Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Import regenerated moduli file. | 2019-10-22 | 6 | -450/+404 | ||
| | ||||||
* | potential NULL dereference for revoked hostkeys; reported by | 2019-10-16 | 1 | -2/+2 | ||
| | | | | krishnaiah bommu | |||||
* | free buf before return; reported by krishnaiah bommu | 2019-10-16 | 1 | -1/+2 | ||
| | ||||||
* | memleak in error path; spotted by oss-fuzz, ok markus@ | 2019-10-14 | 1 | -9/+17 | ||
| | ||||||
* | openssh-8.1 | 2019-10-09 | 1 | -2/+2 | ||
| | ||||||
* | fix an unreachable integer overflow similar to the XMSS case, and some | 2019-10-09 | 1 | -4/+22 | ||
| | | | | | | other NULL dereferences found by fuzzing. fix with and ok markus@ | |||||
* | fix integer overflow in XMSS private key parsing. Reported by | 2019-10-09 | 1 | -2/+3 | ||
| | | | | | | | | Adam Zabrocki via SecuriTeam's SSH program. Note that this code is experimental and not compiled by default. ok markus@ | |||||
* | Correct type for end-of-list sentinel; fixes initializer warnings on | 2019-10-08 | 1 | -2/+2 | ||
| | | | | some platforms. ok deraadt. | |||||
* | reversed test yielded incorrect debug message | 2019-10-07 | 1 | -2/+2 | ||
| | ||||||
* | fix memory leak in error path; bz#3074 | 2019-10-04 | 1 | -3/+2 | ||
| | | | | patch from krishnaiah.bommu@intel.com, ok dtucker | |||||
* | space | 2019-10-04 | 1 | -2/+2 | ||
| | ||||||
* | Check for gmtime failure in moduli generation. Based on patch from | 2019-10-04 | 1 | -1/+3 | ||
| | | | | krishnaiah.bommu@intel.com, ok djm@ | |||||
* | use a more common options order in SYNOPSIS and sync usage(); | 2019-10-03 | 2 | -35/+33 | ||
| | | | | | | while here, no need for Bk/Ek; ok dtucker | |||||
* | thinko in previous; spotted by Mantas Mikulėnas | 2019-10-02 | 1 | -2/+2 | ||
| | ||||||
* | make signature format match PROTOCOL.sshsig file: the message hash | 2019-10-02 | 1 | -2/+2 | ||
| | | | | | should be written as a string, not raw bytes. Spotted by Mantas Mikulėnas | |||||
* | ban empty namespace strings for sshsig; spotted by Mantas Mikulėnas | 2019-10-02 | 1 | -2/+2 | ||
| | ||||||
* | remove some duplicate #includes | 2019-10-02 | 5 | -10/+5 | ||
| | ||||||
* | revert unconditional forced login implemented in r1.41 of ssh-pkcs11.c; | 2019-10-01 | 1 | -26/+5 | ||
| | | | | | | | | r1.45 added a forced login as a fallback for cases where the token returns no objects and this is less disruptive for users of tokens directly in ssh (rather than via ssh-agent) and in ssh-keygen bz3006, patch from Jakub Jelen; ok markus | |||||
* | group and sort single letter options; ok deraadt | 2019-09-29 | 2 | -11/+9 | ||
| | ||||||
* | fix the DH-GEX text in -a; | 2019-09-27 | 1 | -5/+5 | ||
| | | | | because this required a comma, i added a comma to the first part, for balance... | |||||
* | identity_file[] should be PATH_MAX, not the arbitrary number 1024 | 2019-09-24 | 1 | -2/+2 | ||
| | ||||||
* | new sentence, new line; | 2019-09-20 | 1 | -3/+4 | ||
| | ||||||
* | Allow testing signature syntax and validity without verifying that | 2019-09-16 | 2 | -10/+44 | ||
| | | | | | | | | a signature came from a trusted signer. To discourage accidental or unintentional use, this is invoked by the deliberately ugly option name "check-novalidate" from Sebastian Kinne | |||||
* | clarify that IdentitiesOnly also applies to the default ~/.ssh/id_* | 2019-09-13 | 1 | -4/+4 | ||
| | | | | keys; bz#3062 | |||||
* | Plug mem leaks on error paths, based in part on github pr#120 from | 2019-09-13 | 2 | -16/+21 | ||
| | | | | David Carlier. ok djm@. | |||||
* | whitespace | 2019-09-13 | 1 | -3/+3 | ||
| | ||||||
* | allow %n to be expanded in ProxyCommand strings | 2019-09-13 | 4 | -22/+28 | ||
| | | | | | From Zachary Harmany via github.com/openssh/openssh-portable/pull/118 ok dtucker@ | |||||
* | clarify that ConnectTimeout applies both to the TCP connection and to | 2019-09-13 | 1 | -4/+4 | ||
| | | | | the protocol handshake/KEX. From Jean-Charles Longuet via Github PR140 | |||||
* | Fix potential truncation warning. ok deraadt. | 2019-09-09 | 1 | -2/+2 | ||
| | ||||||
* | Allow prepending a list of algorithms to the default set by starting | 2019-09-06 | 6 | -19/+80 | ||
| | | | | | | | | | the list with the '^' character, e.g. HostKeyAlgorithms ^ssh-ed25519 Ciphers ^aes128-gcm@openssh.com,aes256-gcm@openssh.com ok djm@ dtucker@ | |||||
* | key conversion should fail for !openssl builds, not fall through to | 2019-09-06 | 1 | -2/+5 | ||
| | | | | the key generation code | |||||
* | typo in previous | 2019-09-06 | 1 | -2/+2 | ||
| | ||||||
* | avoid compiling certain files that deeply depend on libcrypto when | 2019-09-06 | 4 | -8/+13 | ||
| | | | | WITH_OPENSSL isn't set | |||||
* | fixes for !WITH_OPENSSL compilation; ok dtucker@ | 2019-09-06 | 17 | -30/+111 | ||
| | ||||||
* | lots of things were relying on libcrypto headers to transitively | 2019-09-06 | 17 | -18/+42 | ||
| | | | | | include various system headers (mostly stdlib.h); include them explicitly | |||||
* | remove leakmalloc reference; we used this early when refactoring but | 2019-09-06 | 1 | -5/+1 | ||
| | | | | not since | |||||
* | better error code for bad arguments; inspired by | 2019-09-06 | 1 | -2/+5 | ||
| | | | | https://github.com/openssh/openssh-portable/pull/144 by Ed Maste | |||||
* | if a PKCS#11 token returns no keys then try to login and refetch | 2019-09-05 | 1 | -11/+33 | ||
| | | | | them. Based on patch from Jakub Jelen; bz#2430 ok markus@ | |||||
* | sprinkle in some explicit errors here, otherwise the percolate all | 2019-09-05 | 1 | -20/+60 | ||
| | | | | | | the way up to dispatch_run_fatal() and lose all meaninful context to help with bz#3063; ok dtucker@ | |||||
* | only send ext_info for KEX_INITIAL; bz#2929 ok dtucker | 2019-09-05 | 1 | -3/+4 | ||
| | ||||||
* | macro fix; ok djm | 2019-09-05 | 1 | -5/+5 | ||
| | ||||||
* | memleak on error path; found by libfuzzer | 2019-09-05 | 1 | -1/+1 | ||
| | ||||||
* | expose allowed_signers options parsing code in header for fuzzing | 2019-09-05 | 2 | -9/+17 | ||
| | | | | | rename to make more consistent with philosophically-similar auth options parsing API. | |||||
* | Call comma-separated lists as such to clarify semantics. | 2019-09-04 | 2 | -18/+18 | ||
| | | | | | | | | | | | | Options such as Ciphers take values that may be a list of ciphers; the complete list, not indiviual elements, may be prefixed with a dash or plus character to remove from or append to the default list, respectively. Users might read the current text as if each elment took an optional prefix, so tweak the wording from "values" to "list" to prevent such ambiguity for all options supporting these semantics. Fix instances missed in first commit. ok jmc@ kn@ | |||||
* | tweak previous; | 2019-09-04 | 1 | -5/+5 | ||
| | ||||||
* | repair typo and editing mishap | 2019-09-03 | 2 | -3/+3 | ||
| | ||||||
* | sshsig tweaks and improvements from and suggested by Markus | 2019-09-03 | 5 | -104/+122 | ||
| | | | | ok markus/me | |||||
* | sshsig: lightweight signature and verification ability for OpenSSH | 2019-09-03 | 6 | -8/+1408 | ||
| | | | | | | | | | | | | | This adds a simple manual signature scheme to OpenSSH. Signatures can be made and verified using ssh-keygen -Y sign|verify Signatures embed the key used to make them. At verification time, this is matched via principal name against an authorized_keys-like list of allowed signers. Mostly by Sebastian Kinne w/ some tweaks by me ok markus@ | |||||
* | move authorized_keys option parsing helpsers to misc.c and make | 2019-09-03 | 3 | -72/+80 | ||
| | | | | them public; ok markus@ | |||||
* | make get_sigtype public as sshkey_get_sigtype(); ok markus@ | 2019-09-03 | 2 | -8/+9 | ||
| |