Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/crypto/external/bsd/openssh Merge local changes between 8.5 ...
details: https://anonhg.NetBSD.org/src/rev/cd5abdbd6d3f
branches: trunk
changeset: 378635:cd5abdbd6d3f
user: christos <christos%NetBSD.org@localhost>
date: Mon Apr 19 14:40:15 2021 +0000
description:
Merge local changes between 8.5 and 8.6
diffstat:
crypto/external/bsd/openssh/dist/addrmatch.c | 8 +-
crypto/external/bsd/openssh/dist/auth-krb5.c | 10 +-
crypto/external/bsd/openssh/dist/auth-options.c | 8 +-
crypto/external/bsd/openssh/dist/auth.c | 8 +-
crypto/external/bsd/openssh/dist/auth2-pubkey.c | 11 +-
crypto/external/bsd/openssh/dist/auth2.c | 10 +-
crypto/external/bsd/openssh/dist/chacha.h | 6 +-
crypto/external/bsd/openssh/dist/channels.c | 12 +-
crypto/external/bsd/openssh/dist/channels.h | 10 +-
crypto/external/bsd/openssh/dist/cipher.c | 46 +++-
crypto/external/bsd/openssh/dist/clientloop.c | 8 +-
crypto/external/bsd/openssh/dist/dh.c | 29 ++-
crypto/external/bsd/openssh/dist/dh.h | 5 +-
crypto/external/bsd/openssh/dist/hostfile.c | 8 +-
crypto/external/bsd/openssh/dist/kex.c | 8 +-
crypto/external/bsd/openssh/dist/kexgen.c | 6 +-
crypto/external/bsd/openssh/dist/log.c | 28 +-
crypto/external/bsd/openssh/dist/log.h | 13 +-
crypto/external/bsd/openssh/dist/misc.c | 17 +-
crypto/external/bsd/openssh/dist/misc.h | 11 +-
crypto/external/bsd/openssh/dist/moduli-gen/moduli.2048 | 148 ++++++++------
crypto/external/bsd/openssh/dist/moduli-gen/moduli.3072 | 152 ++++++++------
crypto/external/bsd/openssh/dist/moduli-gen/moduli.4096 | 144 ++++++-------
crypto/external/bsd/openssh/dist/moduli-gen/moduli.6144 | 152 +++++++------
crypto/external/bsd/openssh/dist/moduli-gen/moduli.7680 | 128 ++++++-----
crypto/external/bsd/openssh/dist/moduli-gen/moduli.8192 | 126 +++++------
crypto/external/bsd/openssh/dist/monitor.c | 26 +-
crypto/external/bsd/openssh/dist/monitor_wrap.c | 13 +-
crypto/external/bsd/openssh/dist/monitor_wrap.h | 7 +-
crypto/external/bsd/openssh/dist/mux.c | 14 +-
crypto/external/bsd/openssh/dist/packet.c | 20 +-
crypto/external/bsd/openssh/dist/readconf.c | 12 +-
crypto/external/bsd/openssh/dist/scp.c | 11 +-
crypto/external/bsd/openssh/dist/servconf.c | 28 +-
crypto/external/bsd/openssh/dist/servconf.h | 13 +-
crypto/external/bsd/openssh/dist/serverloop.c | 8 +-
crypto/external/bsd/openssh/dist/session.c | 8 +-
crypto/external/bsd/openssh/dist/sftp-client.c | 122 ++++++++++-
crypto/external/bsd/openssh/dist/sftp-client.h | 15 +-
crypto/external/bsd/openssh/dist/sftp-server.c | 164 +++++++++------
crypto/external/bsd/openssh/dist/sftp.c | 17 +-
crypto/external/bsd/openssh/dist/srclimit.c | 6 +-
crypto/external/bsd/openssh/dist/ssh-add.c | 10 +-
crypto/external/bsd/openssh/dist/ssh-agent.c | 12 +-
crypto/external/bsd/openssh/dist/ssh-keygen.c | 21 +-
crypto/external/bsd/openssh/dist/ssh-sk-client.c | 12 +-
crypto/external/bsd/openssh/dist/ssh.c | 10 +-
crypto/external/bsd/openssh/dist/ssh_api.c | 8 +-
crypto/external/bsd/openssh/dist/ssh_config.5 | 15 +-
crypto/external/bsd/openssh/dist/sshconnect.c | 22 +-
crypto/external/bsd/openssh/dist/sshconnect2.c | 10 +-
crypto/external/bsd/openssh/dist/sshd.8 | 8 +-
crypto/external/bsd/openssh/dist/sshd.c | 18 +-
crypto/external/bsd/openssh/dist/sshd_config.5 | 21 +-
crypto/external/bsd/openssh/dist/sshkey-xmss.c | 10 +-
crypto/external/bsd/openssh/dist/sshkey-xmss.h | 14 +-
crypto/external/bsd/openssh/dist/sshkey.c | 30 +-
crypto/external/bsd/openssh/dist/umac.c | 9 +-
crypto/external/bsd/openssh/dist/utf8.h | 11 +-
crypto/external/bsd/openssh/dist/version.h | 8 +-
crypto/external/bsd/openssh/dist/xmalloc.h | 11 +-
crypto/external/bsd/openssh/lib/shlib_version | 4 +-
62 files changed, 1057 insertions(+), 803 deletions(-)
diffs (truncated from 3671 to 300 lines):
diff -r d15ed25e7de7 -r cd5abdbd6d3f crypto/external/bsd/openssh/dist/addrmatch.c
--- a/crypto/external/bsd/openssh/dist/addrmatch.c Mon Apr 19 14:07:36 2021 +0000
+++ b/crypto/external/bsd/openssh/dist/addrmatch.c Mon Apr 19 14:40:15 2021 +0000
@@ -1,5 +1,5 @@
-/* $NetBSD: addrmatch.c,v 1.14 2021/03/05 17:47:15 christos Exp $ */
-/* $OpenBSD: addrmatch.c,v 1.16 2021/01/09 11:58:50 dtucker Exp $ */
+/* $NetBSD: addrmatch.c,v 1.15 2021/04/19 14:40:15 christos Exp $ */
+/* $OpenBSD: addrmatch.c,v 1.17 2021/04/03 06:18:40 djm Exp $ */
/*
* Copyright (c) 2004-2008 Damien Miller <djm%mindrot.org@localhost>
@@ -18,7 +18,7 @@
*/
#include "includes.h"
-__RCSID("$NetBSD: addrmatch.c,v 1.14 2021/03/05 17:47:15 christos Exp $");
+__RCSID("$NetBSD: addrmatch.c,v 1.15 2021/04/19 14:40:15 christos Exp $");
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
@@ -77,7 +77,7 @@ addr_match_list(const char *addr, const
break;
} else if (r == 0) {
if (addr != NULL && addr_netmatch(&try_addr,
- &match_addr, masklen) == 0) {
+ &match_addr, masklen) == 0) {
foundit:
if (neg) {
ret = -1;
diff -r d15ed25e7de7 -r cd5abdbd6d3f crypto/external/bsd/openssh/dist/auth-krb5.c
--- a/crypto/external/bsd/openssh/dist/auth-krb5.c Mon Apr 19 14:07:36 2021 +0000
+++ b/crypto/external/bsd/openssh/dist/auth-krb5.c Mon Apr 19 14:40:15 2021 +0000
@@ -1,5 +1,5 @@
-/* $NetBSD: auth-krb5.c,v 1.15 2021/03/05 17:47:15 christos Exp $ */
-/* $OpenBSD: auth-krb5.c,v 1.23 2018/07/09 21:35:50 markus Exp $ */
+/* $NetBSD: auth-krb5.c,v 1.16 2021/04/19 14:40:15 christos Exp $ */
+/* $OpenBSD: auth-krb5.c,v 1.24 2021/04/03 06:18:40 djm Exp $ */
/*
* Kerberos v5 authentication and ticket-passing routines.
@@ -31,7 +31,7 @@
*/
#include "includes.h"
-__RCSID("$NetBSD: auth-krb5.c,v 1.15 2021/03/05 17:47:15 christos Exp $");
+__RCSID("$NetBSD: auth-krb5.c,v 1.16 2021/04/19 14:40:15 christos Exp $");
#include <sys/types.h>
#include <stdio.h>
#include <pwd.h>
@@ -246,7 +246,7 @@ auth_krb5_password(Authctxt *authctxt, c
goto out;
problem = krb5_cc_new_unique(authctxt->krb5_ctx,
- krb5_mcc_ops.prefix, NULL, &ccache);
+ krb5_mcc_ops.prefix, NULL, &ccache);
if (problem)
goto out;
@@ -266,7 +266,7 @@ auth_krb5_password(Authctxt *authctxt, c
goto out;
problem = krb5_cc_new_unique(authctxt->krb5_ctx,
- krb5_fcc_ops.prefix, NULL, &authctxt->krb5_fwd_ccache);
+ krb5_fcc_ops.prefix, NULL, &authctxt->krb5_fwd_ccache);
if (problem)
goto out;
diff -r d15ed25e7de7 -r cd5abdbd6d3f crypto/external/bsd/openssh/dist/auth-options.c
--- a/crypto/external/bsd/openssh/dist/auth-options.c Mon Apr 19 14:07:36 2021 +0000
+++ b/crypto/external/bsd/openssh/dist/auth-options.c Mon Apr 19 14:40:15 2021 +0000
@@ -1,5 +1,5 @@
-/* $NetBSD: auth-options.c,v 1.25 2021/03/05 17:47:15 christos Exp $ */
-/* $OpenBSD: auth-options.c,v 1.94 2020/10/18 11:32:01 djm Exp $ */
+/* $NetBSD: auth-options.c,v 1.26 2021/04/19 14:40:15 christos Exp $ */
+/* $OpenBSD: auth-options.c,v 1.95 2021/04/03 06:18:40 djm Exp $ */
/*
* Copyright (c) 2018 Damien Miller <djm%mindrot.org@localhost>
@@ -18,7 +18,7 @@
*/
#include "includes.h"
-__RCSID("$NetBSD: auth-options.c,v 1.25 2021/03/05 17:47:15 christos Exp $");
+__RCSID("$NetBSD: auth-options.c,v 1.26 2021/04/19 14:40:15 christos Exp $");
#include <sys/types.h>
#include <sys/queue.h>
@@ -812,7 +812,7 @@ sshauthopt_serialise(const struct sshaut
(r = serialise_nullable_string(m,
untrusted ? NULL : opts->required_from_host_cert)) != 0 ||
(r = serialise_nullable_string(m,
- untrusted ? NULL : opts->required_from_host_keys)) != 0)
+ untrusted ? NULL : opts->required_from_host_keys)) != 0)
return r;
/* Array options */
diff -r d15ed25e7de7 -r cd5abdbd6d3f crypto/external/bsd/openssh/dist/auth.c
--- a/crypto/external/bsd/openssh/dist/auth.c Mon Apr 19 14:07:36 2021 +0000
+++ b/crypto/external/bsd/openssh/dist/auth.c Mon Apr 19 14:40:15 2021 +0000
@@ -1,5 +1,5 @@
-/* $NetBSD: auth.c,v 1.29 2021/03/05 17:47:15 christos Exp $ */
-/* $OpenBSD: auth.c,v 1.151 2020/12/22 00:12:22 djm Exp $ */
+/* $NetBSD: auth.c,v 1.30 2021/04/19 14:40:15 christos Exp $ */
+/* $OpenBSD: auth.c,v 1.152 2021/04/03 06:18:40 djm Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
@@ -26,7 +26,7 @@
*/
#include "includes.h"
-__RCSID("$NetBSD: auth.c,v 1.29 2021/03/05 17:47:15 christos Exp $");
+__RCSID("$NetBSD: auth.c,v 1.30 2021/04/19 14:40:15 christos Exp $");
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/socket.h>
@@ -553,7 +553,7 @@ auth_openfile(const char *file, struct p
if ((fd = open(file, O_RDONLY|O_NONBLOCK)) == -1) {
if (log_missing || errno != ENOENT)
debug("Could not open %s '%s': %s", file_type, file,
- strerror(errno));
+ strerror(errno));
return NULL;
}
diff -r d15ed25e7de7 -r cd5abdbd6d3f crypto/external/bsd/openssh/dist/auth2-pubkey.c
--- a/crypto/external/bsd/openssh/dist/auth2-pubkey.c Mon Apr 19 14:07:36 2021 +0000
+++ b/crypto/external/bsd/openssh/dist/auth2-pubkey.c Mon Apr 19 14:40:15 2021 +0000
@@ -1,5 +1,5 @@
-/* $NetBSD: auth2-pubkey.c,v 1.27 2021/03/05 17:47:15 christos Exp $ */
-/* $OpenBSD: auth2-pubkey.c,v 1.106 2021/01/27 10:05:28 djm Exp $ */
+/* $NetBSD: auth2-pubkey.c,v 1.28 2021/04/19 14:40:15 christos Exp $ */
+/* $OpenBSD: auth2-pubkey.c,v 1.107 2021/04/03 06:18:40 djm Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
@@ -26,7 +26,7 @@
*/
#include "includes.h"
-__RCSID("$NetBSD: auth2-pubkey.c,v 1.27 2021/03/05 17:47:15 christos Exp $");
+__RCSID("$NetBSD: auth2-pubkey.c,v 1.28 2021/04/19 14:40:15 christos Exp $");
#include <sys/types.h>
#include <sys/stat.h>
@@ -680,7 +680,8 @@ check_authkey_line(struct ssh *ssh, stru
goto fail_reason;
}
if (sshkey_cert_check_authority(key, 0, 0, 0,
- keyopts->cert_principals == NULL ? pw->pw_name : NULL, &reason) != 0)
+ keyopts->cert_principals == NULL ? pw->pw_name : NULL,
+ &reason) != 0)
goto fail_reason;
verbose("Accepted certificate ID \"%s\" (serial %llu) "
@@ -869,7 +870,7 @@ user_cert_trusted_ca(struct ssh *ssh, st
found_principal = 1;
/* If principals file or command is specified, then require a match */
use_authorized_principals = principals_file != NULL ||
- options.authorized_principals_command != NULL;
+ options.authorized_principals_command != NULL;
if (!found_principal && use_authorized_principals) {
reason = "Certificate does not contain an authorized principal";
goto fail_reason;
diff -r d15ed25e7de7 -r cd5abdbd6d3f crypto/external/bsd/openssh/dist/auth2.c
--- a/crypto/external/bsd/openssh/dist/auth2.c Mon Apr 19 14:07:36 2021 +0000
+++ b/crypto/external/bsd/openssh/dist/auth2.c Mon Apr 19 14:40:15 2021 +0000
@@ -1,5 +1,5 @@
-/* $NetBSD: auth2.c,v 1.23 2021/03/05 17:47:15 christos Exp $ */
-/* $OpenBSD: auth2.c,v 1.160 2021/01/27 10:05:28 djm Exp $ */
+/* $NetBSD: auth2.c,v 1.24 2021/04/19 14:40:15 christos Exp $ */
+/* $OpenBSD: auth2.c,v 1.161 2021/04/03 06:18:40 djm Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
@@ -26,7 +26,7 @@
*/
#include "includes.h"
-__RCSID("$NetBSD: auth2.c,v 1.23 2021/03/05 17:47:15 christos Exp $");
+__RCSID("$NetBSD: auth2.c,v 1.24 2021/04/19 14:40:15 christos Exp $");
#include <sys/types.h>
#include <sys/stat.h>
@@ -250,7 +250,7 @@ user_specific_delay(const char *user)
double delay;
(void)snprintf(b, sizeof b, "%llu%s",
- (unsigned long long)options.timing_secret, user);
+ (unsigned long long)options.timing_secret, user);
if (ssh_digest_memory(SSH_DIGEST_SHA512, b, strlen(b), hash, len) != 0)
fatal_f("ssh_digest_memory");
/* 0-4.2 ms of delay */
@@ -725,7 +725,7 @@ void
auth2_record_info(Authctxt *authctxt, const char *fmt, ...)
{
va_list ap;
- int i;
+ int i;
free(authctxt->auth_method_info);
authctxt->auth_method_info = NULL;
diff -r d15ed25e7de7 -r cd5abdbd6d3f crypto/external/bsd/openssh/dist/chacha.h
--- a/crypto/external/bsd/openssh/dist/chacha.h Mon Apr 19 14:07:36 2021 +0000
+++ b/crypto/external/bsd/openssh/dist/chacha.h Mon Apr 19 14:40:15 2021 +0000
@@ -1,5 +1,5 @@
-/* $NetBSD: chacha.h,v 1.2 2018/04/06 18:58:59 christos Exp $ */
-/* $OpenBSD: chacha.h,v 1.4 2016/08/27 04:04:56 guenther Exp $ */
+/* $NetBSD: chacha.h,v 1.3 2021/04/19 14:40:15 christos Exp $ */
+/* $OpenBSD: chacha.h,v 1.5 2021/04/03 05:54:14 djm Exp $ */
/*
chacha-merged.c version 20080118
@@ -17,7 +17,7 @@ struct chacha_ctx {
u_int input[16];
};
-#define CHACHA_MINKEYLEN 16
+#define CHACHA_MINKEYLEN 16
#define CHACHA_NONCELEN 8
#define CHACHA_CTRLEN 8
#define CHACHA_STATELEN (CHACHA_NONCELEN+CHACHA_CTRLEN)
diff -r d15ed25e7de7 -r cd5abdbd6d3f crypto/external/bsd/openssh/dist/channels.c
--- a/crypto/external/bsd/openssh/dist/channels.c Mon Apr 19 14:07:36 2021 +0000
+++ b/crypto/external/bsd/openssh/dist/channels.c Mon Apr 19 14:40:15 2021 +0000
@@ -1,5 +1,5 @@
-/* $NetBSD: channels.c,v 1.29 2021/03/05 17:47:16 christos Exp $ */
-/* $OpenBSD: channels.c,v 1.405 2021/02/15 20:43:15 markus Exp $ */
+/* $NetBSD: channels.c,v 1.30 2021/04/19 14:40:15 christos Exp $ */
+/* $OpenBSD: channels.c,v 1.406 2021/04/03 06:18:40 djm Exp $ */
/*
* Author: Tatu Ylonen <ylo%cs.hut.fi@localhost>
@@ -42,7 +42,7 @@
*/
#include "includes.h"
-__RCSID("$NetBSD: channels.c,v 1.29 2021/03/05 17:47:16 christos Exp $");
+__RCSID("$NetBSD: channels.c,v 1.30 2021/04/19 14:40:15 christos Exp $");
#include <sys/param.h>
#include <sys/types.h>
#include <sys/stat.h>
@@ -2318,7 +2318,7 @@ channel_handler_init(struct ssh_channels
chan_fn **pre, **post;
if ((pre = calloc(SSH_CHANNEL_MAX_TYPE, sizeof(*pre))) == NULL ||
- (post = calloc(SSH_CHANNEL_MAX_TYPE, sizeof(*post))) == NULL)
+ (post = calloc(SSH_CHANNEL_MAX_TYPE, sizeof(*post))) == NULL)
fatal_f("allocation failed");
pre[SSH_CHANNEL_OPEN] = &channel_pre_open;
@@ -2718,7 +2718,7 @@ channel_proxy_downstream(struct ssh *ssh
goto out;
}
c = channel_new(ssh, "mux proxy", SSH_CHANNEL_MUX_PROXY,
- -1, -1, -1, 0, 0, 0, ctype, 1);
+ -1, -1, -1, 0, 0, 0, ctype, 1);
c->mux_ctx = downstream; /* point to mux client */
c->mux_downstream_id = id; /* original downstream id */
if ((r = sshbuf_put_cstring(modified, ctype)) != 0 ||
@@ -2745,7 +2745,7 @@ channel_proxy_downstream(struct ssh *ssh
goto out;
}
c = channel_new(ssh, "mux proxy", SSH_CHANNEL_MUX_PROXY,
- -1, -1, -1, 0, 0, 0, "mux-down-connect", 1);
+ -1, -1, -1, 0, 0, 0, "mux-down-connect", 1);
c->mux_ctx = downstream; /* point to mux client */
c->mux_downstream_id = id;
c->remote_id = remote_id;
diff -r d15ed25e7de7 -r cd5abdbd6d3f crypto/external/bsd/openssh/dist/channels.h
--- a/crypto/external/bsd/openssh/dist/channels.h Mon Apr 19 14:07:36 2021 +0000
+++ b/crypto/external/bsd/openssh/dist/channels.h Mon Apr 19 14:40:15 2021 +0000
@@ -1,5 +1,5 @@
-/* $NetBSD: channels.h,v 1.18 2020/12/04 18:42:50 christos Exp $ */
-/* $OpenBSD: channels.h,v 1.135 2020/09/20 05:47:25 djm Exp $ */
+/* $NetBSD: channels.h,v 1.19 2021/04/19 14:40:15 christos Exp $ */
+/* $OpenBSD: channels.h,v 1.137 2021/04/03 06:18:40 djm Exp $ */
/*
* Author: Tatu Ylonen <ylo%cs.hut.fi@localhost>
@@ -178,7 +178,7 @@ struct Channel {
channel_filter_cleanup_fn *filter_cleanup;
/* keep boundaries */
- int datagram;
+ int datagram;
/* non-blocking connect */
/* XXX make this a pointer so the structure can be opaque */
@@ -188,7 +188,7 @@ struct Channel {
mux_callback_fn *mux_rcb;
void *mux_ctx;
int mux_pause;
- int mux_downstream_id;
+ int mux_downstream_id;
};
#define CHAN_EXTENDED_IGNORE 0
@@ -292,7 +292,7 @@ int channel_input_status_confirm(int, u
/* file descriptor handling (read/write) */
Home |
Main Index |
Thread Index |
Old Index