summaryrefslogtreecommitdiffstats
path: root/usr.bin (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Fix build with -fno-common (default in clang 11)jca2020-09-012-87/+193
| | | | Input and ok mortimer@
* update currency exchange rates;jmc2020-09-011-39/+39
|
* Add -F to set-environment and source-file; GitHub issue 2359.nicm2020-09-013-17/+44
|
* Only print below number when there is enough space.nicm2020-09-011-2/+2
|
* Allow a-z keys for display-panes to jump to higher numbered panes.nicm2020-09-011-31/+62
|
* crank to 6.8-betaderaadt2020-08-311-4/+4
|
* refuse to add verify-required (PINful) FIDO keys to ssh-agent untildjm2020-08-311-7/+16
| | | | the agent supports them properly
* Add RCS IDs to the few files that are missing them;djm2020-08-316-0/+7
| | | | from Pedro Martelletto
* Fix :S with anchors and replacementtb2020-08-301-16/+13
| | | | | | | | | | | | | | | gnezdo noticed that :S/old_string/new_string/ variable modifiers such as :S/^sth/&/ and :S/sth$/&/ with an anchor in the old_string and an & in the new_string don't work as documented (and expected) since they replace & with old_string including the anchors. This is because get_spatternarg() deals with skipping the anchors in pattern->lhs only after having replaced any '&' in the buffer that will eventually become new_string with pattern->lhs. Fix this by moving the logic of skipping the anchors from get_spatternarg() into common_get_patternarg() so it is done before & is handled. ok millert
* Implement mktime() function for compatibility with mawk and gawk.millert2020-08-284-6/+66
| | | | | This is the only missing time function compared to those two implementations. Doc changes OK jmc@
* Check that the addresses supplied to Match Address and Matchdtucker2020-08-281-1/+8
| | | | | | LocalAddress are valid when parsing in config-test mode. This will catch address/mask mismatches before they cause problems at runtime. Found by Daniel Stocker, ok djm@
* Remove a lie reported by Jamie Landeg-Jones <jamie at catflap dot org>:schwarze2020-08-271-5/+2
| | | | | The times when -T man may have expanded .so requests are long gone, nor would such a feature be useful. Use soelim(1) if you need that.
* unveil(_PATH_DEV, "r") when -T or -u is used: who(1) is using stat(2) for determining the status of the ttysemarie2020-08-271-1/+5
| | | | ok deraadt@
* Fix a regression caused by the insertion of two new tokens,schwarze2020-08-271-10/+18
| | | | | | which unintentionally made the -O tag= argument mandatory, breaking commands like "man -akO tag Ic=ulimit". Noticed while answering questions from Ian Ropers.
* Make it more explicit that the statement "-O tag does not work with less(1)"schwarze2020-08-271-3/+10
| | | | | | only applies to -T html output mode, and why. Of course, -O tag works just fine with less(1) in the -T ascii and -T utf8 output modes. Potential for confusion pointed out by Ian Ropers.
* Avoid artifacts in the most common case of closing conditional blocksschwarze2020-08-271-2/+4
| | | | | | | | when no arguments follow the closing brace, \}. For example, the line "'br\}" contained in the pod2man(1) preamble would throw a bogus "escaped character not allowed in a name" error. This issue was originally reported by Chris Bennett on ports@, and afresh1@ noticed it came from the pod2man(1) preamble.
* sentence fix; from pedro martellettojmc2020-08-271-2/+2
|
* debug()-print a little info about FIDO-specific key fields viadjm2020-08-271-2/+6
| | | | "ssh-keygen -vyf /path/key"
* skip a bit more FIDO token selection logic when only a single tokendjm2020-08-271-1/+8
| | | | | | is attached. with Pedro Martelletto
* Add pane_last format, GitHub issue 2353.nicm2020-08-272-3/+5
|
* tweak previous;jmc2020-08-272-6/+6
|
* remove unreachable code I forgot to delete in r1.334djm2020-08-271-13/+1
|
* Request PIN ahead of time for certain FIDO actionsdjm2020-08-272-19/+23
| | | | | | | | When we know that a particular action will require a PIN, such as downloading resident keys or generating a verify-required key, request the PIN before attempting it. joint work with Pedro Martelletto; ok markus@
* preserve verify-required for resident FIDO keysdjm2020-08-273-6/+10
| | | | | | | | | When downloading a resident, verify-required key from a FIDO token, preserve the verify-required in the private key that is written to disk. Previously we weren't doing that because of lack of support in the middleware API. from Pedro Martelletto; ok markus@ and myself
* major rework of FIDO token selection logicdjm2020-08-272-253/+332
| | | | | | | | | | | | | | | | | | | | When PINs are in use and multiple FIDO tokens are attached to a host, we cannot just blast requests at all attached tokens with the PIN specified as this will cause the per-token PIN failure counter to increment. If this retry counter hits the token's limit (usually 3 attempts), then the token will lock itself and render all (web and SSH) of its keys invalid. We don't want this. So this reworks the key selection logic for the specific case of multiple keys being attached. When multiple keys are attached and the operation requires a PIN, then the user must touch the key that they wish to use first in order to identify it. This may require multiple touches, but only if there are multiple keys attached AND (usually) the operation requires a PIN. The usual case of a single key attached should be unaffected. Work by Pedro Martelletto; ok myself and markus@
* support for requiring user verified FIDO keys in sshddjm2020-08-279-25/+88
| | | | | | | | | | | This adds a "verify-required" authorized_keys flag and a corresponding sshd_config option that tells sshd to require that FIDO keys verify the user identity before completing the signing/authentication attempt. Whether or not user verification was performed is already baked into the signature made on the FIDO token, so this is just plumbing that flag through and adding ways to require it. feedback and ok markus@
* support for user-verified FIDO keysdjm2020-08-2716-90/+164
| | | | | | | | | | | | | | | FIDO2 supports a notion of "user verification" where the user is required to demonstrate their identity to the token before particular operations (e.g. signing). Typically this is done by authenticating themselves using a PIN that has been set on the token. This adds support for generating and using user verified keys where the verification happens via PIN (other options might be added in the future, but none are in common use now). Practically, this adds another key generation option "verify-required" that yields a key that requires a PIN before each authentication. feedback markus@ and Pedro Martelletto; ok markus@
* Add "t" to toggle the display of routing tableskn2020-08-265-29/+58
| | | | | | | | | | | | Swap the WAIT column with RTABLE (and vice versa); WAIT is wide enough to fit RTABLE, somewhat adds additional value to STATE and seems therefore most appropiate to hide in favour of RTABLE. Filtering rtables with "T" does not toggle the column, just like filtering users with "u" does not toggle between user and thread id. Feedback jmc OK remi
* Allow colour to be spelt as color, from Boris Verkhovsky. GitHub issuenicm2020-08-254-17/+56
| | | | 2317.
* Rename rtable filter variables and simplify buffer handlingkn2020-08-251-15/+13
| | | | | No functional change, the rename is for consistency and the buffer handling reduces churn in an upcoming diff.
* Old Terminal.app versions do not respond correctly to secondary DA,nicm2020-08-241-3/+10
| | | | | instead responding with the primary DA response. Ignore it. Reported by Dave Vandervies.
* Do not run off end of string when stripping delays, reported by Davenicm2020-08-241-1/+3
| | | | Vandervies.
* Filter by routing tablekn2020-08-235-10/+91
| | | | | | | | | | | | "-T-0" for processes outside the default routing table, "-T3" for those in a specific one; same semantics as with other filters. Manual wording and command line flag taken from pgrep(1) being the only way to identify processes by routing table; After netstat(1)'s recent addition of "-R", filtering in top makes for handy tooling around rtable(4). "looks good to me" millert OK remi
* Support looking up unix domain sockets by file name.millert2020-08-221-6/+27
| | | | | | | The best that we can do is string comparison of the file name. Previously, "fstat /var/run/foo.sock" would return no results. The -f option still won't work for sockets since they are not file system objects. OK kn@
* Print unp_path for unix domain sockets. OK kn@ mvs@millert2020-08-211-1/+3
|
* Add n: modifier to get length of a format, also automatically expandnicm2020-08-202-14/+32
| | | | variable name arguments again if they contain a #{.
* Handle EADDRNOAVAIL from connect(2) gracefullykn2020-08-191-1/+3
| | | | | | | | | | The server's DNS name may yield multiple addresses of different address families; in case the local client has no suitable address, i.e. connect(2) fails with EADDRNOTAVAIL, do not fail hard but try the next address instead. Report (IPv6 only client with dualstack server) and diff from Sasha Romijn. OK job
* Set alert flag for the current window if the session is unattached.nicm2020-08-191-4/+4
| | | | GitHub issues 1182 and 2299. From Eric Garver.
* Respond to colour requests if a colour is available, from Michal Goral.nicm2020-08-191-9/+37
|
* -F requires at least 5 columns for folding, while a tab at start of line ismartijn2020-08-171-1/+5
| | | | | | | | | | | | 8 columns. This causes an infinite loop in the folding logic. Fix this by implementing an escape hatch so that only a single fold can occur. This does mean that a tab with a -F smaller or equal to 8 will always print the newline escape backslash in the 8th column. Bug reported by phillbush <at> cock <dot> li Minor tweak and OK deraadt@
* honor /etc/nologin by unveiled itsemarie2020-08-171-1/+3
| | | | ok deraadt@
* '!' does not need to be escaped;jmc2020-08-141-5/+4
| | | | confirmed by naddy and deraadt
* new kstat(1) manual page, using info from dlg@, from his commit messages,schwarze2020-08-133-4/+103
| | | | | and from partial code inspection; OK dlg@
* ssh-keyscan(1): simplify conloop() with timercmp(3), timersub(3); ok djm@cheloha2020-08-121-13/+5
|
* Update awk to August 7, 2020 version.millert2020-08-114-15/+31
|
* let ssh_config(5)'s AddKeysToAgent keyword accept a time limit fordjm2020-08-114-27/+89
| | | | | | keys in addition to its current flag options. Time-limited keys will automatically be removed from ssh-agent after their expiry time has passed; ok markus@
* let the "Confirm user presence for key ..." ssh-askpass notificationdjm2020-08-111-9/+14
| | | | respect $SSH_ASKPASS_REQUIRE; ok markus@
* add -w so kstat can update and print stats at a specified wait interval.dlg2020-08-111-4/+47
|
* sigh, i made the previous diff to small.dlg2020-08-101-38/+38
| | | | | main needs to understand the kstat_tree type now, so move the declaration up.
* factor out the printing of kstats. no functional change otherwise.dlg2020-08-101-7/+19
|