]>
git.ipfire.org Git - thirdparty/openssh-portable.git/log
djm@openbsd.org [Fri, 13 Dec 2019 19:09:37 +0000 (19:09 +0000)]
upstream: allow sshbuf_put_stringb(buf, NULL); ok markus@
OpenBSD-Commit-ID:
91482c1ada9adb283165d48dafbb88ae91c657bd
djm@openbsd.org [Fri, 13 Dec 2019 19:09:10 +0000 (19:09 +0000)]
upstream: use ssh-sk-helper for all security key signing operations
This extracts and refactors the client interface for ssh-sk-helper
from ssh-agent and generalises it for use by the other programs.
This means that most OpenSSH tools no longer need to link against
libfido2 or directly interact with /dev/uhid*
requested by, feedback and ok markus@
OpenBSD-Commit-ID:
1abcd3aea9a7460eccfbf8ca154cdfa62f1dc93f
djm@openbsd.org [Wed, 11 Dec 2019 22:19:47 +0000 (22:19 +0000)]
upstream: add a note about the 'extensions' field in the signed
object
OpenBSD-Commit-ID:
67c01e0565b258e0818c1ccfe1f1aeaf9a0d4c7b
djm@openbsd.org [Tue, 10 Dec 2019 23:37:31 +0000 (23:37 +0000)]
upstream: some more corrections for documentation problems spotted
by Ron Frederick
document certifiate private key format
correct flags type for sk-ssh-
ed25519 @openssh.com keys
OpenBSD-Commit-ID:
fc4e9a1ed7f9f7f9dd83e2e2c59327912e933e74
djm@openbsd.org [Tue, 10 Dec 2019 23:21:56 +0000 (23:21 +0000)]
upstream: loading security keys into ssh-agent used the extension
constraint "sk-provider@openssh.com", not "sk@openssh.com"; spotted by Ron
Frederick
OpenBSD-Commit-ID:
dbfba09edbe023abadd5f59c1492df9073b0e51d
djm@openbsd.org [Tue, 10 Dec 2019 22:43:19 +0000 (22:43 +0000)]
upstream: add security key types to list of keys allowed to act as
CAs; spotted by Ron Frederick
OpenBSD-Commit-ID:
9bb0dfff927b4f7aa70679f983f84c69d45656c3
djm@openbsd.org [Tue, 10 Dec 2019 22:37:20 +0000 (22:37 +0000)]
upstream: when acting as a CA and using a security key as the CA
key, remind the user to touch they key to authorise the signature.
OpenBSD-Commit-ID:
fe58733edd367362f9766b526a8b56827cc439c1
djm@openbsd.org [Tue, 10 Dec 2019 22:36:08 +0000 (22:36 +0000)]
upstream: chop some unnecessary and confusing verbiage from the
security key protocol description; feedback from Ron Frederick
OpenBSD-Commit-ID:
048c9483027fbf9c995e5a51b3ac502989085a42
djm@openbsd.org [Fri, 6 Dec 2019 03:06:08 +0000 (03:06 +0000)]
upstream: fix setting of $SSH_ASKPASS_PROMPT - it shouldn't be set
when asking passphrases, only when confirming the use of a key (i.e. for
ssh-agent keys added with "ssh-add -c keyfile")
OpenBSD-Commit-ID:
6643c82960d9427d5972eb702c917b3b838ecf89
djm@openbsd.org [Fri, 6 Dec 2019 02:55:21 +0000 (02:55 +0000)]
upstream: bring the __func__
OpenBSD-Commit-ID:
71a3a45b0fe1b8f680ff95cf264aa81f7abbff67
jmc@openbsd.org [Sat, 30 Nov 2019 07:07:59 +0000 (07:07 +0000)]
upstream: tweak the Nd lines for a bit of consistency; ok markus
OpenBSD-Commit-ID:
876651bdde06bc1e72dd4bd7ad599f42a6ce5a16
Darren Tucker [Wed, 11 Dec 2019 02:22:06 +0000 (13:22 +1100)]
Check if memmem is declared in system headers.
If the system (or one of the dependencies) implements memmem but does
not define the header, we would not declare it either resulting in
compiler warnings. Check for declaration explicitly. bz#3102.
Darren Tucker [Wed, 11 Dec 2019 02:12:01 +0000 (13:12 +1100)]
Sort depends.
Darren Tucker [Wed, 11 Dec 2019 02:09:34 +0000 (13:09 +1100)]
Sort .depend when rebuilding.
This makes diffs more stable between makedepend implementations.
Darren Tucker [Wed, 11 Dec 2019 02:06:43 +0000 (13:06 +1100)]
Update depend to include sk files.
Darren Tucker [Mon, 9 Dec 2019 09:25:26 +0000 (20:25 +1100)]
Describe how to build libcrypto as PIC.
While there, move the OpenSSL 1.1.0g caveat closer to the other version
information.
Darren Tucker [Mon, 9 Dec 2019 06:23:22 +0000 (17:23 +1100)]
Recommend running LibreSSL or OpenSSL self-tests.
Darren Tucker [Fri, 6 Dec 2019 03:17:26 +0000 (14:17 +1100)]
Wrap ECC specific bits in ifdef.
Fixes tests when built against an OpenSSL configured with no-ec.
Darren Tucker [Fri, 29 Nov 2019 09:21:36 +0000 (20:21 +1100)]
Wrap sha2.h include in ifdef.
Fixes build --without-openssl on at least Fedora.
Damien Miller [Fri, 29 Nov 2019 04:10:21 +0000 (15:10 +1100)]
compile sk-dummy.so with no-PIE version of LDFLAGS
This lets it pick up the -L path to libcrypto for example.
Damien Miller [Fri, 29 Nov 2019 03:48:46 +0000 (14:48 +1100)]
includes.h for sk-dummy.c, dummy
Damien Miller [Fri, 29 Nov 2019 01:32:23 +0000 (12:32 +1100)]
(yet) another x-platform fix for sk-dummy.so
Check for -fPIC support from compiler
Compile libopenbsd-compat -fPIC
Don't mix -fPIE and -fPIC when compiling
Damien Miller [Fri, 29 Nov 2019 00:53:57 +0000 (11:53 +1100)]
needs includes.h for WITH_OPENSSL
Damien Miller [Fri, 29 Nov 2019 00:52:23 +0000 (11:52 +1100)]
another attempt at sk-dummy.so working x-platform
include a fatal() implementation to satisfy libopenbsd-compat
clean up .lo and .so files
.gitignore .lo and .so files
djm@openbsd.org [Fri, 29 Nov 2019 00:13:29 +0000 (00:13 +0000)]
upstream: lots of dependencies go away here with
ed25519 no longer
needing the ssh_digest API.
OpenBSD-Regress-ID:
785847ec78cb580d141e29abce351a436d6b5d49
djm@openbsd.org [Fri, 29 Nov 2019 00:11:21 +0000 (00:11 +0000)]
upstream: perform hashing directly in crypto_hash_sha512() using
libcrypto or libc SHA512 functions rather than calling ssh_digest_memory();
avoids many dependencies on ssh code that complicate standalone use of
ed25519 , as we want to do in sk-dummy.so
OpenBSD-Commit-ID:
5a3c37593d3ba7add037b587cec44aaea088496d
jmc@openbsd.org [Thu, 28 Nov 2019 12:24:31 +0000 (12:24 +0000)]
upstream: improve the text for -A a little; input from naddy and
djm
OpenBSD-Commit-ID:
f9cdfb1d6dbb9887c4bf3bb25f9c7a94294c988d
jmc@openbsd.org [Thu, 28 Nov 2019 12:23:25 +0000 (12:23 +0000)]
upstream: reshuffle the text to read better; input from naddy,
djmc, and dtucker
OpenBSD-Commit-ID:
a0b2aca2b67614dda3d6618ea097bf0610c35013
Damien Miller [Thu, 28 Nov 2019 07:09:07 +0000 (18:09 +1100)]
$< doesn't work as` I thought; explicily list objs
djm@openbsd.org [Thu, 28 Nov 2019 05:20:54 +0000 (05:20 +0000)]
upstream: tweak wording
OpenBSD-Commit-ID:
bd002ca1599b71331faca735ff5f6de29e32222e
Damien Miller [Thu, 28 Nov 2019 02:12:30 +0000 (13:12 +1100)]
missing .SUFFIXES line makes make sad
Damien Miller [Wed, 27 Nov 2019 22:53:42 +0000 (09:53 +1100)]
(hopefully) fix out of tree builds of sk-dummy.so
djm@openbsd.org [Wed, 27 Nov 2019 22:32:11 +0000 (22:32 +0000)]
upstream: remove stray semicolon after closing brace of function;
from Michael Forney
OpenBSD-Commit-ID:
fda95acb799bb160d15e205ee126117cf33da3a7
dtucker@openbsd.org [Wed, 27 Nov 2019 05:38:43 +0000 (05:38 +0000)]
upstream: Revert previous commit. The channels code still uses int
in many places for channel ids so the INT_MAX check still makes sense.
OpenBSD-Commit-ID:
532e4b644791b826956c3c61d6ac6da39bac84bf
Damien Miller [Wed, 27 Nov 2019 05:03:12 +0000 (16:03 +1100)]
wire sk-dummy.so into test suite
djm@openbsd.org [Wed, 27 Nov 2019 05:00:17 +0000 (05:00 +0000)]
upstream: use error()+_exit() instead of fatal() to avoid running
cleanup handlers in child process; spotted via weird regress failures in
portable
OpenBSD-Commit-ID:
6902a9bb3987c7d347774444f7979b8a9ba7f412
dtucker@openbsd.org [Wed, 27 Nov 2019 03:34:04 +0000 (03:34 +0000)]
upstream: Make channel_id u_int32_t and remove unnecessary check
and cast that were left over from the type conversion. Noted by
t-hashida@amiya.co.jp in bz#3098, ok markus@ djm@
OpenBSD-Commit-ID:
3ad105b6a905284e780b1fd7ff118e1c346e90b5
djm@openbsd.org [Tue, 26 Nov 2019 23:43:10 +0000 (23:43 +0000)]
upstream: test FIDO2/U2F key types; ok markus@
OpenBSD-Regress-ID:
367e06d5a260407619b4b113ea0bd7004a435474
djm@openbsd.org [Tue, 26 Nov 2019 23:41:23 +0000 (23:41 +0000)]
upstream: add dummy security key middleware based on work by
markus@
This will allow us to test U2F/FIDO2 support in OpenSSH without
requiring real hardware.
ok markus@
OpenBSD-Regress-ID:
88b309464b8850c320cf7513f26d97ee1fdf9aae
jmc@openbsd.org [Tue, 26 Nov 2019 22:42:26 +0000 (22:42 +0000)]
upstream: tweak previous;
OpenBSD-Commit-ID:
a4c097364c75da320f1b291568db830fb1ee4883
djm@openbsd.org [Tue, 26 Nov 2019 03:04:27 +0000 (03:04 +0000)]
upstream: more debugging; behind DEBUG_SK
OpenBSD-Commit-ID:
a978896227118557505999ddefc1f4c839818b60
Damien Miller [Mon, 25 Nov 2019 10:47:49 +0000 (21:47 +1100)]
unbreak fuzzers for recent security key changes
djm@openbsd.org [Mon, 25 Nov 2019 10:32:35 +0000 (10:32 +0000)]
upstream: unbreak tests for recent security key changes
OpenBSD-Regress-ID:
2cdf2fcae9962ca4d711338f3ceec3c1391bdf95
djm@openbsd.org [Mon, 25 Nov 2019 06:53:04 +0000 (06:53 +0000)]
upstream: unbreak after security key support landed
OpenBSD-Regress-ID:
3ab578b0dbeb2aa6d9969b54a9c1bad329c0dcba
tb@openbsd.org [Thu, 21 Nov 2019 05:18:47 +0000 (05:18 +0000)]
upstream: Remove workaround for broken 'openssl rsa -text' output
that was fixed in libcrypto/rsa/rsa_ameth.c r1.24.
ok dtucker inoguchi
OpenBSD-Regress-ID:
c260edfac177daa8fcce90141587cf04a95c4f5f
djm@openbsd.org [Mon, 25 Nov 2019 10:23:36 +0000 (10:23 +0000)]
upstream: redundant test
OpenBSD-Commit-ID:
38fa7806c528a590d91ae560e67bd8b246c2d7a3
djm@openbsd.org [Mon, 25 Nov 2019 00:57:51 +0000 (00:57 +0000)]
upstream: document the "no-touch-required" certificate extension;
ok markus, feedback deraadt
OpenBSD-Commit-ID:
47640122b13f825e9c404ea99803b2372246579d
djm@openbsd.org [Mon, 25 Nov 2019 00:57:27 +0000 (00:57 +0000)]
upstream: Print a key touch reminder when generating a security
key. Most keys require a touch to authorize the operation.
OpenBSD-Commit-ID:
7fe8b23edbf33e1bb81741b9f25e9a63be5f6b68
djm@openbsd.org [Mon, 25 Nov 2019 00:55:58 +0000 (00:55 +0000)]
upstream: allow "ssh-keygen -x no-touch-required" when generating a
security key keypair to request one that does not require a touch for each
authentication attempt. The default remains to require touch.
feedback deraadt; ok markus@
OpenBSD-Commit-ID:
887e7084b2e89c0c62d1598ac378aad8e434bcbd
djm@openbsd.org [Mon, 25 Nov 2019 00:54:23 +0000 (00:54 +0000)]
upstream: add a "no-touch-required" option for authorized_keys and
a similar extension for certificates. This option disables the default
requirement that security key signatures attest that the user touched their
key to authorize them.
feedback deraadt, ok markus
OpenBSD-Commit-ID:
f1fb56151ba68d55d554d0f6d3d4dba0cf1a452e
djm@openbsd.org [Mon, 25 Nov 2019 00:52:46 +0000 (00:52 +0000)]
upstream: Add a sshd_config PubkeyAuthOptions directive
This directive has a single valid option "no-touch-required" that
causes sshd to skip checking whether user presence was tested before
a security key signature was made (usually by the user touching the
key).
ok markus@
OpenBSD-Commit-ID:
46e434a49802d4ed82bc0aa38cb985c198c407de
djm@openbsd.org [Mon, 25 Nov 2019 00:51:37 +0000 (00:51 +0000)]
upstream: Add new structure for signature options
This is populated during signature verification with additional fields
that are present in and covered by the signature. At the moment, it is
only used to record security key-specific options, especially the flags
field.
with and ok markus@
OpenBSD-Commit-ID:
338a1f0e04904008836130bedb9ece4faafd4e49
djm@openbsd.org [Mon, 25 Nov 2019 00:38:17 +0000 (00:38 +0000)]
upstream: memleak in error path
OpenBSD-Commit-ID:
93488431bf02dde85a854429362695d2d43d9112
dtucker@openbsd.org [Fri, 22 Nov 2019 06:50:30 +0000 (06:50 +0000)]
upstream: Wait for FD to be readable or writeable during a nonblocking
connect, not just readable. Prevents a timeout when the server doesn't
immediately send a banner (eg multiplexers like sslh) but is also slightly
quicker for other connections since, unlike ssh1, ssh2 doesn't specify
that the client should parse the server banner before sending its own.
Patch from mnissler@chromium.org, ok djm@
OpenBSD-Commit-ID:
aba9cd8480d1d9dd31d0ca0422ea155c26c5df1d
Darren Tucker [Wed, 20 Nov 2019 05:34:11 +0000 (16:34 +1100)]
Include openssl compat header.
Fixes warning for ECDSA_SIG_set0 on OpenSSL versions prior to 1.1.
djm@openbsd.org [Tue, 19 Nov 2019 22:23:19 +0000 (22:23 +0000)]
upstream: adjust on-wire signature encoding for ecdsa-sk keys to
better match
ec25519 -sk keys. Discussed with markus@ and Sebastian Kinne
NB. if you are depending on security keys (already?) then make sure you
update both your clients and servers.
OpenBSD-Commit-ID:
53d88d8211f0dd02a7954d3af72017b1a79c0679
djm@openbsd.org [Tue, 19 Nov 2019 22:21:15 +0000 (22:21 +0000)]
upstream: a little more information from the monitor when signature
verification fails.
OpenBSD-Commit-ID:
e6a30071e0518cac512f9e10be3dc3500e2003f3
jmc@openbsd.org [Tue, 19 Nov 2019 16:02:32 +0000 (16:02 +0000)]
upstream: revert previous: naddy pointed out what's meant to
happen. rethink needed...
OpenBSD-Commit-ID:
fb0fede8123ea7f725fd65e00d49241c40bd3421
jmc@openbsd.org [Tue, 19 Nov 2019 14:54:47 +0000 (14:54 +0000)]
upstream: -c and -s do not make sense with -k; reshuffle -k into
the main synopsis/usage; ok djm
OpenBSD-Commit-ID:
f881ba253da015398ae8758d973e3390754869bc
naddy@openbsd.org [Mon, 18 Nov 2019 23:17:48 +0000 (23:17 +0000)]
upstream: document '$' environment variable expansion for
SecurityKeyProvider; ok djm@
OpenBSD-Commit-ID:
76db507ebd336a573e1cd4146cc40019332c5799
naddy@openbsd.org [Mon, 18 Nov 2019 23:16:49 +0000 (23:16 +0000)]
upstream: more missing mentions of
ed25519 -sk; ok djm@
OpenBSD-Commit-ID:
f242e53366f61697dffd53af881bc5daf78230ff
naddy@openbsd.org [Mon, 18 Nov 2019 16:10:05 +0000 (16:10 +0000)]
upstream: additional missing stdarg.h includes when built without
WITH_OPENSSL; ok djm@
OpenBSD-Commit-ID:
881f9a2c4e2239849cee8bbf4faec9bab128f55b
naddy@openbsd.org [Mon, 18 Nov 2019 16:08:57 +0000 (16:08 +0000)]
upstream: add the missing WITH_OPENSSL ifdefs after the
ED25519 -SK
addition; ok djm@
OpenBSD-Commit-ID:
a9545e1c273e506cf70e328cbb9d0129b6d62474
Damien Miller [Mon, 18 Nov 2019 21:52:24 +0000 (08:52 +1100)]
remove all EC algs from proposals, no just sk ones
ok dtucker@
Damien Miller [Mon, 18 Nov 2019 11:22:04 +0000 (22:22 +1100)]
filter PUBKEY_DEFAULT_PK_ALG for ECC algorithms
Remove ECC algorithms from the PUBKEY_DEFAULT_PK_ALG list when
compiling without ECC support in libcrypto.
dtucker@openbsd.org [Mon, 18 Nov 2019 09:15:17 +0000 (09:15 +0000)]
upstream: LibreSSL change the format for openssl rsa -text output from
"publicExponent" to "Exponent" so accept either. with djm.
OpenBSD-Regress-ID:
b7e6c4bf700029a31c98be14600d4472fe0467e6
djm@openbsd.org [Mon, 18 Nov 2019 06:58:00 +0000 (06:58 +0000)]
upstream: fix a bug that prevented serialisation of
ed25519 -sk keys
OpenBSD-Commit-ID:
066682b79333159cac04fcbe03ebd9c8dcc152a9
djm@openbsd.org [Mon, 18 Nov 2019 06:39:36 +0000 (06:39 +0000)]
upstream: Fix incorrect error message when key certification fails
OpenBSD-Commit-ID:
7771bd77ee73f7116df37c734c41192943a73cee
djm@openbsd.org [Mon, 18 Nov 2019 06:39:02 +0000 (06:39 +0000)]
upstream: fix bug that prevented certification of
ed25519 -sk keys
OpenBSD-Commit-ID:
64c8cc6f5de2cdd0ee3a81c3a9dee8d862645996
djm@openbsd.org [Mon, 18 Nov 2019 06:24:17 +0000 (06:24 +0000)]
upstream: allow *-sk key types to be turned into certificates
OpenBSD-Commit-ID:
cd365ee343934862286d0b011aa77fa739d2a945
djm@openbsd.org [Mon, 18 Nov 2019 04:55:02 +0000 (04:55 +0000)]
upstream: mention
ed25519 -sk key/cert types here too; prompted by
jmc@
OpenBSD-Commit-ID:
e281977e4a4f121f3470517cbd5e483eee37b818
djm@openbsd.org [Mon, 18 Nov 2019 04:50:45 +0000 (04:50 +0000)]
upstream: mention
ed25519 -sk in places where it is accepted;
prompted by jmc@
OpenBSD-Commit-ID:
076d386739ebe7336c2137e583bc7a5c9538a442
djm@openbsd.org [Mon, 18 Nov 2019 04:34:47 +0000 (04:34 +0000)]
upstream: document
ed25519 -sk pubkey, private key and certificate
formats
OpenBSD-Commit-ID:
795a7c1c80315412e701bef90e31e376ea2f3c88
djm@openbsd.org [Mon, 18 Nov 2019 04:29:50 +0000 (04:29 +0000)]
upstream: correct order or ecdsa-sk private key fields
OpenBSD-Commit-ID:
4d4a0c13226a79f0080ce6cbe74f73b03ed8092e
djm@openbsd.org [Mon, 18 Nov 2019 04:16:53 +0000 (04:16 +0000)]
upstream: correct description of fields in pub/private keys (was
missing curve name); spotted by Sebastian Kinne
OpenBSD-Commit-ID:
2a11340dc7ed16200342d384fb45ecd4fcce26e7
Damien Miller [Mon, 18 Nov 2019 04:05:04 +0000 (15:05 +1100)]
Teach the GTK2/3 ssh-askpass the new prompt hints
ssh/ssh-agent now sets a hint environment variable $SSH_ASKPASS_PROMPT
when running the askpass program. This is intended to allow the
askpass to vary its UI across the three cases it supports: asking for
a passphrase, confirming the use of a key and (recently) reminding
a user to touch their security key.
This adapts the gnome-ssh-askpass[23] to use these hints. Specifically,
for SSH_ASKPASS_PROMPT=confirm it will skip the text input box and show
only "yes"/"no" buttons. For SSH_ASKPASS_PROMPT=none (used to remind
users to tap their security key), it shows only a "close" button.
Help wanted: adapt the other askpass programs in active use, including
x11-ssh-askpass, lxqt-openssh-askpass, etc.
Darren Tucker [Mon, 18 Nov 2019 03:15:26 +0000 (14:15 +1100)]
Move ifdef OPENSSL_HAS_ECC.
Found by -Wimplicit-fallthrough: one ECC case was not inside the ifdef.
ok djm@
Darren Tucker [Mon, 18 Nov 2019 03:14:18 +0000 (14:14 +1100)]
Enable -Wimplicit-fallthrough if supported
Suggested by djm.
djm@openbsd.org [Mon, 18 Nov 2019 01:59:48 +0000 (01:59 +0000)]
upstream: missing break in getopt switch; spotted by Sebastian Kinne
OpenBSD-Commit-ID:
f002dbf14dba5586e8407e90f0141148ade8e8fc
djm@openbsd.org [Sat, 16 Nov 2019 23:17:20 +0000 (23:17 +0000)]
upstream: tweak debug message
OpenBSD-Commit-ID:
2bf336d3be0b7e3dd97920d7e7471146a281d2b9
djm@openbsd.org [Sat, 16 Nov 2019 22:42:30 +0000 (22:42 +0000)]
upstream: a little debug() in the security key interface
OpenBSD-Commit-ID:
4c70300609a5c8b19707207bb7ad4109e963b0e8
djm@openbsd.org [Sat, 16 Nov 2019 22:36:48 +0000 (22:36 +0000)]
upstream: always use ssh-sk-helper, even for the internal USB HID
support. This avoid the need for a wpath pledge in ssh-agent.
reported by jmc@
OpenBSD-Commit-ID:
19f799c4d020b870741d221335dbfa5e76691c23
markus@openbsd.org [Fri, 15 Nov 2019 15:41:01 +0000 (15:41 +0000)]
upstream: fix typos in sk_enroll
OpenBSD-Commit-ID:
faa9bf779e008b3e64e2eb1344d9b7d83b3c4487
jmc@openbsd.org [Fri, 15 Nov 2019 11:16:28 +0000 (11:16 +0000)]
upstream: double word;
OpenBSD-Commit-ID:
43d09bafa4ea9002078cb30ca9adc3dcc0b9c2b9
djm@openbsd.org [Fri, 15 Nov 2019 06:00:20 +0000 (06:00 +0000)]
upstream: remove most uses of BN_CTX
We weren't following the rules re BN_CTX_start/BN_CTX_end and the places
we were using it didn't benefit from its use anyway. ok dtucker@
OpenBSD-Commit-ID:
ea9ba6c0d2e6f6adfe00b309a8f41842fe12fc7a
Darren Tucker [Fri, 15 Nov 2019 07:56:54 +0000 (18:56 +1100)]
Add wrappers for other ultrix headers.
Wrappers protect against multiple inclusions for headers that don't do
it themselves.
Darren Tucker [Fri, 15 Nov 2019 07:55:13 +0000 (18:55 +1100)]
Add SSIZE_MAX when we define ssize_t.
Darren Tucker [Fri, 15 Nov 2019 06:13:19 +0000 (17:13 +1100)]
Remove ultrix realpath hack.
djm@openbsd.org [Fri, 15 Nov 2019 05:37:27 +0000 (05:37 +0000)]
upstream: unshield security key privkey before attempting signature
in agent. spotted by dtucker@
OpenBSD-Commit-ID:
fb67d451665385b8a0a55371231c50aac67b91d2
deraadt@openbsd.org [Fri, 15 Nov 2019 05:26:56 +0000 (05:26 +0000)]
upstream: rewrite c99-ism
OpenBSD-Commit-ID:
d0c70cca29cfa7e6d9f7ec1d6d5dabea112499b3
deraadt@openbsd.org [Fri, 15 Nov 2019 05:25:52 +0000 (05:25 +0000)]
upstream: only clang understands those new -W options
OpenBSD-Commit-ID:
d9b910e412d139141b072a905e66714870c38ac0
Damien Miller [Fri, 15 Nov 2019 05:08:00 +0000 (16:08 +1100)]
configure flag to built-in security key support
Require --with-security-key-builtin before enabling the built-in
security key support (and consequent dependency on libfido2).
Damien Miller [Fri, 15 Nov 2019 05:06:30 +0000 (16:06 +1100)]
upstream commit
revision 1.48
date: 2019/02/04 16:45:40; author: millert; state: Exp; lines: +16 -17; commitid: cpNtVC7erojNyctw;
Make gl_pathc, gl_matchc and gl_offs size_t in glob_t to match POSIX.
This requires a libc major version bump. OK deraadt@
Damien Miller [Fri, 15 Nov 2019 05:05:07 +0000 (16:05 +1100)]
upstream commit
revision 1.47
date: 2017/05/08 14:53:27; author: millert; state: Exp; lines: +34 -21; commitid: sYfxfyUHAfarP8sE;
Fix exponential CPU use with repeated '*' operators by changing '*'
handling to be interative instead of recursive.
Fix by Yves Orton, ported to OpenBSD glob.c by Ray Lai. OK tb@
Damien Miller [Fri, 15 Nov 2019 05:04:28 +0000 (16:04 +1100)]
upstream commit
revision 1.46
date: 2015/12/28 22:08:18; author: mmcc; state: Exp; lines: +5 -9; commitid: 0uXuF2O13NH9q2e1;
Remove NULL-checks before free() and a few related dead assignments.
ok and valuable input from millert@
Damien Miller [Fri, 15 Nov 2019 05:02:43 +0000 (16:02 +1100)]
upstream commit
revision 1.44
date: 2015/09/14 16:09:13; author: tedu; state: Exp; lines: +3 -5; commitid: iWfSX2BIn0sLw62l;
remove null check before free. from Michael McConville
ok semarie
Damien Miller [Fri, 15 Nov 2019 05:02:27 +0000 (16:02 +1100)]
upstream commit
revision 1.43
date: 2015/06/13 16:57:04; author: deraadt; state: Exp; lines: +4 -4; commitid: zOUKuqWBdOPOz1SZ;
in glob() initialize the glob_t before the first failure check.
from j@pureftpd.org
ok millert stsp
Damien Miller [Fri, 15 Nov 2019 05:01:20 +0000 (16:01 +1100)]
upstream commit
revision 1.42
date: 2015/02/05 12:59:57; author: millert; state: Exp; lines: +2 -1; commitid: DTQbfd4poqBW8iSJ;
Include stdint.h, not limits.h to get SIZE_MAX. OK guenther@
Damien Miller [Fri, 15 Nov 2019 05:00:07 +0000 (16:00 +1100)]
upstream commit
revision 1.41
date: 2014/10/08 05:35:27; author: deraadt; state: Exp; lines: +3 -3; commitid: JwTGarRLHQKDgPh2;
obvious realloc -> reallocarray conversion
djm@openbsd.org [Fri, 15 Nov 2019 04:12:32 +0000 (04:12 +0000)]
upstream: don't consult dlopen whitelist for internal security key
provider; spotted by dtucker@
OpenBSD-Commit-ID:
bfe5fbd17e4ff95dd85b9212181652b54444192e