summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* - djm@cvs.openbsd.org 2013/12/07 08:08:26Damien Miller2013-12-182-7/+30
| | | | | [ssh-keygen.1] document -a and -o wrt new key format
* - (djm) [Makefile.in regress/Makefile regress/agent-ptrace.sh]Damien Miller2013-12-085-2/+75
| | | | | [regress/setuid-allowed.c] Check that ssh-agent is not on a no-setuid filesystem before running agent-ptrace.sh; ok dtucker
* - (djm) [openbsd-compat/bsd-setres_id.c] Missing header; from CorinnaDamien Miller2013-12-082-1/+6
| | | | Vinschen
* - (djm) [Makefile.in] PATHSUBS and keygen bits for Ed25519; fromDamien Miller2013-12-072-1/+10
| | | | Loganaden Velvindron @ AfriNIC in bz#2179
* - (djm) [regress/cert-hostkey.sh] Fix merge botchDamien Miller2013-12-072-3/+6
|
* - markus@cvs.openbsd.org 2013/12/06 13:52:46Damien Miller2013-12-076-40/+63
| | | | | | [regress/Makefile regress/agent.sh regress/cert-hostkey.sh] [regress/cert-userkey.sh regress/keytype.sh] test ed25519 support; from djm@
* - (djm) [ed25519.c ssh-ed25519.c openbsd-compat/Makefile.in]Damien Miller2013-12-075-33/+31
| | | | | [openbsd-compat/bcrypt_pbkdf.c] Make ed25519/new key format compile on Linux
* - [configure.ac openbsd-compat/Makefile.in openbsd-compat/bcrypt_pbkdf.c]Damien Miller2013-12-077-5/+979
| | | | | | [openbsd-compat/blf.h openbsd-compat/blowfish.c] [openbsd-compat/openbsd-compat.h] Start at supporting bcrypt_pbkdf in portable.
* - [authfile.c] Conditionalise inclusion of util.hDamien Miller2013-12-072-0/+3
|
* - [Makefile.in] Add ed25519 sourcesDamien Miller2013-12-073-4/+8
|
* - djm@cvs.openbsd.org 2013/12/07 00:19:15Damien Miller2013-12-072-1/+5
| | | | | [key.c] set k->cert = NULL after freeing it
* - [blocks.c ed25519.c fe25519.c fe25519.h ge25519.c ge25519.h]Damien Miller2013-12-0712-11/+13
| | | | [ge25519_base.data hash.c sc25519.c sc25519.h verify.c] Fix RCS idents
* - jmc@cvs.openbsd.org 2013/12/06 15:29:07Damien Miller2013-12-072-2/+5
| | | | | [sshd.8] missing comma;
* - markus@cvs.openbsd.org 2013/12/06 13:39:49Damien Miller2013-12-0731-55/+2932
| | | | | | | | | | | | [authfd.c authfile.c key.c key.h myproposal.h pathnames.h readconf.c] [servconf.c ssh-agent.c ssh-keygen.c ssh-keyscan.1 ssh-keyscan.c] [ssh-keysign.c ssh.c ssh_config.5 sshd.8 sshd.c verify.c ssh-ed25519.c] [sc25519.h sc25519.c hash.c ge25519_base.data ge25519.h ge25519.c] [fe25519.h fe25519.c ed25519.c crypto_api.h blocks.c] support ed25519 keys (hostkeys and user identities) using the public domain ed25519 reference code from SUPERCOP, see http://ed25519.cr.yp.to/software.html feedback, help & ok djm@
* - markus@cvs.openbsd.org 2013/12/06 13:34:54Damien Miller2013-12-0710-50/+505
| | | | | | | [authfile.c authfile.h cipher.c cipher.h key.c packet.c ssh-agent.c] [ssh-keygen.c PROTOCOL.key] new private key format, bcrypt as KDF by default; details in PROTOCOL.key; feedback and lots help from djm; ok djm@
* - markus@cvs.openbsd.org 2013/12/06 13:30:08Damien Miller2013-12-075-178/+213
| | | | | [authfd.c key.c key.h ssh-agent.c] move private key (de)serialization to key.c; ok djm
* - djm@cvs.openbsd.org 2013/12/06 03:40:51Damien Miller2013-12-072-2/+8
| | | | | | | [ssh-keygen.c] remove duplicated character ('g') in getopt() string; document the (few) remaining option characters so we don't have to rummage next time.
* - djm@cvs.openbsd.org 2013/12/05 22:59:45Damien Miller2013-12-072-21/+28
| | | | | | [sftp-client.c] fix memory leak in error path in do_readdir(); pointed out by Loganaden Velvindron @ AfriNIC in bz#2163
* - djm@cvs.openbsd.org 2013/12/05 01:16:41Damien Miller2013-12-053-22/+29
| | | | | | | [servconf.c servconf.h] bz#2161 - fix AuthorizedKeysCommand inside a Match block and rearrange things so the same error is harder to make next time; with and ok dtucker@
* - (dtucker) [configure.ac] bz#2173: use pkg-config --libs to include correctDarren Tucker2013-12-052-3/+5
| | | | -L location for libedit. Patch from Serge van den Boom.
* - djm@cvs.openbsd.org 2013/12/04 04:20:01Damien Miller2013-12-052-1/+7
| | | | | | [sftp-client.c] bz#2171: don't leak local_fd on error; from Loganaden Velvindron @ AfriNIC
* - djm@cvs.openbsd.org 2013/12/02 03:13:14Damien Miller2013-12-052-2/+8
| | | | | | | | [cipher.c] correct bzero of chacha20+poly1305 key context. bz#2177 from Loganaden Velvindron @ AfriNIC Also make it a memset for consistency with the rest of cipher.c
* - djm@cvs.openbsd.org 2013/12/02 03:09:22Damien Miller2013-12-052-1/+9
| | | | | | [key.c] make key_to_blob() return a NULL blob on failure; part of bz#2175 from Loganaden Velvindron @ AfriNIC
* - djm@cvs.openbsd.org 2013/12/02 02:56:17Damien Miller2013-12-052-2/+6
| | | | | [ssh-pkcs11-helper.c] use-after-free; bz#2175 patch from Loganaden Velvindron @ AfriNIC
* - djm@cvs.openbsd.org 2013/12/02 02:50:27Damien Miller2013-12-052-2/+5
| | | | | [PROTOCOL.chacha20poly1305] typo; from Jon Cave
* - djm@cvs.openbsd.org 2013/12/01 23:19:05Damien Miller2013-12-052-1/+10
| | | | | [PROTOCOL] mention curve25519-sha256@libssh.org key exchange algorithm
* - deraadt@cvs.openbsd.org 2013/11/26 19:15:09Damien Miller2013-12-052-9/+13
| | | | | | [pkcs11.h] cleanup 1 << 31 idioms. Resurrection of this issue pointed out by Eitan Adler ok markus for ssh, implies same change in kerberosV
* - jmc@cvs.openbsd.org 2013/11/26 12:14:54Damien Miller2013-12-053-10/+17
| | | | | | | | | | [ssh.1 ssh.c] - put -Q in the right place - Ar was a poor choice for the arguments to -Q. i've chosen an admittedly equally poor Cm, at least consistent with the rest of the docs. also no need for multiple instances - zap a now redundant Nm - usage() sync
* - deraadt@cvs.openbsd.org 2013/11/25 18:04:21Damien Miller2013-12-053-23/+26
| | | | | | | [ssh.1 ssh.c] improve -Q usage and such. One usage change is that the option is now case-sensitive ok dtucker markus djm
* - jmc@cvs.openbsd.org 2013/11/21 08:05:09Damien Miller2013-12-053-4/+8
| | | | | [ssh_config.5 sshd_config.5] no need for .Pp before displays;
* - djm@cvs.openbsd.org 2013/11/21 03:18:51Damien Miller2013-11-215-22/+34
| | | | | | | | | | | [regress/cipher-speed.sh regress/integrity.sh regress/rekey.sh] [regress/try-ciphers.sh] use new "ssh -Q cipher-auth" query to obtain lists of authenticated encryption ciphers instead of specifying them manually; ensures that the new chacha20poly1305@openssh.com mode is tested; ok markus@ and naddy@ as part of the diff to add chacha20poly1305@openssh.com
* - djm@cvs.openbsd.org 2013/11/21 03:16:47Damien Miller2013-11-212-3/+7
| | | | | | [regress/modpipe.c] use unsigned long long instead of u_int64_t here to avoid warnings on some systems portable OpenSSH is built on.
* - djm@cvs.openbsd.org 2013/11/21 03:15:46Damien Miller2013-11-212-1/+7
| | | | | [regress/krl.sh] add some reminders for additional tests that I'd like to implement
* - naddy@cvs.openbsd.org 2013/11/18 05:09:32Damien Miller2013-11-212-1/+5
| | | | | | | [regress/forward-control.sh] bump timeout to 10 seconds to allow slow machines (e.g. Alpha PC164) to successfully run this; ok djm@ (ID sync only; our timeouts are already longer)
* - djm@cvs.openbsd.org 2013/11/21 00:45:44Damien Miller2013-11-2121-68/+853
| | | | | | | | | | | | | | | | | | | [Makefile.in PROTOCOL PROTOCOL.chacha20poly1305 authfile.c chacha.c] [chacha.h cipher-chachapoly.c cipher-chachapoly.h cipher.c cipher.h] [dh.c myproposal.h packet.c poly1305.c poly1305.h servconf.c ssh.1] [ssh.c ssh_config.5 sshd_config.5] Add a new protocol 2 transport cipher "chacha20-poly1305@openssh.com" that combines Daniel Bernstein's ChaCha20 stream cipher and Poly1305 MAC to build an authenticated encryption mode. Inspired by and similar to Adam Langley's proposal for TLS: http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-03 but differs in layout used for the MAC calculation and the use of a second ChaCha20 instance to separately encrypt packet lengths. Details are in the PROTOCOL.chacha20poly1305 file. Feedback markus@, naddy@; manpage bits Loganden Velvindron @ AfriNIC ok markus@ naddy@
* - deraadt@cvs.openbsd.org 2013/11/20 20:54:10Damien Miller2013-11-216-13/+16
| | | | | | [canohost.c clientloop.c match.c readconf.c sftp.c] unsigned casts for ctype macros where neccessary ok guenther millert markus
* - deraadt@cvs.openbsd.org 2013/11/20 20:53:10Damien Miller2013-11-212-3/+7
| | | | | | [scp.c] unsigned casts for ctype macros where neccessary ok guenther millert markus
* - djm@cvs.openbsd.org 2013/11/20 02:19:01Damien Miller2013-11-212-3/+8
| | | | | | | [sshd.c] delay closure of in/out fds until after "Bad protocol version identification..." message, as get_remote_ipaddr/get_remote_port require them open.
* - markus@cvs.openbsd.org 2013/11/13 13:48:20Damien Miller2013-11-212-2/+5
| | | | | [ssh-pkcs11.c] add missing braces found by pedro
* - dtucker@cvs.openbsd.org 2013/11/08 11:15:19Damien Miller2013-11-218-7/+20
| | | | | [bufaux.c bufbn.c buffer.c sftp-client.c sftp-common.c sftp-glob.c] [uidswap.c] Include stdlib.h for free() as per the man page.
* - (dtucker) [regress/keytype.sh] Populate ECDSA key types to be tested byDarren Tucker2013-11-102-3/+11
| | | | querying the ones that are compiled in.
* - (dtucker) [key.c] Check for the correct defines for NID_secp521r1.Darren Tucker2013-11-102-2/+3
|
* - (dtucker) [configure.ac] Add missing "test".Darren Tucker2013-11-092-3/+4
|
* - (dtucker) [configure.ac] Fix brackets in NID_secp521r1 test.Darren Tucker2013-11-092-4/+5
|
* - (dtucker) [configure.ac kex.c key.c myproposal.h] Test for the presence ofDarren Tucker2013-11-095-21/+133
| | | | | | NID_X9_62_prime256v1, NID_secp384r1 and NID_secp521r1 and test that the latter actually works before using it. Fedora (at least) has NID_secp521r1 that doesn't work (see https://bugzilla.redhat.com/show_bug.cgi?id=1021897).
* - dtucker@cvs.openbsd.org 2013/11/09 05:41:34Darren Tucker2013-11-093-5/+32
| | | | | | [regress/test-exec.sh regress/rekey.sh] Use smaller test data files to speed up tests. Grow test datafiles where necessary for a specific test.
* - (dtucker) [contrib/cygwin/ssh-host-config] Simplify host key generation:Darren Tucker2013-11-092-51/+6
| | | | | rather than testing and generating each key, call ssh-keygen -A. Patch from vinschen at redhat.com.
* - (dtucker) [Makefile.in configure.ac] Set MALLOC_OPTIONS per platformDarren Tucker2013-11-093-4/+13
| | | | | and pass in TEST_ENV. Unknown options cause stderr to get polluted and the stderr-data test to fail.
* - (dtucker) [openbsd-compat/bsd-poll.c] Add headers to prevent compileDarren Tucker2013-11-082-2/+7
| | | | warnings.
* - (dtucker) [myproposal.h] Conditionally enable CURVE25519_SHA256.Darren Tucker2013-11-082-1/+5
|