]> git.feebdaed.xyz Git - 0xmirror/openssh-portable.git/log
0xmirror/openssh-portable.git
4 weeks agoupstream: don't set the PerSourceNetBlockSize IPv6 mask if sscanf
djm@openbsd.org [Tue, 25 Nov 2025 00:52:00 +0000 (00:52 +0000)]
upstream: don't set the PerSourceNetBlockSize IPv6 mask if sscanf

didn't decode it. From Mingjie Shen via GHPR598

OpenBSD-Commit-ID: c722014e735cbd87adb2fa968ce4c47b43cf98b0

4 weeks agoupstream: give ssh-agent more time to start in tests; requested in
djm@openbsd.org [Mon, 24 Nov 2025 23:56:58 +0000 (23:56 +0000)]
upstream: give ssh-agent more time to start in tests; requested in

GHPR602

OpenBSD-Regress-ID: 7d771db2c1d4a422e83c3f632ba1e96f72a262b8

4 weeks agoupstream: When testing PKCS11, explicitly allow the module path in
djm@openbsd.org [Mon, 24 Nov 2025 23:54:15 +0000 (23:54 +0000)]
upstream: When testing PKCS11, explicitly allow the module path in

ssh-agent.

Allows testing of PKCS11 modules outside system directories.

From Morgan Jones via GHPR602

OpenBSD-Regress-ID: 548d6e0362a8d9f7d1cc01444b697a00811ff488

4 weeks agoupstream: When loading FIDO2 resident keys, set the comment to the
djm@openbsd.org [Mon, 24 Nov 2025 23:43:10 +0000 (23:43 +0000)]
upstream: When loading FIDO2 resident keys, set the comment to the

FIDO application string. This matches the behaviour of ssh-keygen -K

From Arian van Putten via GHPR608

OpenBSD-Commit-ID: 3fda54b44ed6a8a6f94cd3e39e69c1e672095712

4 weeks agoupstream: pkcs11_fetch_ecdsa_pubkey: use ASN1_STRING accessors
tb@openbsd.org [Sun, 23 Nov 2025 07:04:18 +0000 (07:04 +0000)]
upstream: pkcs11_fetch_ecdsa_pubkey: use ASN1_STRING accessors

In anticipation of davidben and beck making ASN1_STRING opaque in
OpenSSL 4 with the aim of enabling surgery to make the X509 data
structure less bad [1], we need to use dumb accessors to avoid build
breakage. Fortunately only in one spot.

This is OpenSSL 1.1 API and available in all members of the fork family.

ok beck djm

[1]: https://github.com/openssl/openssl/issues/29117

OpenBSD-Commit-ID: 0bcaf691d20624ef43f3515c983cd5aa69547d4f

5 weeks agoUpdate OSSFuzz link to current bug tracker.
Darren Tucker [Fri, 21 Nov 2025 03:28:20 +0000 (14:28 +1100)]
Update OSSFuzz link to current bug tracker.

5 weeks agoAdd VM CI and CIFuzz status badges.
Darren Tucker [Fri, 21 Nov 2025 03:21:07 +0000 (14:21 +1100)]
Add VM CI and CIFuzz status badges.

5 weeks agoupstream: unit tests for sshbuf_get_nulterminated_string()
djm@openbsd.org [Fri, 21 Nov 2025 01:29:27 +0000 (01:29 +0000)]
upstream: unit tests for sshbuf_get_nulterminated_string()

OpenBSD-Regress-ID: cb0af1e4d6dcc94e263942bc4dcf5f4466d1f086

5 weeks agoupstream: add a sshbuf_get_nulterminated_string() function to pull a
djm@openbsd.org [Fri, 21 Nov 2025 01:29:06 +0000 (01:29 +0000)]
upstream: add a sshbuf_get_nulterminated_string() function to pull a

\0- terminated string from a sshbuf. Intended to be used to improve parsing
of SOCKS headers for dynamic forwarding.

ok deraadt; feedback Tim van der Molen

OpenBSD-Commit-ID: cf93d6db4730f7518d5269c279e16b172b484b36

5 weeks agoupstream: Free opts in FAIL_TEST. It should always be NULL anyway so
dtucker@openbsd.org [Thu, 20 Nov 2025 05:07:57 +0000 (05:07 +0000)]
upstream: Free opts in FAIL_TEST. It should always be NULL anyway so

this is a no-op, but it should placate Coverity CID 405064.

OpenBSD-Regress-ID: 06789754de0741f26432c668fad8b9881c14c153

5 weeks agoupstream: Plug leaks while parsing Match blocks. Coverity CID
dtucker@openbsd.org [Thu, 20 Nov 2025 05:10:56 +0000 (05:10 +0000)]
upstream: Plug leaks while parsing Match blocks. Coverity CID

469304, ok djm@

OpenBSD-Commit-ID: f9b79b86879a953ad034e6b92a398265b251bea7

5 weeks agoupstream: Plug leaks while parsing Match blocks. Coverity CID
dtucker@openbsd.org [Thu, 20 Nov 2025 05:10:11 +0000 (05:10 +0000)]
upstream: Plug leaks while parsing Match blocks. Coverity CID

515634, ok miod@ djm@

OpenBSD-Commit-ID: c7932eddecd47e5122e945246a40c56ffa42a546

5 weeks agoPull in rev 1.17 for spelling fix.
Darren Tucker [Tue, 18 Nov 2025 09:14:44 +0000 (20:14 +1100)]
Pull in rev 1.17 for spelling fix.

Prompted by github PR#609 from Edge-Seven.

5 weeks agoupstream: Export XDG_RUNTIME_DIR to child ssh sessions
jca@openbsd.org [Mon, 17 Nov 2025 12:59:29 +0000 (12:59 +0000)]
upstream: Export XDG_RUNTIME_DIR to child ssh sessions

Currently setusercontext(LOGIN_SETALL) does create the directory in
/tmp/run/user, since LOGIN_SETXDGENV is part of LOGIN_SETALL, but the
env variable wasn't exported.

ok djm@

OpenBSD-Commit-ID: 02b8433f72759b3a07b55cbc5a7cdb84391b0017

5 weeks agoupstream: don't strnvis() log messages that are going to be logged
djm@openbsd.org [Mon, 17 Nov 2025 05:24:42 +0000 (05:24 +0000)]
upstream: don't strnvis() log messages that are going to be logged

by sshd-auth via its parent sshd-session process, as the parent will also run
them though strnvis().

Prevents double-escaping of non-printing characters in some log
messages. bz3896 ok dtucker@

OpenBSD-Commit-ID: d78faad96a98af5269d66ddceee553cf7d396dfe

5 weeks agoRemove obsolete CVSID.
Darren Tucker [Mon, 17 Nov 2025 10:36:45 +0000 (21:36 +1100)]
Remove obsolete CVSID.

5 weeks agoupstream: Ensure both sides of the test are non-NULL instead of just
dtucker@openbsd.org [Mon, 17 Nov 2025 09:59:13 +0000 (09:59 +0000)]
upstream: Ensure both sides of the test are non-NULL instead of just

either. Coverity CID 443285.

OpenBSD-Regress-ID: aa90e57b1bc8efce9e50734a07a8ffec0680059a

6 weeks agoMove libcrypto init check into entropy.c.
Darren Tucker [Thu, 13 Nov 2025 12:30:48 +0000 (23:30 +1100)]
Move libcrypto init check into entropy.c.

This prevents link errors with the openbsd-compat tests when the linker
tries to bring in all the logging bits.

6 weeks agoseccomp sandbox: allow uname(3)
Icenowy Zheng [Fri, 7 Nov 2025 06:27:35 +0000 (14:27 +0800)]
seccomp sandbox: allow uname(3)

The uname(3) syscall is utilized by zlib-ng on RISC-V to decide whether
the kernel handles VILL bit of V extension properly (by checking the
kernel version against 6.5).

Allow it in the seccomp sandbox.

Signed-off-by: Icenowy Zheng <uwu@icenowy.me>
6 weeks agoRemove remaining OpenSSL_add_all_algorithms() calls.
Darren Tucker [Thu, 13 Nov 2025 11:04:19 +0000 (22:04 +1100)]
Remove remaining OpenSSL_add_all_algorithms() calls.

We already have OPENSSL_init_crypto() in the compat layer (now with a
check of its return code, prompted by tb@). Prompted by github PR#606
from Dimitri John Ledkov.  ok beck@

6 weeks agoupstream: Remove calls to OpenSSL_add_all_algorithms()
dtucker@openbsd.org [Thu, 13 Nov 2025 10:35:14 +0000 (10:35 +0000)]
upstream: Remove calls to OpenSSL_add_all_algorithms()

and ERR_load_crypto_strings(). These are no-ops in LibreSSL, and in
Portable have been mostly replaced by a call to OPENSSL_init_crypto()
in the compat layer.  ok tb@

OpenBSD-Commit-ID: 4c3e0af10fe276766054eda34428a37a5606d3ea

6 weeks agoupstream: sync support for systems that lack __builtin_popcount() from
djm@openbsd.org [Thu, 13 Nov 2025 05:13:06 +0000 (05:13 +0000)]
upstream: sync support for systems that lack __builtin_popcount() from

portable

unused on OpenBSD (nothing sets MISSING_BUILTIN_POPCOUNT), but it
makes syncing much easier.

OpenBSD-Commit-ID: 496446300d82615b24f83eca886b8fabdbee445b

6 weeks agoupstream: update our ML-KEM implementation to upstream libcrux
djm@openbsd.org [Thu, 13 Nov 2025 04:56:23 +0000 (04:56 +0000)]
upstream: update our ML-KEM implementation to upstream libcrux

v0.0.4

tested/ok tb@

OpenBSD-Commit-ID: 525a62549efbf53492adcb2c57e4872cdbaeed62

6 weeks agoupstream: sshkey_ec_validate_public: zap trailing blank I missed on
tb@openbsd.org [Fri, 7 Nov 2025 06:29:45 +0000 (06:29 +0000)]
upstream: sshkey_ec_validate_public: zap trailing blank I missed on

review

OpenBSD-Commit-ID: b296bd6056f33fd567ca0d5e9123dac1ec00f037

6 weeks agoSimplify git command to avoid yaml syntax error.
Darren Tucker [Wed, 12 Nov 2025 23:23:45 +0000 (10:23 +1100)]
Simplify git command to avoid yaml syntax error.

6 weeks agoDon't use OpenSSL's ed25519 if built without EC.
Darren Tucker [Wed, 12 Nov 2025 22:53:17 +0000 (09:53 +1100)]
Don't use OpenSSL's ed25519 if built without EC.

Explicitly check for OPENSSL_NO_EC, since otherwise the test will link
but then fail at runtime.

7 weeks agooctal-escape the colon character
Damien Miller [Fri, 7 Nov 2025 04:49:55 +0000 (15:49 +1100)]
octal-escape the colon character

Apparently these are YAML magic when followed by whitespace

7 weeks agotry single quotes instead of escaped quotes
Damien Miller [Fri, 7 Nov 2025 04:44:18 +0000 (15:44 +1100)]
try single quotes instead of escaped quotes

7 weeks agoescape quotes in yaml
Damien Miller [Fri, 7 Nov 2025 04:42:57 +0000 (15:42 +1100)]
escape quotes in yaml

7 weeks agoupstream: Escape SSH_AUTH_SOCK paths that are sent to the shell as
djm@openbsd.org [Fri, 7 Nov 2025 04:33:52 +0000 (04:33 +0000)]
upstream: Escape SSH_AUTH_SOCK paths that are sent to the shell as

setenv commands.

Unbreaks ssh-agent for home directory paths that contain whitespace.

Based on fix from Beat Bolli via bz3884; feedback/ok dtucker@

OpenBSD-Commit-ID: aaf06594e299940df8b4c4b9f0a1d14bef427e02

7 weeks agoupstream: sk-dummy.so needs sshlog() stub after ed25519-openssl.c
djm@openbsd.org [Thu, 6 Nov 2025 17:24:28 +0000 (17:24 +0000)]
upstream: sk-dummy.so needs sshlog() stub after ed25519-openssl.c

change

OpenBSD-Regress-ID: 50b7f49021b8085728d0544275e141fb1bf4a2b5

7 weeks agoupstream: unit test for stringlist_append() and stringlist_free()
djm@openbsd.org [Thu, 6 Nov 2025 01:33:26 +0000 (01:33 +0000)]
upstream: unit test for stringlist_append() and stringlist_free()

OpenBSD-Regress-ID: a3a4dae538c831b3810f69abc34ad8504dc3c460

7 weeks agoupstream: link against ed25519-openssl.c instead of ed25519.c
djm@openbsd.org [Thu, 6 Nov 2025 01:33:03 +0000 (01:33 +0000)]
upstream: link against ed25519-openssl.c instead of ed25519.c

OpenBSD-Regress-ID: f789d46e99d2598929e3c2d00b45c47cc3102501

7 weeks agoupstream: Cope with recent changes and don't link hash.c.
anton@openbsd.org [Sat, 1 Nov 2025 05:39:25 +0000 (05:39 +0000)]
upstream: Cope with recent changes and don't link hash.c.

OpenBSD-Regress-ID: 577ef2f36ee592528448e8c0f33499e2e3512054

7 weeks agoupstream: Remove some unnecessary checks in
djm@openbsd.org [Fri, 7 Nov 2025 04:11:59 +0000 (04:11 +0000)]
upstream: Remove some unnecessary checks in

sshkey_ec_validate_public()
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Checking nQ == infinity is not needed for cofactor 1 curves.
Checking x and y coordinates against order is not needed either.

patch from Szilárd Pfeiffer, with further refinement by tb@
ok tb@

OpenBSD-Commit-ID: ef985e2be7c64e215d064757d3fc65eb181e8ede

7 weeks agoupstream: move stringlist_append() and stringlist_free() to misc.c
djm@openbsd.org [Thu, 6 Nov 2025 01:31:11 +0000 (01:31 +0000)]
upstream: move stringlist_append() and stringlist_free() to misc.c

OpenBSD-Commit-ID: 7d047bbff6964b9abbc04e9b3e2e1b4cc1db0aea

7 weeks agoupstream: cleanup file descriptors across PKCS#11 client/helper
djm@openbsd.org [Fri, 31 Oct 2025 01:50:43 +0000 (01:50 +0000)]
upstream: cleanup file descriptors across PKCS#11 client/helper

execution; ok markus

OpenBSD-Commit-ID: 993628a5b361e30aa48bbb4c07667a280f3f23ab

8 weeks agoSupport using git for OpenBSD src tree tests.
Darren Tucker [Fri, 31 Oct 2025 21:34:15 +0000 (08:34 +1100)]
Support using git for OpenBSD src tree tests.

8 weeks agoAdd OpenBSD 7.8 test target.
Darren Tucker [Fri, 31 Oct 2025 21:33:07 +0000 (08:33 +1100)]
Add OpenBSD 7.8 test target.

8 weeks agocheck PAM user against previous user, not pw_name
Damien Miller [Fri, 31 Oct 2025 02:47:49 +0000 (13:47 +1100)]
check PAM user against previous user, not pw_name

Avoids early fatal() if the user doesn't exist.

Reported by Viswesh Narayanan; ok dtucker@

8 weeks agoskip pkcs11 tests when built --without-openssl
Damien Miller [Fri, 31 Oct 2025 01:19:47 +0000 (12:19 +1100)]
skip pkcs11 tests when built --without-openssl

8 weeks agoadd sshlog() replacement to sk-dummy.so
Damien Miller [Fri, 31 Oct 2025 01:19:34 +0000 (12:19 +1100)]
add sshlog() replacement to sk-dummy.so

8 weeks agorename openbsd-compat sha2.h -> bsd-sha2.h
Damien Miller [Fri, 31 Oct 2025 00:16:29 +0000 (11:16 +1100)]
rename openbsd-compat sha2.h -> bsd-sha2.h

avoids confusion with system header when included from files under
openbsd-compat/

8 weeks agofix linking for sk-dummy.so, used in tests
Damien Miller [Fri, 31 Oct 2025 00:07:17 +0000 (11:07 +1100)]
fix linking for sk-dummy.so, used in tests

8 weeks agoupstream: don't link hash.c
djm@openbsd.org [Thu, 30 Oct 2025 23:55:09 +0000 (23:55 +0000)]
upstream: don't link hash.c

OpenBSD-Regress-ID: a145f09c1efb1fcd3924544463f1f94f5d4805c0

8 weeks agoupstream: Prepare for gcc 3 leaving the building, COMPILER_VERSION
miod@openbsd.org [Thu, 23 Oct 2025 19:06:10 +0000 (19:06 +0000)]
upstream: Prepare for gcc 3 leaving the building, COMPILER_VERSION

can no longer get set to "gcc3".

OpenBSD-Regress-ID: 02351ea947975b80be60b9a8c6e4dbb57789e890

8 weeks agoupstream: Check tmux version and skip if too old. ok djm@
dtucker@openbsd.org [Thu, 23 Oct 2025 06:15:26 +0000 (06:15 +0000)]
upstream: Check tmux version and skip if too old. ok djm@

OpenBSD-Regress-ID: fb62024eb753c61b4d78402ec8378af839fad26c

8 weeks agoupstream: move crypto_hash_sha512() to be inline in crypto_api.h, saves
djm@openbsd.org [Thu, 30 Oct 2025 23:19:33 +0000 (23:19 +0000)]
upstream: move crypto_hash_sha512() to be inline in crypto_api.h, saves

about 0.5kb per binary and makes life easier for portable; with/ok dtucker@

OpenBSD-Commit-ID: 672d7390f78bb6581c12661d7f5adc8a9c6be564

8 weeks agoupstream: support ed25519 signatures via libcrypto. Mostly by Jeremy
djm@openbsd.org [Thu, 30 Oct 2025 20:49:10 +0000 (20:49 +0000)]
upstream: support ed25519 signatures via libcrypto. Mostly by Jeremy

Allison Feedback tb@, ok tb@ markus@

OpenBSD-Commit-ID: e8edf8adffd5975d05769dde897df882d7933526

8 weeks agoupstream: Activate UnusedConnectionTimeout only after last channel
djm@openbsd.org [Thu, 30 Oct 2025 03:19:54 +0000 (03:19 +0000)]
upstream: Activate UnusedConnectionTimeout only after last channel

has closed. Previously UnusedConnectionTimeout could fire early after a
ChannelTimeout.

This was not a problem for the OpenSSH client because it terminates
once all channels have closed but could cause problems for other
clients (e.g. API clients) that do things differently.

bz3827; ok dtucker

OpenBSD-Commit-ID: ff2e4607cbd4e600de3c8a5ece3b0e4bb641ed8f

8 weeks agoupstream: Prepare for gcc 3 leaving the building, COMPILER_VERSION
miod@openbsd.org [Thu, 23 Oct 2025 19:06:10 +0000 (19:06 +0000)]
upstream: Prepare for gcc 3 leaving the building, COMPILER_VERSION

can no longer get set to "gcc3".

OpenBSD-Commit-ID: 98eefed432ff8253b307002e20d28da14b93e7e3

2 months agoupstream: more explicit synchronisation around killing tmux sessions
djm@openbsd.org [Wed, 22 Oct 2025 06:22:58 +0000 (06:22 +0000)]
upstream: more explicit synchronisation around killing tmux sessions

between runs.

OpenBSD-Regress-ID: 1735f5cb13ad281e869ab998c7d49b692ee3ed47

2 months agoupstream: remove debugging junk
djm@openbsd.org [Wed, 22 Oct 2025 05:22:31 +0000 (05:22 +0000)]
upstream: remove debugging junk

OpenBSD-Regress-ID: 3247e0ac98ae4cfe4eede871ef424d166e29e828

2 months agoupstream: just skip the test if $PATH or $HOME has whitespace in it
djm@openbsd.org [Tue, 21 Oct 2025 23:30:01 +0000 (23:30 +0000)]
upstream: just skip the test if $PATH or $HOME has whitespace in it

OpenBSD-Regress-ID: ccf75a29d1a300a35f63be0e4f11ad5276756275

2 months agoupstream: quote paths; avoids test failure when run from a path with a
djm@openbsd.org [Tue, 21 Oct 2025 22:13:27 +0000 (22:13 +0000)]
upstream: quote paths; avoids test failure when run from a path with a

space in it

OpenBSD-Regress-ID: e4b7bffc289f10d47c50c02dd70b0323078a83b4

2 months agoupstream: fix test for executability of tmux
djm@openbsd.org [Tue, 21 Oct 2025 08:35:22 +0000 (08:35 +0000)]
upstream: fix test for executability of tmux

OpenBSD-Regress-ID: a18119876ecfd95edb78225b086ac668eb0977ab

2 months agoupstream: add some more synchronisation to avoid a race between
djm@openbsd.org [Tue, 21 Oct 2025 08:34:52 +0000 (08:34 +0000)]
upstream: add some more synchronisation to avoid a race between

command entry and ^C that showed up on the portable regress tests.

OpenBSD-Regress-ID: 5527e74aed1b008aa7e5223ca5a84aedecd973d4

2 months agoupstream: Always create logfiles. Should prevent "can't operate on
dtucker@openbsd.org [Tue, 21 Oct 2025 07:18:27 +0000 (07:18 +0000)]
upstream: Always create logfiles. Should prevent "can't operate on

symlink" warnings during test runs.

OpenBSD-Regress-ID: 65cf5ce3c8b87b5609f1f3ea142b4f381128dc33

2 months agobsd-openpty: include stdio.h for snprintf
Mike Frysinger [Sun, 19 Oct 2025 13:33:23 +0000 (09:33 -0400)]
bsd-openpty: include stdio.h for snprintf

2 months agoinclude tmux in CI package list
Damien Miller [Mon, 20 Oct 2025 22:14:35 +0000 (09:14 +1100)]
include tmux in CI package list

2 months agoDetect tmux at configure time and pass to tests.
Darren Tucker [Mon, 20 Oct 2025 07:31:08 +0000 (18:31 +1100)]
Detect tmux at configure time and pass to tests.

ok djm@

2 months agoUpdate LibreSSL versions and add 4.2.0.
Darren Tucker [Mon, 20 Oct 2025 07:29:24 +0000 (18:29 +1100)]
Update LibreSSL versions and add 4.2.0.

2 months agoupstream: regression test for "interactive" ssh with a PTY attached,
djm@openbsd.org [Mon, 20 Oct 2025 00:45:10 +0000 (00:45 +0000)]
upstream: regression test for "interactive" ssh with a PTY attached,

using tmux

would have likely caught the ControlPersist regression in 10.1.

feedback nicm@

OpenBSD-Regress-ID: d4d709c08657769cb5691893cc98f34b6f537e76

2 months agoRetire macos-13 runners, add Intel-specific ones.
Darren Tucker [Fri, 17 Oct 2025 05:26:22 +0000 (16:26 +1100)]
Retire macos-13 runners, add Intel-specific ones.

2 months agoIf we have nfds_t, check if it's int or long.
Darren Tucker [Fri, 17 Oct 2025 05:23:43 +0000 (16:23 +1100)]
If we have nfds_t, check if it's int or long.

Should fix build on very old Mac OS X, eg 10.3.  Spotted and patch tested
by Sevan Janiyan.

2 months agolink ssh against ssh-pkcs11.o
Damien Miller [Thu, 16 Oct 2025 00:15:16 +0000 (11:15 +1100)]
link ssh against ssh-pkcs11.o

Should fix PIN entry for direct use of PKCS11Provider in ssh(1)
bz3879

2 months agoupstream: regress test for PKCS#11 directly in ssh (not via ssh-agent)
djm@openbsd.org [Thu, 16 Oct 2025 00:01:54 +0000 (00:01 +0000)]
upstream: regress test for PKCS#11 directly in ssh (not via ssh-agent)

would have caught bz3879

OpenBSD-Regress-ID: ceafb1e9a6c07185cc0cb0589f3170489a516123

2 months agoupstream: missed a case in previous
djm@openbsd.org [Thu, 16 Oct 2025 00:00:36 +0000 (00:00 +0000)]
upstream: missed a case in previous

OpenBSD-Commit-ID: 271c5602b5e719ee3def19dbd9a33328b4fa7edc

2 months agoupstream: don't try to pledge() the client if a PKCS11Provider is
djm@openbsd.org [Wed, 15 Oct 2025 23:55:01 +0000 (23:55 +0000)]
upstream: don't try to pledge() the client if a PKCS11Provider is

in use

OpenBSD-Commit-ID: 445b2bf4b1e36e515f4d888f35244fd2dcfbb566

2 months agoupstream: mention this is for both ssh-pkcs11.c and
djm@openbsd.org [Wed, 15 Oct 2025 23:54:20 +0000 (23:54 +0000)]
upstream: mention this is for both ssh-pkcs11.c and

ssh-pkcs11-client.c

OpenBSD-Commit-ID: 26eff4b9a328fa056e98b997cb57254639e48fda

2 months agomdoc2man: process `Dl` macros
Arnout Engelen [Sat, 21 Jun 2025 07:47:28 +0000 (09:47 +0200)]
mdoc2man: process `Dl` macros

`Dl` marks a single line as 'literal'. Since we don't output single
lines differently in literal vs regular mode (we only insert line
breaks for multi-line blocks in literal mode), we can just skip it.

2 months agomdoc2man: support `Ns` inside `Ic`
Arnout Engelen [Fri, 20 Jun 2025 19:36:44 +0000 (21:36 +0200)]
mdoc2man: support `Ns` inside `Ic`

When encountering an `Ns` mdoc macro ('no space') inside an `Ic` block
('command'), such as for 'lines=number' in ssh-keygen.1, `mdoc2man`
just output the macro instead of processing it.

This adds processing for `Ns` when seen inside an `Ic` block.

2 months agogitignore: ignore all *~ files
Mike Frysinger [Mon, 13 Oct 2025 15:29:36 +0000 (11:29 -0400)]
gitignore: ignore all *~ files

This is a common backup style.

2 months agobsd-misc: include sys/ioctl.h
Mike Frysinger [Mon, 13 Oct 2025 16:49:24 +0000 (12:49 -0400)]
bsd-misc: include sys/ioctl.h

This file uses ioctl() to implement some fallback functions, but
doesn't include sys/ioctl.h for it.

2 months agodon't leak PAM handle on repeat invocations
Damien Miller [Tue, 14 Oct 2025 03:52:50 +0000 (14:52 +1100)]
don't leak PAM handle on repeat invocations

Reported by Casper Dik via bz3882; ok dtucker@

2 months agoSwitch OpenBSD VMs to use doas instead of sudo.
Darren Tucker [Mon, 13 Oct 2025 08:02:45 +0000 (19:02 +1100)]
Switch OpenBSD VMs to use doas instead of sudo.

OpenBSD 7.3 packages have been removed from the mirrors so we can't
install sudo for it any more, so switch to the native doas utility.

2 months agocheck whether diff accepts -N
Damien Miller [Mon, 13 Oct 2025 03:33:04 +0000 (14:33 +1100)]
check whether diff accepts -N

2 months agoupstream: test remote/remote recursive transfers where the source
djm@openbsd.org [Mon, 13 Oct 2025 00:56:15 +0000 (00:56 +0000)]
upstream: test remote/remote recursive transfers where the source

path ends in ".."

OpenBSD-Regress-ID: 2f42078cfcee986d08b5d135968b8de6186c0003

2 months agoupstream: test recursive transfers, including cases where the
djm@openbsd.org [Mon, 13 Oct 2025 00:55:45 +0000 (00:55 +0000)]
upstream: test recursive transfers, including cases where the

source path ends in ".."

OpenBSD-Regress-ID: a38e3dbc86f6b7a95605784dcc601f17ede9c3f0

2 months agoupstream: test implicit destination path selection when source path
djm@openbsd.org [Mon, 13 Oct 2025 00:55:09 +0000 (00:55 +0000)]
upstream: test implicit destination path selection when source path

ends with ".."

OpenBSD-Regress-ID: 42a88e7cdceee8a83879f5730199084ee4a95902

2 months agoupstream: similar to scp, fix implicit destination path selection
djm@openbsd.org [Mon, 13 Oct 2025 00:54:29 +0000 (00:54 +0000)]
upstream: similar to scp, fix implicit destination path selection

when source path ends with ".."; ok deraadt@

OpenBSD-Commit-ID: 9b8d2a662d96b241293a88b3ea21f2419bfc4812

2 months agoupstream: when using the SFTP protocol for transfers, fix implicit
djm@openbsd.org [Mon, 13 Oct 2025 00:53:51 +0000 (00:53 +0000)]
upstream: when using the SFTP protocol for transfers, fix implicit

destination path selection when source path ends with ".."; ok deraadt@
bz3871

OpenBSD-Commit-ID: d75b3b006386c5302ed4f67c4add18464ab36a0b

2 months agoupstream: Import regenerate moduli.
dtucker@openbsd.org [Sat, 11 Oct 2025 23:39:14 +0000 (23:39 +0000)]
upstream: Import regenerate moduli.

OpenBSD-Commit-ID: 8512e01cf917dca6455be561d66db8eeb49f3f0b

2 months agodepend
Damien Miller [Fri, 10 Oct 2025 04:23:59 +0000 (15:23 +1100)]
depend

2 months agoupstream: clean up more thoroughly between tests
djm@openbsd.org [Fri, 10 Oct 2025 00:31:53 +0000 (00:31 +0000)]
upstream: clean up more thoroughly between tests

OpenBSD-Regress-ID: c8394eae7547374a8fc43d03d865539e2917ea50

2 months agoupstream: simplify
djm@openbsd.org [Thu, 9 Oct 2025 23:58:27 +0000 (23:58 +0000)]
upstream: simplify

OpenBSD-Regress-ID: 8e91a2a5c1eb50128de3be72118b544d73a86673

2 months agoupstream: don't abuse SSHKEY_FLAG_EXT to signal that a key is in
djm@openbsd.org [Thu, 9 Oct 2025 23:26:47 +0000 (23:26 +0000)]
upstream: don't abuse SSHKEY_FLAG_EXT to signal that a key is in

the agent, as that triggers special handling on sshkey_free()

OpenBSD-Commit-ID: 2ae2247babd2db167a30cf7a4f7eae4f26c000a8

2 months agoupstream: downgrade a useless error() -> debug()
djm@openbsd.org [Thu, 9 Oct 2025 23:25:23 +0000 (23:25 +0000)]
upstream: downgrade a useless error() -> debug()

OpenBSD-Commit-ID: 5b0c9bcddb324f8bed2c8e8ffe9c92d263adc2d9

2 months agoupstream: silence "mm_log_handler: write: Broken pipe" logspam
djm@openbsd.org [Thu, 9 Oct 2025 03:23:33 +0000 (03:23 +0000)]
upstream: silence "mm_log_handler: write: Broken pipe" logspam

OpenBSD-Commit-ID: bcf7c6ea509e755bd5a7cd567ff7cad725111a14

2 months agoAdd tracking for 10.2 branch.
Darren Tucker [Thu, 9 Oct 2025 06:57:17 +0000 (17:57 +1100)]
Add tracking for 10.2 branch.

2 months agocomplete PKCS#11 stubs and move to ssh-pkcs11.c
Damien Miller [Thu, 9 Oct 2025 02:12:15 +0000 (13:12 +1100)]
complete PKCS#11 stubs and move to ssh-pkcs11.c

Should unbreak --disable-pkcs11 builds

2 months agosome fixes to p11_setup
Damien Miller [Thu, 9 Oct 2025 02:10:27 +0000 (13:10 +1100)]
some fixes to p11_setup

1. Use the ssh-keygen under test and not the one in $PATH
2. Include a test PKCS#11 operation to ensure that the P11 stack is
   working correctly.

Previously, it was possible for p11_setup to return success on
configurations with PKCS#11 support disabled.

2 months agolink ssh-keygen directly against ssh-pkcs11.c
Damien Miller [Wed, 8 Oct 2025 23:07:40 +0000 (10:07 +1100)]
link ssh-keygen directly against ssh-pkcs11.c

Matches what OpenBSD does and fixes ssh-keygen regression in
certifying keys using a CA key hosted via ssh-agent (bz3877)

2 months agoupstream: When tab-completing a filename, ensure that the completed
djm@openbsd.org [Wed, 8 Oct 2025 21:48:40 +0000 (21:48 +0000)]
upstream: When tab-completing a filename, ensure that the completed

string does not end up mid-way through a multibyte character, as this will
cause a fatal() later on.

based on GHPR#587 from @TaoistBrickscarrier; feedback tb@ kevlo@
ok dtucker@

OpenBSD-Commit-ID: efb977164b4e20d61204a66201a7592ba8291362

2 months agoupstream: fix crash at exit (visible via ssh-keygen -D) when
djm@openbsd.org [Wed, 8 Oct 2025 21:02:16 +0000 (21:02 +0000)]
upstream: fix crash at exit (visible via ssh-keygen -D) when

multiple keys loaded. ok markus deraadt dtucker

OpenBSD-Commit-ID: baa9763ec69d162108dafd962792ec5610ff45c9

2 months agoupstream: openssh-10.2
djm@openbsd.org [Wed, 8 Oct 2025 00:32:52 +0000 (00:32 +0000)]
upstream: openssh-10.2

The only change since 10.1 is the channels.c fix

OpenBSD-Commit-ID: 5eebeb0db14c694efd4ee96b5f16112e3e5d5ba9

2 months agoFix header name and move return outside of ifdef.
Darren Tucker [Wed, 8 Oct 2025 00:26:52 +0000 (11:26 +1100)]
Fix header name and move return outside of ifdef.

Fixes from Mike Frysinger via Github PR#597.

2 months agoCheck HAVE_MMAP too now that configure sets it.
Darren Tucker [Tue, 7 Oct 2025 10:10:33 +0000 (21:10 +1100)]
Check HAVE_MMAP too now that configure sets it.

2 months agoUse calloc for sshkeys if mmap is not supported.
Darren Tucker [Tue, 7 Oct 2025 10:07:05 +0000 (21:07 +1100)]
Use calloc for sshkeys if mmap is not supported.

Based on Github PR#597 from Mike Frysinger, any bugs added by me.

2 months agoAdd fcntl.h to includes.
Darren Tucker [Tue, 7 Oct 2025 09:25:07 +0000 (20:25 +1100)]
Add fcntl.h to includes.

From FreeBSD via bz#3874: "This was previously included due to nested
includes in Heimdal's headers.  Without this, the build fails with an
error due to redefining AT_FDCWD."