]> git.ipfire.org Git - thirdparty/openssh-portable.git/log
thirdparty/openssh-portable.git
5 years agoAdd wrappers for other ultrix headers.
Darren Tucker [Fri, 15 Nov 2019 07:56:54 +0000 (18:56 +1100)] 
Add wrappers for other ultrix headers.

Wrappers protect against multiple inclusions for headers that don't do
it themselves.

5 years agoAdd SSIZE_MAX when we define ssize_t.
Darren Tucker [Fri, 15 Nov 2019 07:55:13 +0000 (18:55 +1100)] 
Add SSIZE_MAX when we define ssize_t.

5 years agoRemove ultrix realpath hack.
Darren Tucker [Fri, 15 Nov 2019 06:13:19 +0000 (17:13 +1100)] 
Remove ultrix realpath hack.

5 years agoupstream: unshield security key privkey before attempting signature
djm@openbsd.org [Fri, 15 Nov 2019 05:37:27 +0000 (05:37 +0000)] 
upstream: unshield security key privkey before attempting signature

in agent. spotted by dtucker@

OpenBSD-Commit-ID: fb67d451665385b8a0a55371231c50aac67b91d2

5 years agoupstream: rewrite c99-ism
deraadt@openbsd.org [Fri, 15 Nov 2019 05:26:56 +0000 (05:26 +0000)] 
upstream: rewrite c99-ism

OpenBSD-Commit-ID: d0c70cca29cfa7e6d9f7ec1d6d5dabea112499b3

5 years agoupstream: only clang understands those new -W options
deraadt@openbsd.org [Fri, 15 Nov 2019 05:25:52 +0000 (05:25 +0000)] 
upstream: only clang understands those new -W options

OpenBSD-Commit-ID: d9b910e412d139141b072a905e66714870c38ac0

5 years agoconfigure flag to built-in security key support
Damien Miller [Fri, 15 Nov 2019 05:08:00 +0000 (16:08 +1100)] 
configure flag to built-in security key support

Require --with-security-key-builtin before enabling the built-in
security key support (and consequent dependency on libfido2).

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 05:06:30 +0000 (16:06 +1100)] 
upstream commit

revision 1.48
date: 2019/02/04 16:45:40;  author: millert;  state: Exp;  lines: +16 -17;  commitid: cpNtVC7erojNyctw;
Make gl_pathc, gl_matchc and gl_offs size_t in glob_t to match POSIX.
This requires a libc major version bump.  OK deraadt@

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 05:05:07 +0000 (16:05 +1100)] 
upstream commit

revision 1.47
date: 2017/05/08 14:53:27;  author: millert;  state: Exp;  lines: +34 -21;  commitid: sYfxfyUHAfarP8sE;
Fix exponential CPU use with repeated '*' operators by changing '*'
handling to be interative instead of recursive.
Fix by Yves Orton, ported to OpenBSD glob.c by Ray Lai.  OK tb@

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 05:04:28 +0000 (16:04 +1100)] 
upstream commit

revision 1.46
date: 2015/12/28 22:08:18;  author: mmcc;  state: Exp;  lines: +5 -9;  commitid: 0uXuF2O13NH9q2e1;
Remove NULL-checks before free() and a few related dead assignments.

ok and valuable input from millert@

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 05:02:43 +0000 (16:02 +1100)] 
upstream commit

revision 1.44
date: 2015/09/14 16:09:13;  author: tedu;  state: Exp;  lines: +3 -5;  commitid: iWfSX2BIn0sLw62l;
remove null check before free. from Michael McConville
ok semarie

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 05:02:27 +0000 (16:02 +1100)] 
upstream commit

revision 1.43
date: 2015/06/13 16:57:04;  author: deraadt;  state: Exp;  lines: +4 -4;  commitid: zOUKuqWBdOPOz1SZ;
in glob() initialize the glob_t before the first failure check.
from j@pureftpd.org
ok millert stsp

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 05:01:20 +0000 (16:01 +1100)] 
upstream commit

revision 1.42
date: 2015/02/05 12:59:57;  author: millert;  state: Exp;  lines: +2 -1;  commitid: DTQbfd4poqBW8iSJ;
Include stdint.h, not limits.h to get SIZE_MAX.  OK guenther@

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 05:00:07 +0000 (16:00 +1100)] 
upstream commit

revision 1.41
date: 2014/10/08 05:35:27;  author: deraadt;  state: Exp;  lines: +3 -3;  commitid: JwTGarRLHQKDgPh2;
obvious realloc -> reallocarray conversion

5 years agoupstream: don't consult dlopen whitelist for internal security key
djm@openbsd.org [Fri, 15 Nov 2019 04:12:32 +0000 (04:12 +0000)] 
upstream: don't consult dlopen whitelist for internal security key

provider; spotted by dtucker@

OpenBSD-Commit-ID: bfe5fbd17e4ff95dd85b9212181652b54444192e

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 04:08:28 +0000 (15:08 +1100)] 
upstream commit

revision 1.40
date: 2013/09/30 12:02:34;  author: millert;  state: Exp;  lines: +14 -15;
Use PATH_MAX, NAME_MAX and LOGIN_NAME_MAX not MAXPATHNAMELEN,
MAXNAMLEN or MAXLOGNAME where possible.  OK deraadt@

5 years agoupstream commit
Damien Miller [Fri, 15 Nov 2019 04:07:30 +0000 (15:07 +1100)] 
upstream commit

revision 1.39
date: 2012/01/20 07:09:42;  author: tedu;  state: Exp;  lines: +4 -4;
the glob stat limit is way too low.  bump to 2048.
while here, failed stats should count against the limit too.
ok deraadt sthen stsp

5 years agoupstream: U2F tokens may return FIDO_ERR_USER_PRESENCE_REQUIRED when
djm@openbsd.org [Fri, 15 Nov 2019 03:41:57 +0000 (03:41 +0000)] 
upstream: U2F tokens may return FIDO_ERR_USER_PRESENCE_REQUIRED when

probed to see if they own a key handle. Handle this case so the find_device()
look can work for them. Reported by Michael Forney

OpenBSD-Commit-ID: 2ccd5b30a6ddfe4dba228b7159bf168601bd9166

5 years agoAdd libfido2 to INSTALL.
Darren Tucker [Fri, 15 Nov 2019 03:01:00 +0000 (14:01 +1100)] 
Add libfido2 to INSTALL.

5 years agolibcrypto is now optional.
Darren Tucker [Fri, 15 Nov 2019 02:42:15 +0000 (13:42 +1100)] 
libcrypto is now optional.

5 years agoupstream: show the "please touch your security key" notifier when
djm@openbsd.org [Fri, 15 Nov 2019 02:38:07 +0000 (02:38 +0000)] 
upstream: show the "please touch your security key" notifier when

using the (default) build-in security key support.

OpenBSD-Commit-ID: 4707643aaa7124501d14e92d1364b20f312a6428

5 years agoupstream: close the "touch your security key" notifier on the error
djm@openbsd.org [Fri, 15 Nov 2019 02:37:24 +0000 (02:37 +0000)] 
upstream: close the "touch your security key" notifier on the error

path too

OpenBSD-Commit-ID: c7628bf80505c1aefbb1de7abc8bb5ee51826829

5 years agoupstream: correct function name in debug message
djm@openbsd.org [Fri, 15 Nov 2019 02:20:06 +0000 (02:20 +0000)] 
upstream: correct function name in debug message

OpenBSD-Commit-ID: 2482c99d2ce448f39282493050f8a01e3ffc39ab

5 years agoupstream: follow existing askpass logic for security key notifier:
djm@openbsd.org [Fri, 15 Nov 2019 00:32:40 +0000 (00:32 +0000)] 
upstream: follow existing askpass logic for security key notifier:

fall back to _PATH_SSH_ASKPASS_DEFAULT if no $SSH_ASKPASS environment
variable is set.

OpenBSD-Commit-ID: cda753726b13fb797bf7a9f7a0b3022d9ade4520

5 years agoupstream: remove debugging goop that snuck in to last commit
djm@openbsd.org [Thu, 14 Nov 2019 21:56:52 +0000 (21:56 +0000)] 
upstream: remove debugging goop that snuck in to last commit

OpenBSD-Commit-ID: 8ea4455a2d9364a0a04f9e4a2cbfa4c9fcefe77e

5 years agodon't fatal if libfido2 not found
Damien Miller [Fri, 15 Nov 2019 00:21:26 +0000 (11:21 +1100)] 
don't fatal if libfido2 not found

spotted by dtucker@

5 years agocorrect object dependency
Damien Miller [Fri, 15 Nov 2019 00:17:12 +0000 (11:17 +1100)] 
correct object dependency

5 years agoupstream: directly support U2F/FIDO2 security keys in OpenSSH by
djm@openbsd.org [Thu, 14 Nov 2019 21:27:29 +0000 (21:27 +0000)] 
upstream: directly support U2F/FIDO2 security keys in OpenSSH by

linking against the (previously external) USB HID middleware. The dlopen()
capability still exists for alternate middlewares, e.g. for Bluetooth, NFC
and test/debugging.

OpenBSD-Commit-ID: 14446cf170ac0351f0d4792ba0bca53024930069

5 years agoupstream: in order to be able to figure out the number of
markus@openbsd.org [Wed, 13 Nov 2019 22:00:21 +0000 (22:00 +0000)] 
upstream: in order to be able to figure out the number of

signatures left on a shielded key, we need to transfer the number of
signatures left from the private to the public key. ok djm@

OpenBSD-Commit-ID: 8a5d0d260aeace47d372695fdae383ce9b962574

5 years agoupstream: fix check for sig_s; noted by qsa at qualys.com
markus@openbsd.org [Wed, 13 Nov 2019 20:25:45 +0000 (20:25 +0000)] 
upstream: fix check for sig_s; noted by qsa at qualys.com

OpenBSD-Commit-ID: 34198084e4afb424a859f52c04bb2c9668a52867

5 years agoupstream: When clients get denied by MaxStartups, send a
dtucker@openbsd.org [Wed, 13 Nov 2019 11:25:11 +0000 (11:25 +0000)] 
upstream: When clients get denied by MaxStartups, send a

noification prior to the SSH2 protocol banner according to RFC4253 section
4.2.  ok djm@ deraadt@ markus@

OpenBSD-Commit-ID: e5dabcb722d54dea18eafb336d50b733af4f9c63

5 years agoupstream: fix shield/unshield for xmss keys: - in ssh-agent we need
markus@openbsd.org [Wed, 13 Nov 2019 07:53:10 +0000 (07:53 +0000)] 
upstream: fix shield/unshield for xmss keys: - in ssh-agent we need

to delay the call to shield   until we have received key specific options. -
when serializing xmss keys for shield we need to deal with   all optional
components (e.g. state might not be loaded). ok djm@

OpenBSD-Commit-ID: cc2db82524b209468eb176d6b4d6b9486422f41f

5 years agoupstream: remove size_t gl_pathc < 0 test, it is invalid. the
deraadt@openbsd.org [Wed, 13 Nov 2019 05:42:26 +0000 (05:42 +0000)] 
upstream: remove size_t gl_pathc < 0 test, it is invalid. the

return value from glob() is sufficient. discussed with djm

OpenBSD-Commit-ID: c91203322db9caaf7efaf5ae90c794a91070be3c

5 years agoupstream: stdarg.h required more broadly; ok djm
deraadt@openbsd.org [Wed, 13 Nov 2019 04:47:52 +0000 (04:47 +0000)] 
upstream: stdarg.h required more broadly; ok djm

OpenBSD-Commit-ID: b5b15674cde1b54d6dbbae8faf30d47e6e5d6513

5 years agoPut sshsk_sign call inside ifdef ENABLE_SK.
Darren Tucker [Thu, 14 Nov 2019 05:08:17 +0000 (16:08 +1100)] 
Put sshsk_sign call inside ifdef ENABLE_SK.

Fixes build against OpenSSL configured without ECC.

5 years agoRemove duplicate __NR_clock_nanosleep
Darren Tucker [Wed, 13 Nov 2019 12:27:31 +0000 (23:27 +1100)] 
Remove duplicate __NR_clock_nanosleep

5 years agoseccomp: Allow clock_nanosleep() in sandbox.
Darren Tucker [Wed, 13 Nov 2019 12:19:35 +0000 (23:19 +1100)] 
seccomp: Allow clock_nanosleep() in sandbox.

seccomp: Allow clock_nanosleep() to make OpenSSH working with latest
glibc.  Patch from Jakub Jelen <jjelen@redhat.com> via bz #3093.

5 years agoInclude stdarg.h for va_list in xmalloc.h.
Darren Tucker [Wed, 13 Nov 2019 00:56:56 +0000 (11:56 +1100)] 
Include stdarg.h for va_list in xmalloc.h.

5 years agoPut headers inside ifdef _AIX.
Darren Tucker [Wed, 13 Nov 2019 00:19:26 +0000 (11:19 +1100)] 
Put headers inside ifdef _AIX.

Prevents compile errors due to missing definitions (eg va_list) on
non-AIX platforms.

5 years agoFix comment in match_usergroup_pattern_list.
Darren Tucker [Tue, 12 Nov 2019 23:41:41 +0000 (10:41 +1100)] 
Fix comment in match_usergroup_pattern_list.

Spotted by balu.gajjala@gmail.com via bz#3092.

5 years agoupstream: allow an empty attestation certificate returned by a
djm@openbsd.org [Tue, 12 Nov 2019 22:38:19 +0000 (22:38 +0000)] 
upstream: allow an empty attestation certificate returned by a

security key enrollment - these are possible for tokens that only offer self-
attestation. This also needs support from the middleware.

ok markus@

OpenBSD-Commit-ID: 135eeeb937088ef6830a25ca0bbe678dfd2c57cc

5 years agoupstream: security keys typically need to be tapped/touched in
djm@openbsd.org [Tue, 12 Nov 2019 22:36:44 +0000 (22:36 +0000)] 
upstream: security keys typically need to be tapped/touched in

order to perform a signature operation. Notify the user when this is expected
via the TTY (if available) or $SSH_ASKPASS if we can.

ok markus@

OpenBSD-Commit-ID: 0ef90a99a85d4a2a07217a58efb4df8444818609

5 years agoupstream: pass SSH_ASKPASS_PROMPT hint to y/n key confirm too
djm@openbsd.org [Tue, 12 Nov 2019 22:35:02 +0000 (22:35 +0000)] 
upstream: pass SSH_ASKPASS_PROMPT hint to y/n key confirm too

OpenBSD-Commit-ID: 08d46712e5e5f1bad0aea68e7717b7bec1ab8959

5 years agoupstream: dd API for performing one-shot notifications via tty or
djm@openbsd.org [Tue, 12 Nov 2019 22:34:20 +0000 (22:34 +0000)] 
upstream: dd API for performing one-shot notifications via tty or

SSH_ASKPASS

OpenBSD-Commit-ID: 9484aea33aff5b62ce3642bf259546c7639f23f3

5 years agoupstream: add xvasprintf()
djm@openbsd.org [Tue, 12 Nov 2019 22:32:48 +0000 (22:32 +0000)] 
upstream: add xvasprintf()

OpenBSD-Commit-ID: e5e3671c05c121993b034db935bce1a7aa372247

5 years agoRemove leftover if statement from sync.
Darren Tucker [Tue, 12 Nov 2019 22:08:55 +0000 (09:08 +1100)] 
Remove leftover if statement from sync.

5 years agoupstream: remove extra layer for ed25519 signature; ok djm@
markus@openbsd.org [Tue, 12 Nov 2019 19:34:40 +0000 (19:34 +0000)] 
upstream: remove extra layer for ed25519 signature; ok djm@

OpenBSD-Commit-ID: 7672d9d0278b4bf656a12d3aab0c0bfe92a8ae47

5 years agoupstream: check sig_r and sig_s for ssh-sk keys; ok djm
markus@openbsd.org [Tue, 12 Nov 2019 19:34:00 +0000 (19:34 +0000)] 
upstream: check sig_r and sig_s for ssh-sk keys; ok djm

OpenBSD-Commit-ID: 1a1e6a85b5f465d447a3800f739e35c5b74e0abc

5 years agoupstream: enable ed25519 support; ok djm
markus@openbsd.org [Tue, 12 Nov 2019 19:33:08 +0000 (19:33 +0000)] 
upstream: enable ed25519 support; ok djm

OpenBSD-Commit-ID: 1a399c5b3ef15bd8efb916110cf5a9e0b554ab7e

5 years agoupstream: update sk-api to version 2 for ed25519 support; ok djm
markus@openbsd.org [Tue, 12 Nov 2019 19:32:30 +0000 (19:32 +0000)] 
upstream: update sk-api to version 2 for ed25519 support; ok djm

OpenBSD-Commit-ID: 77aa4d5b6ab17987d8a600907b49573940a0044a

5 years agoupstream: implement sshsk_ed25519_assemble(); ok djm
markus@openbsd.org [Tue, 12 Nov 2019 19:31:45 +0000 (19:31 +0000)] 
upstream: implement sshsk_ed25519_assemble(); ok djm

OpenBSD-Commit-ID: af9ec838b9bc643786310b5caefc4ca4754e68c6

5 years agoupstream: implement sshsk_ed25519_inner_sig(); ok djm
markus@openbsd.org [Tue, 12 Nov 2019 19:31:18 +0000 (19:31 +0000)] 
upstream: implement sshsk_ed25519_inner_sig(); ok djm

OpenBSD-Commit-ID: f422d0052c6d948fe0e4b04bc961f37fdffa0910

5 years agoupstream: rename sshsk_ecdsa_sign() to sshsk_sign(); ok djm
markus@openbsd.org [Tue, 12 Nov 2019 19:30:50 +0000 (19:30 +0000)] 
upstream: rename sshsk_ecdsa_sign() to sshsk_sign(); ok djm

OpenBSD-Commit-ID: 1524042e09d81e54c4470d7bfcc0194c5b46fe19

5 years agoupstream: factor out sshsk_ecdsa_inner_sig(); ok djm@
markus@openbsd.org [Tue, 12 Nov 2019 19:30:21 +0000 (19:30 +0000)] 
upstream: factor out sshsk_ecdsa_inner_sig(); ok djm@

OpenBSD-Commit-ID: 07e41997b542f670a15d7e2807143fe01efef584

5 years agoupstream: factor out sshsk_ecdsa_assemble(); ok djm@
markus@openbsd.org [Tue, 12 Nov 2019 19:29:54 +0000 (19:29 +0000)] 
upstream: factor out sshsk_ecdsa_assemble(); ok djm@

OpenBSD-Commit-ID: 2313761a3a84ccfe032874d638d3c363e0f14026

5 years agoupstream: implement ssh-ed25519-sk verification; ok djm@
markus@openbsd.org [Tue, 12 Nov 2019 19:29:24 +0000 (19:29 +0000)] 
upstream: implement ssh-ed25519-sk verification; ok djm@

OpenBSD-Commit-ID: 37906d93948a1e3d237c20e713d6ca8fbf7d13f6

5 years agoignore ssh-sk-helper
Damien Miller [Tue, 12 Nov 2019 21:48:30 +0000 (08:48 +1100)] 
ignore ssh-sk-helper

5 years agoupstream: skip demanding -fstack-protector-all on hppa. we never
deraadt@openbsd.org [Mon, 11 Nov 2019 19:53:37 +0000 (19:53 +0000)] 
upstream: skip demanding -fstack-protector-all on hppa. we never

wrote a stack protector for reverse-stack architectures, and i don't think
anyone else did either. a warning per compiled file is just annoying.

OpenBSD-Commit-ID: 14806a59353152f843eb349e618abbf6f4dd3ada

5 years agoupstream: duplicate 'x' character in getopt(3) optstring
djm@openbsd.org [Fri, 8 Nov 2019 03:54:02 +0000 (03:54 +0000)] 
upstream: duplicate 'x' character in getopt(3) optstring

OpenBSD-Commit-ID: 64c81caa0cb5798de3621eca16b7dd22e5d0d8a7

5 years agoupstream: Fill in missing man page bits for U2F security key support:
naddy@openbsd.org [Thu, 7 Nov 2019 08:38:38 +0000 (08:38 +0000)] 
upstream: Fill in missing man page bits for U2F security key support:

Mention the new key types, the ~/.ssh/id_ecdsa_sk file, ssh's
SecurityKeyProvider keyword, the SSH_SK_PROVIDER environment variable,
and ssh-keygen's new -w and -x options.

Copy the ssh-sk-helper man page from ssh-pkcs11-helper with minimal
substitutions.

ok djm@

OpenBSD-Commit-ID: ef2e8f83d0c0ce11ad9b8c28945747e5ca337ac4

5 years agoPut sftp-realpath in libssh.a
Darren Tucker [Sat, 2 Nov 2019 13:10:43 +0000 (00:10 +1100)] 
Put sftp-realpath in libssh.a

and remove it from the specific binary targets.

5 years agostatfs might be defined in sys/mount.h.
Darren Tucker [Sat, 2 Nov 2019 13:09:21 +0000 (00:09 +1100)] 
statfs might be defined in sys/mount.h.

eg on old NetBSDs.

5 years agoPut stdint.h inside ifdef HAVE_STDINT_H.
Darren Tucker [Sat, 2 Nov 2019 12:25:01 +0000 (23:25 +1100)] 
Put stdint.h inside ifdef HAVE_STDINT_H.

5 years agoRebuild .depend.
Darren Tucker [Sat, 2 Nov 2019 11:45:44 +0000 (22:45 +1100)] 
Rebuild .depend.

5 years agoDefine __BSD_VISIBLE in fnmatch.h.
Darren Tucker [Sat, 2 Nov 2019 11:42:05 +0000 (22:42 +1100)] 
Define __BSD_VISIBLE in fnmatch.h.

.. since we use symbols defined only when it is when using the compat
fnmatch.

5 years agoOnly enable U2F if OpenSSL supports ECC.
Darren Tucker [Sat, 2 Nov 2019 05:39:38 +0000 (16:39 +1100)] 
Only enable U2F if OpenSSL supports ECC.

This requires moving the U2F bits to below the OpenSSL parts so we have
the required information.  ok djm@

5 years agoupstream: fix miscellaneous text problems; ok djm@
naddy@openbsd.org [Fri, 1 Nov 2019 12:10:43 +0000 (12:10 +0000)] 
upstream: fix miscellaneous text problems; ok djm@

OpenBSD-Commit-ID: 0cbf411a14d8fa0b269b69cbb1b4fc0ca699fe9f

5 years agoAdd flags needed to build and work on Ultrix.
Darren Tucker [Fri, 1 Nov 2019 07:26:07 +0000 (18:26 +1100)] 
Add flags needed to build and work on Ultrix.

5 years agoHook up fnmatch for platforms that don't have it.
Darren Tucker [Fri, 1 Nov 2019 07:24:29 +0000 (18:24 +1100)] 
Hook up fnmatch for platforms that don't have it.

5 years agoAdd missing bracket in realpath macro.
Darren Tucker [Fri, 1 Nov 2019 07:17:42 +0000 (18:17 +1100)] 
Add missing bracket in realpath macro.

5 years agoImport fnmatch.c from OpenBSD.
Darren Tucker [Fri, 1 Nov 2019 06:32:47 +0000 (17:32 +1100)] 
Import fnmatch.c from OpenBSD.

5 years agoUse sftp_realpath if no native realpath.
Darren Tucker [Fri, 1 Nov 2019 04:22:32 +0000 (15:22 +1100)] 
Use sftp_realpath if no native realpath.

5 years agoConfigure flags for haiku from haikuports.
Darren Tucker [Fri, 1 Nov 2019 04:06:16 +0000 (15:06 +1100)] 
Configure flags for haiku from haikuports.

Should build with the default flags with ./configure

5 years agoupstream: fix a race condition in the SIGCHILD handler that could turn
djm@openbsd.org [Fri, 1 Nov 2019 03:54:33 +0000 (03:54 +0000)] 
upstream: fix a race condition in the SIGCHILD handler that could turn

in to a kill(-1); bz3084, reported by Gao Rui, ok dtucker@

OpenBSD-Commit-ID: ac2742e04a69d4c34223505b6a32f6d686e18896

5 years agoconditionalise SK sign/verify on ENABLE_SK
Damien Miller [Fri, 1 Nov 2019 03:49:25 +0000 (14:49 +1100)] 
conditionalise SK sign/verify on ENABLE_SK

Spotted by Darren and his faux-Vax

5 years agoAdd prototype for localtime_r if needed.
Darren Tucker [Fri, 1 Nov 2019 03:41:07 +0000 (14:41 +1100)] 
Add prototype for localtime_r if needed.

5 years agoCheck if IP_TOS is defined before using.
Darren Tucker [Fri, 1 Nov 2019 02:42:12 +0000 (13:42 +1100)] 
Check if IP_TOS is defined before using.

5 years agoautoconf pieces for U2F support
Damien Miller [Fri, 1 Nov 2019 02:34:49 +0000 (13:34 +1100)] 
autoconf pieces for U2F support

Mostly following existing logic for PKCS#11 - turning off support
when either libcrypto or dlopen(3) are unavailable.

5 years agoupstream: remove duplicate PUBKEY_DEFAULT_PK_ALG on !WITH_OPENSSL path
djm@openbsd.org [Fri, 1 Nov 2019 02:32:05 +0000 (02:32 +0000)] 
upstream: remove duplicate PUBKEY_DEFAULT_PK_ALG on !WITH_OPENSSL path

OpenBSD-Commit-ID: 95a7cafad2a4665d57cabacc28031fabc0bea9fc

5 years agoupstream: more additional source files
djm@openbsd.org [Fri, 1 Nov 2019 02:06:52 +0000 (02:06 +0000)] 
upstream: more additional source files

OpenBSD-Regress-ID: 8eaa25fb901594aee23b76eda99dca5b8db94c6f

5 years agoupstream: additional source files here too
djm@openbsd.org [Fri, 1 Nov 2019 02:04:25 +0000 (02:04 +0000)] 
upstream: additional source files here too

OpenBSD-Regress-ID: 8809f8e1c8f7459e7096ab6b58d8e56cb2f483fd

5 years agoupstream: additional source files here too
djm@openbsd.org [Fri, 1 Nov 2019 02:03:27 +0000 (02:03 +0000)] 
upstream: additional source files here too

OpenBSD-Regress-ID: 09297e484327f911fd353489518cceaa0c1b95ce

5 years agoupstream: adapt to extra sshkey_sign() argument and additional
djm@openbsd.org [Fri, 1 Nov 2019 01:57:59 +0000 (01:57 +0000)] 
upstream: adapt to extra sshkey_sign() argument and additional

dependencies

OpenBSD-Regress-ID: 7a25604968486c4d6f81d06e8fbc7d17519de50e

5 years agoupstream: skip security-key key types for tests until we have a
djm@openbsd.org [Fri, 1 Nov 2019 01:55:41 +0000 (01:55 +0000)] 
upstream: skip security-key key types for tests until we have a

dummy U2F middleware to use.

OpenBSD-Regress-ID: 37200462b44334a4ad45e6a1f7ad1bd717521a95

5 years agoupstream: sort;
jmc@openbsd.org [Fri, 1 Nov 2019 00:52:35 +0000 (00:52 +0000)] 
upstream: sort;

OpenBSD-Commit-ID: 8264b0be01ec5a60602bd50fd49cc3c81162ea16

5 years agoupstream: undo debugging bits that shouldn't have been committed
djm@openbsd.org [Thu, 31 Oct 2019 21:37:33 +0000 (21:37 +0000)] 
upstream: undo debugging bits that shouldn't have been committed

OpenBSD-Commit-ID: 4bd5551b306df55379afe17d841207990eb773bf

5 years agodepend
Damien Miller [Thu, 31 Oct 2019 22:24:58 +0000 (09:24 +1100)] 
depend

5 years agoupstream: fix -Wshadow warning
djm@openbsd.org [Thu, 31 Oct 2019 21:28:27 +0000 (21:28 +0000)] 
upstream: fix -Wshadow warning

OpenBSD-Commit-ID: 3441eb04f872a00c2483c11a5f1570dfe775103c

5 years agoupstream: Refactor signing - use sshkey_sign for everything,
djm@openbsd.org [Thu, 31 Oct 2019 21:23:19 +0000 (21:23 +0000)] 
upstream: Refactor signing - use sshkey_sign for everything,

including the new U2F signatures.

Don't use sshsk_ecdsa_sign() directly, instead make it reachable via
sshkey_sign() like all other signature operations. This means that
we need to add a provider argument to sshkey_sign(), so most of this
change is mechanically adding that.

Suggested by / ok markus@

OpenBSD-Commit-ID: d5193a03fcfa895085d91b2b83d984a9fde76c8c

5 years agoupstream: ssh-agent support for U2F/FIDO keys
djm@openbsd.org [Thu, 31 Oct 2019 21:22:01 +0000 (21:22 +0000)] 
upstream: ssh-agent support for U2F/FIDO keys

feedback & ok markus@

OpenBSD-Commit-ID: bb544a44bc32e45d2ec8bf652db2046f38360acb

5 years agoupstream: ssh AddKeysToAgent support for U2F/FIDO keys
djm@openbsd.org [Thu, 31 Oct 2019 21:20:38 +0000 (21:20 +0000)] 
upstream: ssh AddKeysToAgent support for U2F/FIDO keys

feedback & ok markus@

OpenBSD-Commit-ID: ac08e45c7f995fa71f8d661b3f582e38cc0a2f91

5 years agoupstream: ssh-add support for U2F/FIDO keys
djm@openbsd.org [Thu, 31 Oct 2019 21:19:56 +0000 (21:19 +0000)] 
upstream: ssh-add support for U2F/FIDO keys

OpenBSD-Commit-ID: 7f88a5181c982687afedf3130c6ab2bba60f7644

5 years agoupstream: add new agent key constraint for U2F/FIDO provider
djm@openbsd.org [Thu, 31 Oct 2019 21:19:14 +0000 (21:19 +0000)] 
upstream: add new agent key constraint for U2F/FIDO provider

feedback & ok markus@

OpenBSD-Commit-ID: d880c380170704280b4003860a1744d286c7a172

5 years agoupstream: ssh client support for U2F/FIDO keys
djm@openbsd.org [Thu, 31 Oct 2019 21:18:28 +0000 (21:18 +0000)] 
upstream: ssh client support for U2F/FIDO keys

OpenBSD-Commit-ID: eb2cfa6cf7419a1895e06e398ea6d41516c5b0bc

5 years agoupstream: Separate myproposal.h userauth pubkey types
djm@openbsd.org [Thu, 31 Oct 2019 21:17:49 +0000 (21:17 +0000)] 
upstream: Separate myproposal.h userauth pubkey types

U2F/FIDO keys are not supported for host authentication, so we need
a separate list for user keys.

feedback & ok markus@

OpenBSD-Commit-ID: 7fe2e6ab85f9f2338866e5af8ca2d312abbf0429

5 years agoupstream: ssh-keygen support for generating U2F/FIDO keys
djm@openbsd.org [Thu, 31 Oct 2019 21:17:09 +0000 (21:17 +0000)] 
upstream: ssh-keygen support for generating U2F/FIDO keys

OpenBSD-Commit-ID: 6ce04f2b497ac9dd8c327f76f1e6c724fb1d1b37

5 years agoupstream: U2F/FIDO middleware interface
djm@openbsd.org [Thu, 31 Oct 2019 21:16:20 +0000 (21:16 +0000)] 
upstream: U2F/FIDO middleware interface

Supports enrolling (generating) keys and signatures.

feedback & ok markus@

OpenBSD-Commit-ID: 73d1dd5939454f9c7bd840f48236cba41e8ad592

5 years agoupstream: Initial infrastructure for U2F/FIDO support
djm@openbsd.org [Thu, 31 Oct 2019 21:15:14 +0000 (21:15 +0000)] 
upstream: Initial infrastructure for U2F/FIDO support

Key library support: including allocation, marshalling public/private
keys and certificates, signature validation.

feedback & ok markus@

OpenBSD-Commit-ID: a17615ba15e0f7932ac4360cb18fc9a9544e68c7

5 years agoupstream: Protocol documentation for U2F/FIDO keys in OpenSSH
djm@openbsd.org [Thu, 31 Oct 2019 21:14:17 +0000 (21:14 +0000)] 
upstream: Protocol documentation for U2F/FIDO keys in OpenSSH

OpenBSD-Commit-ID: 8f3247317c2909870593aeb306dff848bc427915

5 years agoMissing unit test files
Damien Miller [Thu, 31 Oct 2019 21:36:16 +0000 (08:36 +1100)] 
Missing unit test files