summaryrefslogtreecommitdiffstats
path: root/sshpty.c (unfollow)
Commit message (Collapse)AuthorFilesLines
2020-12-22whitespace at EOLDamien Miller1-4/+4
2020-12-22whitespace at EOLDamien Miller1-1/+1
2020-12-22Improve AIX text.Darren Tucker1-8/+8
2020-12-22Include stdio.h for FILE in misc.h.Darren Tucker2-0/+2
Fixes build on at least OpenBSD.
2020-12-22ensure $LOGNAME is set in testsDamien Miller1-0/+4
2020-12-22upstream: more detail for failing testsdjm@openbsd.org1-3/+3
OpenBSD-Regress-ID: c68c0e5a521cad7e7f68e54c54ebf86d6c10ee1d
2020-12-22upstream: regress test for KnownHostsCommanddjm@openbsd.org2-4/+58
OpenBSD-Regress-ID: ffc77464320b6dabdcfa0a72e0df02659233a38a
2020-12-22upstream: Remove lines accidentally left behind in the ProxyJumptb@openbsd.org1-4/+1
parsing fix r1.345. ok djm OpenBSD-Commit-ID: fe767c108c8117bea33767b080ff62eef2c55f5c
2020-12-22upstream: add a ssh_config KnownHostsCommand that allows the clientdjm@openbsd.org7-16/+188
to obtain known_hosts data from a command in addition to the usual files. The command accepts bunch of %-expansions, including details of the connection and the offered server host key. Note that the command may be invoked up to three times per connection (see the manpage for details). ok markus@ OpenBSD-Commit-ID: 2433cff4fb323918ae968da6ff38feb99b4d33d0
2020-12-22upstream: move subprocess() from auth.c to misc.cdjm@openbsd.org5-167/+190
make privilege dropping optional but allow it via callbacks (to avoid need to link uidswap.c everywhere) add some other flags (keep environment, disable strict path safety check) that make this more useful for client-side use. feedback & ok markus@ OpenBSD-Commit-ID: a80ea9fdcc156f1a18e9c166122c759fae1637bf
2020-12-22upstream: Remove explicit rijndael-cbc@lysator.liu.se test since thedtucker@openbsd.org1-2/+2
cipher was removed. OpenBSD-Regress-ID: aa93cddb4ecd9bc21446a79008a1a53050e64f17
2020-12-21upstream: Remove the pre-standardization cipherdtucker@openbsd.org1-3/+1
rijndael-cbc@lysator.liu.se. It is an alias for aes256-cbc which was standardized in RFC4253 (2006), has been deprecated and disabled by default since OpenSSH 7.2 (2016) and was only briefly documented in ssh.1 in 2001. This will reduce the amount of work the cipher/kex regression tests need to do by a little bit. ok markus@ djm@ OpenBSD-Commit-ID: fb460acc18290a998fd70910b19c29b4e4f199ad
2020-12-21upstream: properly fix ProxyJump parsing; Thanks to tb@ fordjm@openbsd.org1-4/+9
pointing out my error (parse_ssh_uri() can return -1/0/1, that I missed). Reported by Raf Czlonka via bugs@ ok tb@ OpenBSD-Commit-ID: a2991a3794bcaf1ca2b025212cce11cdb5f6b7d6
2020-12-21upstream: adapt to API change in hostkeys_foreach()/load_hostkeys()djm@openbsd.org1-19/+72
OpenBSD-Regress-ID: dcb468514f32da49a446372453497dc6eeafdbf3
2020-12-21upstream: few more things needs match.c and addrmatch.c now thatdjm@openbsd.org3-3/+7
log.c calls match_pattern_list() OpenBSD-Regress-ID: f7c95c76b150d0aeb00a67858b9579b7d1b2db74
2020-12-21Pull in missing rev 1.2.Darren Tucker1-4/+11
2020-12-21upstream: plumb ssh_conn_info through to sshconnect.c; feedback/okdjm@openbsd.org4-53/+57
markus@ OpenBSD-Commit-ID: e8d14a09cda3f1dc55df08f8a4889beff74e68b0
2020-12-21upstream: allow UserKnownHostsFile=none; feedback and ok markus@djm@openbsd.org2-13/+35
OpenBSD-Commit-ID: c46d515eac94a35a1d50d5fd71c4b1ca53334b48
2020-12-21upstream: load_hostkeys()/hostkeys_foreach() variants for FILE*djm@openbsd.org7-34/+76
Add load_hostkeys_file() and hostkeys_foreach_file() that accept a FILE* argument instead of opening the file directly. Original load_hostkeys() and hostkeys_foreach() are implemented using these new interfaces. Add a u_int note field to the hostkey_entry and hostkey_foreach_line structs that is passed directly from the load_hostkeys() and hostkeys_foreach() call. This is a lightweight way to annotate results between different invocations of load_hostkeys(). ok markus@ OpenBSD-Commit-ID: 6ff6db13ec9ee4edfa658b2c38baad0f505d8c20
2020-12-21upstream: Print client kem key with correct length.tobhe@openbsd.org1-2/+2
ok markus@ OpenBSD-Commit-ID: 91689e14a4fc6c270e265a32d1c8faba63a45755
2020-12-21upstream: fix possible error("%s", NULL) on error pathsdjm@openbsd.org1-3/+3
OpenBSD-Commit-ID: 0b3833c2cb985453ecca1d76803ebb8f3b736a11
2020-12-21upstream: refactor client percent_expand() argument passing;djm@openbsd.org2-66/+95
consolidate the common arguments into a single struct and pass that around instead of using a bunch of globals. ok markus@ OpenBSD-Commit-ID: 035e6d7ca9145ad504f6af5a021943f1958cd19b
2020-12-21upstream: prepare readconf.c for fuzzing; remove fatal calls anddjm@openbsd.org4-161/+412
fix some (one-off) memory leaks; ok markus@ OpenBSD-Commit-ID: 91c6aec57b0e7aae9190de188e9fe8933aad5ec5
2020-12-14upstream: use _PATH_SSH_USER_DIR instead of hardcoded .ssh in pathdjm@openbsd.org1-3/+3
OpenBSD-Commit-ID: 5c1048468813107baa872f5ee33ba51623630e01
2020-12-04basic KEX fuzzer; adapted from Markus' unittestDamien Miller2-1/+525
2020-12-04use options that work with recent clangDamien Miller1-2/+2
2020-12-04upstream: shuffle a few utility functions into sftp-client.c; fromdjm@openbsd.org3-55/+69
Jakub Jelen OpenBSD-Commit-ID: fdeb1aae1f6149b193f12cd2af158f948c514a2a
2020-12-04upstream: make ssh_free(NULL) a no-opdjm@openbsd.org1-1/+4
OpenBSD-Commit-ID: 42cb285d94789cefe6608db89c63040ab0a80fa0
2020-12-04upstream: memleak of DH public bignum; found with libfuzzerdjm@openbsd.org1-1/+2
OpenBSD-Commit-ID: 0e913b542c3764b100b1571fdb0d0e5cc086fe97
2020-12-04upstream: fix minor memleak of kex->hostkey_alg on rekexdjm@openbsd.org1-1/+2
OpenBSD-Commit-ID: 2c3969c74966d4ccdfeff5e5f0df0791919aef50
2020-12-04upstream: typos: s/hex/kex/ in error messagesdjm@openbsd.org1-3/+3
OpenBSD-Commit-ID: 43a026c9571dd779ec148de1829cf5a6b6651905
2020-12-04upstream: make program name be constdjm@openbsd.org2-5/+6
OpenBSD-Commit-ID: ece25680ec637fdf20502721ccb0276691df5384
2020-12-04upstream: Ignore comments at the end of config lines in ssh_config,dtucker@openbsd.org1-2/+9
similar to what we already do for sshd_config. bz#2320, with & ok djm@ OpenBSD-Commit-ID: bdbf9fc5bc72b1a14266f5f61723ed57307a6db4
2020-11-28upstream: Include cipher.h for declaration of cipher_by_name.dtucker@openbsd.org1-1/+2
OpenBSD-Commit-ID: ddfebbca03ca0e14e00bbad9d35f94b99655d032
2020-11-28upstream: check result of strchr() against NULL rather thandjm@openbsd.org1-2/+2
searched-for characters; from zhongjubin@huawei.com OpenBSD-Commit-ID: e6f57de1d4a4d25f8db2d44e8d58d847e247a4fe
2020-11-27upstream: Document ssh-keygen -Z, sanity check its argument earlier anddtucker@openbsd.org2-5/+17
provide a better error message if it's not correct. Prompted by bz#2879, ok djm@ jmc@ OpenBSD-Commit-ID: 484178a173e92230fb1803fb4f206d61f7b58005
2020-11-27upstream: Set the specified TOS/DSCP for interactive use prior todjm@openbsd.org4-41/+68
TCP connect. The connection phase of the SSH session is time-sensitive (due to server side login grace periods) and is frequently interactive (e.g. entering passwords). The ultimate interactive/bulk TOS/DSCP will be set after authentication completes. ok dtucker@ OpenBSD-Commit-ID: f31ab10d9233363a6d2c9996007083ba43a093f1
2020-11-27upstream: clean up passing of struct passwd from monitor to preauthdjm@openbsd.org2-13/+38
privsep process. No longer copy entire struct w/ pointer addresses, but pass remaining scalar fields explicitly, Prompted by Yuichiro NAITO, feedback Thorsten Glaser; ok dtucker@ OpenBSD-Commit-ID: 9925df75a56732c43f3663e70dd15ff413ab3e53
2020-11-27upstream: when loading PKCS#11 keys, include the key fingerprintsdjm@openbsd.org1-3/+22
and provider/slot information in debug output. OpenBSD-Commit-ID: 969a089575d0166a9a364a9901bb6a8d9b8a1431
2020-11-27upstream: when mentioning that the host key has changed, don'tdjm@openbsd.org1-3/+3
report the type because it is ambiguous as to whether it referred to the known or new host key. bz3216; ok dtucker@ OpenBSD-Commit-ID: 2d5ce4a83dbcf44e340a572e361decad8aab7bad
2020-11-25Use "=" not "==" in string test.Darren Tucker1-1/+1
POSIX says "=" is string comparison and some shells (eg HP-UX) will complain about "==".
2020-11-20Restore correct flags during localtime_r check.Darren Tucker1-1/+1
We were restoring the wrong thing CPPFLAGS (we used CFLAGS) for any platform that doesn't have localtime_r.
2020-11-20upstream: When doing an sftp recursive upload or download of adtucker@openbsd.org1-6/+16
read-only directory, ensure that the directory is created with write and execute permissions in the interim so that we can actually complete the transfer, then set the directory permission as the final step. (The execute bit is only likely to be an issue with a non-POSIX server). bz#3222, ok djm@ OpenBSD-Commit-ID: a82606212f2796e31f0e1af94a63355a7ad5d903
2020-11-20Add new pselect6_time64 syscall on ARM.Darren Tucker1-0/+3
This is apparently needed on armhfp/armv7hl. bz#3232, patch from jjelen at redhat.com.
2020-11-20upstream: Explicitly initialize all members of thedtucker@openbsd.org1-2/+2
find_by_key_ctx struct. Initializing a single member should be enough (the spec says the remainder should be initialized as per the static rules) but some GCCs warn on this which prevents us testing with -Werror on those. ok deraadt@ djm@ OpenBSD-Commit-ID: 687126e60a27d30f02614760ef3c3ae4e8d6af28
2020-11-20upstream: draft-ietf-secsh-architecture is now RFC4251.dtucker@openbsd.org1-2/+2
OpenBSD-Commit-ID: cb0bb58c2711fb5ed519507659be1dcf179ed403
2020-11-17upstream: Specify that the KDF function is bcrypt. Based on githubdtucker@openbsd.org1-3/+5
PR#214 from rafork, ok markus@, mdoc correction jmc@ OpenBSD-Commit-ID: d8f2853e7edbcd483f31b50da77ab80ffa18b4ef
2020-11-15upstream: revert r1.341; it breaks ProxyJump; reported by sthen@djm@openbsd.org1-3/+3
OpenBSD-Commit-ID: 6ac2f945b26cb86d936eed338f77861d6da8356a
2020-11-13upstream: scrub keyboard-interactive authentication prompts comingdjm@openbsd.org1-3/+5
from the server through asmprintf() prior to display; suggested by and ok dtucker@ OpenBSD-Commit-ID: 31fe93367645c37fbfe4691596bf6cf1e3972a58
2020-11-13upstream: prefix keyboard interactive prompts with (user@host) todjm@openbsd.org1-7/+12
make it easier to determine which connection they are associated with in cases like scp -3, ProxyJump, etc. bz#3224 ok dtucker OpenBSD-Commit-ID: 67e6189b04b46c867662f8a6759cf3ecb5f59170