from
joel.d.schuetze at intel.com, ok djm@
Darren Tucker [Tue, 8 Nov 2022 21:27:47 +0000 (08:27 +1100)]
Fix comment text. From emaste at freebsd.org.
Pierre Ossman [Wed, 6 Jul 2022 11:52:10 +0000 (13:52 +0200)]
Avoid assuming layout of fd_set
POSIX doesn't specify the internal layout of the fd_set object, so let's
not assume it is just a bit mask. This increases compatibility with
systems that have a different layout.
The assumption is also worthless as we already refuse to use file
descriptors over FD_SETSIZE anyway. Meaning that the default size of
fd_set is quite sufficient.
Darren Tucker [Tue, 8 Nov 2022 01:42:52 +0000 (12:42 +1100)]
Shutdown any VM before trying to check out repo.
In the case where the previous run did not clean up, the checkout will
fail as it'll leave a stale mount.
Darren Tucker [Tue, 8 Nov 2022 00:33:25 +0000 (11:33 +1100)]
Run vm startup and shutdown from runner temp dir.
Should work even if the github workspace dir is on a stale sshfs mount.
Darren Tucker [Tue, 8 Nov 2022 00:03:31 +0000 (11:03 +1100)]
Add valrind-5 test here too.
Darren Tucker [Mon, 7 Nov 2022 22:21:10 +0000 (09:21 +1100)]
Update checkout and upload actions.
Update actions/checkout and actions/upload-artifact to main branch for
compatibility with node.js v16.
Darren Tucker [Mon, 7 Nov 2022 22:17:04 +0000 (09:17 +1100)]
Split out rekey test since it runs the longest.
dtucker@openbsd.org [Mon, 7 Nov 2022 10:09:28 +0000 (10:09 +0000)]
upstream: The IdentityFile option in ssh_config can also be used to
specify a public key file, as documented in ssh.1 for the -i option. Document
this also for IdentityFile in ssh_config.5, for documentation completeness.
From laalsaas at systemli.org via portable github PR#352, ok jmc@ djm@
OpenBSD-Commit-ID:
2f943be9f96e60ef81a9a4faa25b009999f9883b
dtucker@openbsd.org [Mon, 7 Nov 2022 10:05:38 +0000 (10:05 +0000)]
upstream: Remove some set but otherwise unused variables, spotted
in -portable by clang 16's -Wunused-but-set-variable. ok djm@
OpenBSD-Commit-ID:
3d943ddf2369b38fbf89f5f19728e7dc1daf3982
dtucker@openbsd.org [Mon, 7 Nov 2022 10:02:59 +0000 (10:02 +0000)]
upstream: Check for and disallow MaxStartups values less than or
equal to zero during config parsing, rather than faling later at runtime.
bz#3489, ok djm@
OpenBSD-Commit-ID:
d79c2b7a8601eb9be493629a91245d761154308b
djm@openbsd.org [Mon, 7 Nov 2022 04:04:40 +0000 (04:04 +0000)]
upstream: fix parsing of hex cert expiry time; was checking whether the
start time began with "0x", not the expiry time.
from Ed Maste
OpenBSD-Commit-ID:
6269242c3e1a130b47c92cfca4d661df15f05739
Darren Tucker [Mon, 7 Nov 2022 04:10:59 +0000 (15:10 +1100)]
Fix merge conflict.
Darren Tucker [Mon, 7 Nov 2022 04:04:33 +0000 (15:04 +1100)]
Branch-specific links for master status badges.
Darren Tucker [Mon, 7 Nov 2022 03:46:38 +0000 (14:46 +1100)]
Add CIFuzz status badge.
Darren Tucker [Mon, 7 Nov 2022 03:45:16 +0000 (14:45 +1100)]
Do not run CIFuzz on selfhosted tree.
We already run it on the regular tree, no need to double up.
Darren Tucker [Mon, 7 Nov 2022 03:41:58 +0000 (14:41 +1100)]
Whitespace change to trigger CIFuzz workflow.
Darren Tucker [Mon, 7 Nov 2022 03:34:04 +0000 (14:34 +1100)]
Run cifuzz workflow on the actions as regular CI.
David Korczynski [Tue, 30 Nov 2021 11:45:20 +0000 (11:45 +0000)]
Add CIFuzz integration
dtucker@openbsd.org [Mon, 7 Nov 2022 02:21:22 +0000 (02:21 +0000)]
upstream: Import regenerated moduli.
OpenBSD-Commit-ID:
b0e54ee4d703bd6929bbc624068666a7a42ecb1f
dtucker@openbsd.org [Mon, 7 Nov 2022 01:53:01 +0000 (01:53 +0000)]
upstream: Fix typo. From pablomh via -portable github PR#344.
OpenBSD-Commit-ID:
d056ee2e73691dc3ecdb44a6de68e6b88cd93827
Darren Tucker [Mon, 7 Nov 2022 01:46:58 +0000 (12:46 +1100)]
Link to branch-specific queries for V_9_1 status.
Darren Tucker [Sat, 5 Nov 2022 23:55:59 +0000 (10:55 +1100)]
Use "prohibit-password" in -portable comments.
"without-password" is the deprecated alias for "prohibit-password",
so we should reference the latter. From emaste at freebsd.org.
Darren Tucker [Sat, 5 Nov 2022 23:50:01 +0000 (10:50 +1100)]
Fix tracing disable on FreeBSD.
Some versions of FreeBSD do not support using id 0 to refer to the
current pid for procctl, so pass getpid() explicitly. From
emaste at freebsd.org.
Darren Tucker [Sun, 6 Nov 2022 23:39:01 +0000 (10:39 +1100)]
Fix setres*id checks to work with clang-16.
glibc has the prototypes for setresuid and setresgid behind _GNU_SOURCE,
and clang 16 will error out on implicit function definitions, so add
_GNU_SOURCE and the required headers to the configure checks. From
sam at @gentoo.org via bz#3497.
Sam James [Sun, 6 Nov 2022 04:52:38 +0000 (04:52 +0000)]
configure.ac: Fix -Wstrict-prototypes
Clang 16 now warns on this and it'll be removed in C23, so let's
just be future proof. It also reduces noise when doing general
Clang 16 porting work (which is a big job as it is). github PR#355.
Signed-off-by: Sam James <sam@gentoo.org>
Sam James [Sun, 6 Nov 2022 04:47:35 +0000 (04:47 +0000)]
configure.ac: Add <pty.h> include for openpty
Another Clang 16ish fix (which makes -Wimplicit-function-declaration
an error by default). github PR#355.
See:
2efd71da49b9cfeab7987058cf5919e473ff466b
See:
be197635329feb839865fdc738e34e24afd1fca8
Rochdi Nassah [Fri, 28 Oct 2022 00:26:31 +0000 (01:26 +0100)]
Fix broken zlib link.
Darren Tucker [Fri, 4 Nov 2022 05:59:26 +0000 (16:59 +1100)]
Don't run openbsd-compat tests on Cygwin.
Add "compat-tests" to the default TEST_TARGET so we can override as
necessary. Override TEST_TARGET for Cygwin as the tests don't currently
compile there.
djm@openbsd.org [Thu, 3 Nov 2022 21:59:20 +0000 (21:59 +0000)]
upstream: replace recently-added valid_domain() check for hostnames
going to known_hosts with a more relaxed check for bad characters; previous
commit broke address literals. Reported by/feedback from florian@
OpenBSD-Commit-ID:
10b86dc6a4b206adaa0c11b58b6d5933898d43e0
Darren Tucker [Thu, 3 Nov 2022 12:07:50 +0000 (23:07 +1100)]
Rerun tests on changes to Makefile.in in any dir.
Darren Tucker [Thu, 3 Nov 2022 12:04:08 +0000 (23:04 +1100)]
Link libssh into compat tests.
The cygwin compat code uses xmalloc, so add libssh.a so pick up that.
Darren Tucker [Thu, 3 Nov 2022 10:44:23 +0000 (21:44 +1100)]
Fix compat regress to work with non-GNU make.
Darren Tucker [Thu, 3 Nov 2022 02:41:16 +0000 (13:41 +1100)]
Increase selfhosted job timeout.
The default job timeout of 360 (6h) is not enough to complete the
regress tests for some of the slow VMs depending on the load on the host.
Increase to 600 (10h).
Darren Tucker [Wed, 2 Nov 2022 23:00:43 +0000 (10:00 +1100)]
Only run opensslver tests if built with OpenSSL.
Darren Tucker [Wed, 2 Nov 2022 03:16:04 +0000 (14:16 +1100)]
Add tests for OpenSSL 3.0.7 and LibreSSL 3.6.1.
Darren Tucker [Wed, 2 Nov 2022 21:17:39 +0000 (08:17 +1100)]
Run compat regress tests too.
Darren Tucker [Wed, 2 Nov 2022 21:14:05 +0000 (08:14 +1100)]
Compat tests need libcrypto.
This was moved to CHANNELLIBS during the libs refactor. Spotted by
rapier at psc.edu.
Darren Tucker [Wed, 2 Nov 2022 17:24:39 +0000 (04:24 +1100)]
Include time.h when defining timegm.
Fixes build on some platforms eg recent AIX.
Darren Tucker [Tue, 1 Nov 2022 08:10:30 +0000 (19:10 +1100)]
Always use compat getentropy.
Have it call native getentropy and fall back as required. Should fix
issues of platforms where libc has getentropy but it is not implemented
in the kernel. Based on github PR#354 from simsergey.
Darren Tucker [Tue, 1 Nov 2022 23:51:48 +0000 (10:51 +1100)]
Check for sockaddr_in.sin_len.
If found, set SOCK_HAS_LEN which is used in addr.c. Should fix keyscan
tests on platforms with this (eg old NetBSD).
dtucker@openbsd.org [Sun, 30 Oct 2022 18:42:07 +0000 (18:42 +0000)]
upstream: Use variable for diff options
instead of unconditionally specifying "-rN". This will make life easier
in -portable where not all diff's understand -N.
OpenBSD-Regress-ID:
8b8a407115546be1c6d72d350b1e4f1f960d3cd3
Darren Tucker [Sun, 30 Oct 2022 18:13:02 +0000 (05:13 +1100)]
OpenSSL dev branch is 302 not 320.
While there, also accept 301 which it shat it was previously.
djm@openbsd.org [Fri, 28 Oct 2022 02:47:04 +0000 (02:47 +0000)]
upstream: put sshkey_check_rsa_length() back in sshkey.c to unbreak
OPENSSL=no builds
OpenBSD-Commit-ID:
99eec58abe382ecd14b14043b195ee1babb9cf6e
djm@openbsd.org [Fri, 28 Oct 2022 02:29:34 +0000 (02:29 +0000)]
upstream: allow ssh-keyscan(1) to accept CIDR address ranges, e.g.
ssh-keyscan 192.168.0.0/24
If a CIDR range is passed, then it will be expanded to all possible
addresses in the range including the all-0s and all-1s addresses.
bz#976 feedback/ok markus@
OpenBSD-Commit-ID:
ce6c5211f936ac0053fd4a2ddb415277931e6c4b
Damien Miller [Fri, 28 Oct 2022 01:54:35 +0000 (12:54 +1100)]
fix merge botch
djm@openbsd.org [Fri, 28 Oct 2022 00:44:44 +0000 (00:44 +0000)]
upstream: refactor sshkey_private_deserialize
feedback/ok markus@
OpenBSD-Commit-ID:
f5ca6932fdaf840a5e8250becb38315a29b5fc9f
djm@openbsd.org [Fri, 28 Oct 2022 00:44:17 +0000 (00:44 +0000)]
upstream: refactor sshkey_private_serialize_opt()
feedback/ok markus@
OpenBSD-Commit-ID:
61e0fe989897901294efe7c3b6d670cefaf44cbd
djm@openbsd.org [Fri, 28 Oct 2022 00:43:30 +0000 (00:43 +0000)]
upstream: refactor certify
feedback/ok markus@
OpenBSD-Commit-ID:
35d742992e223eaca3537e6fb3d3002c08eed4f6
djm@openbsd.org [Fri, 28 Oct 2022 00:43:08 +0000 (00:43 +0000)]
upstream: refactor sshkey_sign() and sshkey_verify()
feedback/ok markus@
OpenBSD-Commit-ID:
368e662c128c99d05cc043b1308d2b6c71a4d3cc
djm@openbsd.org [Fri, 28 Oct 2022 00:41:52 +0000 (00:41 +0000)]
upstream: refactor sshkey_from_blob_internal()
feedback/ok markus@
OpenBSD-Commit-ID:
1f46c0cbb8060ee9666a02749594ad6658c8e283
djm@openbsd.org [Fri, 28 Oct 2022 00:41:17 +0000 (00:41 +0000)]
upstream: refactor sshkey_from_private()
feedback/ok markus@
OpenBSD-Commit-ID:
e5dbe7a3545930c50f70ee75c867a1e08b382b53
djm@openbsd.org [Fri, 28 Oct 2022 00:39:29 +0000 (00:39 +0000)]
upstream: factor out key generation
feedback/ok markus@
OpenBSD-Commit-ID:
5b4211bff4de8d9adb84bc72857a8c42c44e7ceb
djm@openbsd.org [Fri, 28 Oct 2022 00:38:58 +0000 (00:38 +0000)]
upstream: refactor and simplify sshkey_read()
feedback/ok markus@
OpenBSD-Commit-ID:
0d93b7a56e31cd06a8bb0d2191d084ce254b0971
djm@openbsd.org [Fri, 28 Oct 2022 00:37:24 +0000 (00:37 +0000)]
upstream: factor out public key serialization
feedback/ok markus@
OpenBSD-Commit-ID:
a3570c4b97290c5662890aea7328d87f55939033
djm@openbsd.org [Fri, 28 Oct 2022 00:36:31 +0000 (00:36 +0000)]
upstream: factor out sshkey_equal_public()
feedback/ok markus@
OpenBSD-Commit-ID:
1368ba114cb37732fe6ec3d89c7e6d27ea6fdc94
djm@openbsd.org [Fri, 28 Oct 2022 00:35:40 +0000 (00:35 +0000)]
upstream: begin big refactor of sshkey
Move keytype data and some of the type-specific code (allocation,
cleanup, etc) out into each key type's implementation. Subsequent
commits will move more, with the goal of having each key-*.c file
owning as much of its keytype's implementation as possible.
lots of feedback + ok markus@
OpenBSD-Commit-ID:
0f2b4334f73914344e9e5b3d33522d41762a57ec
djm@openbsd.org [Mon, 24 Oct 2022 22:43:36 +0000 (22:43 +0000)]
upstream: Be more paranoid with host/domain names coming from the
never write a name with bad characters to a known_hosts file.
reported by David Leadbeater, ok deraadt@
OpenBSD-Commit-ID:
ba9b25fa8b5490b49398471e0c9657b0cbc7a5ad
djm@openbsd.org [Mon, 24 Oct 2022 21:52:50 +0000 (21:52 +0000)]
upstream: regress test for unmatched glob characters; fails before
previous commit but passes now. bz3488; prodded by dtucker@
OpenBSD-Regress-ID:
0cc5cc9ea4a6fd170dc61b9212f15badaafb3bbd
djm@openbsd.org [Mon, 24 Oct 2022 21:51:55 +0000 (21:51 +0000)]
upstream: when scp(1) is using the SFTP protocol for transport (the
default), better match scp/rcp's handling of globs that don't match the
globbed characters but do match literally (e.g. trying to transfer
"foo.[1]").
Previously scp(1) in SFTP mode would not match these pathnames but
legacy scp/rcp mode would.
Reported by Michael Yagliyan in bz3488; ok dtucker@
OpenBSD-Commit-ID:
d8a3773f53015ba811fddba7473769a2fd343e11
jsg@openbsd.org [Thu, 13 Oct 2022 09:09:28 +0000 (09:09 +0000)]
upstream: use correct type with sizeof ok djm@
OpenBSD-Commit-ID:
d6c882c2e8a42ff831a5b3cbc2c961ecb2dd6143
jmc@openbsd.org [Fri, 7 Oct 2022 06:00:58 +0000 (06:00 +0000)]
upstream: ssh-agent.1: - use Nm not Xr for self-ref - while here,
wrap a long line
ssh-agent.c:
- add -O to usage()
OpenBSD-Commit-ID:
855dac4695cef22e96d69c53436496bc408ca389
djm@openbsd.org [Fri, 7 Oct 2022 04:06:26 +0000 (04:06 +0000)]
upstream: document "-O no-restrict-websafe"; spotted by Ross L
Richardson
OpenBSD-Commit-ID:
fe9eaa50237693a14ebe5b5614bf32a02145fe8b
Darren Tucker [Mon, 17 Oct 2022 19:29:16 +0000 (06:29 +1100)]
OpenSSL dev branch now identifies as 3.2.0.
Damien Miller [Sun, 16 Oct 2022 22:41:47 +0000 (09:41 +1100)]
revert
c64b62338b4 and guard POLL* defines instead
c64b62338b4 broke OSX builds, which do have poll.h but lack ppoll(2)
Spotted by dtucker
Damien Miller [Fri, 14 Oct 2022 03:52:22 +0000 (14:52 +1100)]
undef _get{short,long} before redefining
Harmen Stoppels [Thu, 13 Oct 2022 14:08:46 +0000 (16:08 +0200)]
Fix snprintf configure test for clang 15
Clang 15 -Wimplicit-int defaults to an error in C99 mode and above.
A handful of tests have "main(..." and not "int main(..." which caused
the tests to produce incorrect results.
Damien Miller [Mon, 10 Oct 2022 01:32:43 +0000 (12:32 +1100)]
skip bsd-poll.h if poll.h found; ok dtucker
djm@openbsd.org [Thu, 6 Oct 2022 22:42:37 +0000 (22:42 +0000)]
upstream: honour user's umask if it is more restrictive then the ssh
default (022); based on patch from Alex Henrie, ok dtucker@ deraadt@
OpenBSD-Commit-ID:
fe1b9e15fc9a4f49fc338e848ce14d8727abe82d
Darren Tucker [Thu, 6 Oct 2022 16:54:56 +0000 (03:54 +1100)]
Add LibreSSL 3.6.0 to test suite.
While there, bump OpenSSL to latest 1.1.1q release.
Darren Tucker [Thu, 6 Oct 2022 10:18:16 +0000 (21:18 +1100)]
Add 9.1 branch to CI status page.
Darren Tucker [Tue, 4 Oct 2022 12:20:23 +0000 (23:20 +1100)]
Test commits to all branches of portable.
Only test OpenBSD upstream on commits to master since that's what it
tracks.
Damien Miller [Tue, 4 Oct 2022 16:47:26 +0000 (03:47 +1100)]
whitespace at EOL
Damien Miller [Tue, 4 Oct 2022 16:40:01 +0000 (03:40 +1100)]
mention libfido2 autodetection
Damien Miller [Tue, 4 Oct 2022 16:37:36 +0000 (03:37 +1100)]
remove mention of --with-security-key-builtin
it is enabled by default when libfido2 is installed
Damien Miller [Mon, 3 Oct 2022 14:51:42 +0000 (01:51 +1100)]
update .depend
Damien Miller [Mon, 3 Oct 2022 14:45:52 +0000 (01:45 +1100)]
update release notes URL
Damien Miller [Mon, 3 Oct 2022 14:45:41 +0000 (01:45 +1100)]
crank versions in RPM spec files
djm@openbsd.org [Mon, 26 Sep 2022 22:18:40 +0000 (22:18 +0000)]
upstream: openssh-9.1
OpenBSD-Commit-ID:
5a467b2ee81da01a86adf1ad93b62b1728494e56
dtucker@openbsd.org [Wed, 21 Sep 2022 22:26:50 +0000 (22:26 +0000)]
upstream: Fix typo. From AlexanderStohr via github PR#343.
OpenBSD-Commit-ID:
a134c9b4039e48803fc6a87f955b0f4a03181497
djm@openbsd.org [Mon, 19 Sep 2022 21:39:16 +0000 (21:39 +0000)]
upstream: add RequiredRSASize to the list of keywords accepted by
-o; spotted by jmc@
OpenBSD-Commit-ID:
fe871408cf6f9d3699afeda876f8adbac86a035e
Damien Miller [Mon, 19 Sep 2022 10:59:34 +0000 (20:59 +1000)]
no need for glob.h here
it also causes portability problems
Damien Miller [Mon, 19 Sep 2022 10:59:04 +0000 (20:59 +1000)]
avoid Wuninitialized false positive in gcc-12ish
djm@openbsd.org [Mon, 19 Sep 2022 10:46:00 +0000 (10:46 +0000)]
upstream: use users-groups-by-id@openssh.com sftp-server extension
(when available) to fill in user/group names for directory listings.
Implement a client-side cache of see uid/gid=>user/group names. ok markus@
OpenBSD-Commit-ID:
f239aeeadfa925a37ceee36ee8b256b8ccf4466e
djm@openbsd.org [Mon, 19 Sep 2022 10:43:12 +0000 (10:43 +0000)]
upstream: sftp client library support for
users-groups-by-id@openssh.com; ok markus@
OpenBSD-Commit-ID:
ddb2f33a2da6349a9a89a8b5bcb9ca7c999394de
djm@openbsd.org [Mon, 19 Sep 2022 10:41:58 +0000 (10:41 +0000)]
upstream: extend sftp-common.c:extend ls_file() to support supplied
user/group names; ok markus@
OpenBSD-Commit-ID:
c70c70498b1fdcf158531117e405b6245863bfb0
djm@openbsd.org [Mon, 19 Sep 2022 10:40:52 +0000 (10:40 +0000)]
upstream: sftp-server(8): add a "users-groups-by-id@openssh.com"
extension request that allows the client to obtain user/group names that
correspond to a set of uids/gids.
Will be used to make directory listings more useful and consistent
in sftp(1).
ok markus@
OpenBSD-Commit-ID:
7ebabde0bcb95ef949c4840fe89e697e30df47d3