summaryrefslogtreecommitdiff
path: root/usr.bin
AgeCommit message (Collapse)Author
2019-11-27use _PATH_PROTOCOLS from netdb.h insteadTheo de Raadt
2019-11-27Initialize nfds fields of new file structures.Alexandre Ratchov
Fixes a possible crash when a new file structure is added in the time-out processing code-path.
2019-11-27Revert previous commit. The channels code still uses int in many placesDarren Tucker
for channel ids so the INT_MAX check still makes sense.
2019-11-27use error()+_exit() instead of fatal() to avoid running cleanupDamien Miller
handlers in child process; spotted via weird regress failures in portable
2019-11-27Make channel_id u_int32_t and remove unnecessary check and cast that wereDarren Tucker
left over from the type conversion. Noted by t-hashida@amiya.co.jp in bz#3098, ok markus@ djm@
2019-11-26tweak previous;Jason McIntyre
2019-11-26Prevent divide-by zero in tcpbench(1). Found while testing iwm(4).Stefan Sperling
#0 0x000004c27b9051a9 in udp_process_slice (fd=<optimized out>, event=<optimized out>, v_sc=0x4c55279f500) at /usr/src/usr.bin/tcpbench/tcpbench.c:606 606 pps = (sc->udp_slice_pkts * 1000) / since_last; (gdb) p since_last $1 = 0 ok benno@
2019-11-26Add default # and * binding with vi(1) keys.Nicholas Marriott
2019-11-26kdump reads /etc/protocols to translate proto numbers into names; ok sthen@ ↵Otto Moerbeek
gilles@
2019-11-26more debugging; behind DEBUG_SKDamien Miller
2019-11-25Don't use motion flag uninitialized.Nicholas Marriott
2019-11-25Fix a warning in previous.Nicholas Marriott
2019-11-25Do not clear search marks on cursor movement with vi(1) keys, from EricNicholas Marriott
Pruitt in GitHub issue 1985.
2019-11-25Add p format modifier for padding to width.Nicholas Marriott
2019-11-25Allow multiple substitutions in a single format.Nicholas Marriott
2019-11-25redundant testDamien Miller
2019-11-25document the "no-touch-required" certificate extension;Damien Miller
ok markus, feedback deraadt
2019-11-25Print a key touch reminder when generating a security key. Most keysDamien Miller
require a touch to authorize the operation.
2019-11-25allow "ssh-keygen -x no-touch-required" when generating a security keyDamien Miller
keypair to request one that does not require a touch for each authentication attempt. The default remains to require touch. feedback deraadt; ok markus@
2019-11-25add a "no-touch-required" option for authorized_keys and a similarDamien Miller
extension for certificates. This option disables the default requirement that security key signatures attest that the user touched their key to authorize them. feedback deraadt, ok markus
2019-11-25Add a sshd_config PubkeyAuthOptions directiveDamien Miller
This directive has a single valid option "no-touch-required" that causes sshd to skip checking whether user presence was tested before a security key signature was made (usually by the user touching the key). ok markus@
2019-11-25Add new structure for signature optionsDamien Miller
This is populated during signature verification with additional fields that are present in and covered by the signature. At the moment, it is only used to record security key-specific options, especially the flags field. with and ok markus@
2019-11-25memleak in error pathDamien Miller
2019-11-24Only substitute patterns starting with ^ once.Nicholas Marriott
2019-11-22Wait for FD to be readable or writeable during a nonblocking connect,Darren Tucker
not just readable. Prevents a timeout when the server doesn't immediately send a banner (eg multiplexers like sslh) but is also slightly quicker for other connections since, unlike ssh1, ssh2 doesn't specify that the client should parse the server banner before sending its own. Patch from mnissler@chromium.org, ok djm@
2019-11-20Do not check the client readonly flag when there is no client, GitHub issue ↵Nicholas Marriott
1980.
2019-11-19adjust on-wire signature encoding for ecdsa-sk keys to better matchDamien Miller
ec25519-sk keys. Discussed with markus@ and Sebastian Kinne NB. if you are depending on security keys (already?) then make sure you update both your clients and servers.
2019-11-19a little more information from the monitor when signatureDamien Miller
verification fails.
2019-11-19revert previous: naddy pointed out what's meant to happen. rethink needed...Jason McIntyre
2019-11-19-c and -s do not make sense with -k; reshuffle -k into the main synopsis/usage;Jason McIntyre
ok djm
2019-11-19More return value check in openssl(1) cmsKinichiro Inoguchi
Checking return value of sk_.*_new_null(). ok beck@ jsing@
2019-11-19Add manual descriptions for openssl(1) req -addextKinichiro Inoguchi
ok jmc@
2019-11-18document '$' environment variable expansion for SecurityKeyProvider; ok djm@Christian Weisgerber
2019-11-18more missing mentions of ed25519-sk; ok djm@Christian Weisgerber
2019-11-18additional missing stdarg.h includes when built without WITH_OPENSSL; ok djm@Christian Weisgerber
2019-11-18add the missing WITH_OPENSSL ifdefs after the ED25519-SK addition; ok djm@Christian Weisgerber
2019-11-18Remove typedef and check sk_push return value in openssl(1) cmsKinichiro Inoguchi
- Remove typedef and use 'struct cms_key_param' instead - Check return value of sk_X509_push and sk_OPENSSL_STRING_push - Add a blank line to separate variable declarations from code comments from jsing@
2019-11-18Add -keyopt opiton to openssl(1) cms subcommandKinichiro Inoguchi
This provides rsa_padding_mode:oaep for cms -encrypt, and rsa_padding_mode:pss for cms -sign. ok jsing@
2019-11-18Add -f for full size to join-pane (like split-window), from Theo Buehler.Nicholas Marriott
2019-11-18Keep modifiers on backspace when translating it.Nicholas Marriott
2019-11-18fix a bug that prevented serialisation of ed25519-sk keysDamien Miller
2019-11-18Fix incorrect error message when key certification failsDamien Miller
2019-11-18fix bug that prevented certification of ed25519-sk keysDamien Miller
2019-11-18allow *-sk key types to be turned into certificatesDamien Miller
2019-11-18mention ed25519-sk key/cert types here too; prompted by jmc@Damien Miller
2019-11-18mention ed25519-sk in places where it is accepted; prompted by jmc@Damien Miller
2019-11-18various knf and whitespace; ok jcaTheo de Raadt
2019-11-18document ed25519-sk pubkey, private key and certificate formatsDamien Miller
2019-11-18correct order or ecdsa-sk private key fieldsDamien Miller
2019-11-18correct description of fields in pub/private keys (was missing curveDamien Miller
name); spotted by Sebastian Kinne