diff options
-rw-r--r-- | ChangeLog | 1 | ||||
-rw-r--r-- | Makefile.in | 7 | ||||
-rw-r--r-- | monitor.c | 1 | ||||
-rwxr-xr-x | regress/modpipe.c | 4 | ||||
-rw-r--r-- | regress/rekey.sh | 2 |
5 files changed, 10 insertions, 5 deletions
@@ -1,6 +1,7 @@ | |||
1 | 20131107 | 1 | 20131107 |
2 | - (djm) [ssh-pkcs11.c] Bring back "non-constant initialiser" fix (rev 1.5) | 2 | - (djm) [ssh-pkcs11.c] Bring back "non-constant initialiser" fix (rev 1.5) |
3 | that got lost in recent merge. | 3 | that got lost in recent merge. |
4 | - (djm) [Makefile.in monitor.c] Missed chunks of curve25519 KEX diff | ||
4 | 5 | ||
5 | 20131104 | 6 | 20131104 |
6 | - (djm) OpenBSD CVS Sync | 7 | - (djm) OpenBSD CVS Sync |
diff --git a/Makefile.in b/Makefile.in index 797aa3e0c..58ea78a72 100644 --- a/Makefile.in +++ b/Makefile.in | |||
@@ -1,4 +1,4 @@ | |||
1 | # $Id: Makefile.in,v 1.341 2013/11/03 21:26:53 djm Exp $ | 1 | # $Id: Makefile.in,v 1.342 2013/11/07 01:00:24 djm Exp $ |
2 | 2 | ||
3 | # uncomment if you run a non bourne compatable shell. Ie. csh | 3 | # uncomment if you run a non bourne compatable shell. Ie. csh |
4 | #SHELL = @SH@ | 4 | #SHELL = @SH@ |
@@ -73,7 +73,8 @@ LIBSSH_OBJS=authfd.o authfile.o bufaux.o bufbn.o buffer.o \ | |||
73 | monitor_fdpass.o rijndael.o ssh-dss.o ssh-ecdsa.o ssh-rsa.o dh.o \ | 73 | monitor_fdpass.o rijndael.o ssh-dss.o ssh-ecdsa.o ssh-rsa.o dh.o \ |
74 | kexdh.o kexgex.o kexdhc.o kexgexc.o bufec.o kexecdh.o kexecdhc.o \ | 74 | kexdh.o kexgex.o kexdhc.o kexgexc.o bufec.o kexecdh.o kexecdhc.o \ |
75 | msg.o progressmeter.o dns.o entropy.o gss-genr.o umac.o umac128.o \ | 75 | msg.o progressmeter.o dns.o entropy.o gss-genr.o umac.o umac128.o \ |
76 | jpake.o schnorr.o ssh-pkcs11.o krl.o smult_curve25519_ref.o | 76 | jpake.o schnorr.o ssh-pkcs11.o krl.o smult_curve25519_ref.o \ |
77 | kexc25519.o kexc25519c.o | ||
77 | 78 | ||
78 | SSHOBJS= ssh.o readconf.o clientloop.o sshtty.o \ | 79 | SSHOBJS= ssh.o readconf.o clientloop.o sshtty.o \ |
79 | sshconnect.o sshconnect1.o sshconnect2.o mux.o \ | 80 | sshconnect.o sshconnect1.o sshconnect2.o mux.o \ |
@@ -87,7 +88,7 @@ SSHDOBJS=sshd.o auth-rhosts.o auth-passwd.o auth-rsa.o auth-rh-rsa.o \ | |||
87 | auth-skey.o auth-bsdauth.o auth2-hostbased.o auth2-kbdint.o \ | 88 | auth-skey.o auth-bsdauth.o auth2-hostbased.o auth2-kbdint.o \ |
88 | auth2-none.o auth2-passwd.o auth2-pubkey.o auth2-jpake.o \ | 89 | auth2-none.o auth2-passwd.o auth2-pubkey.o auth2-jpake.o \ |
89 | monitor_mm.o monitor.o monitor_wrap.o kexdhs.o kexgexs.o kexecdhs.o \ | 90 | monitor_mm.o monitor.o monitor_wrap.o kexdhs.o kexgexs.o kexecdhs.o \ |
90 | auth-krb5.o \ | 91 | kexc25519s.o auth-krb5.o \ |
91 | auth2-gss.o gss-serv.o gss-serv-krb5.o \ | 92 | auth2-gss.o gss-serv.o gss-serv-krb5.o \ |
92 | loginrec.o auth-pam.o auth-shadow.o auth-sia.o md5crypt.o \ | 93 | loginrec.o auth-pam.o auth-shadow.o auth-sia.o md5crypt.o \ |
93 | sftp-server.o sftp-common.o \ | 94 | sftp-server.o sftp-common.o \ |
@@ -1855,6 +1855,7 @@ mm_get_kex(Buffer *m) | |||
1855 | kex->kex[KEX_DH_GEX_SHA1] = kexgex_server; | 1855 | kex->kex[KEX_DH_GEX_SHA1] = kexgex_server; |
1856 | kex->kex[KEX_DH_GEX_SHA256] = kexgex_server; | 1856 | kex->kex[KEX_DH_GEX_SHA256] = kexgex_server; |
1857 | kex->kex[KEX_ECDH_SHA2] = kexecdh_server; | 1857 | kex->kex[KEX_ECDH_SHA2] = kexecdh_server; |
1858 | kex->kex[KEX_C25519_SHA256] = kexc25519_server; | ||
1858 | kex->server = 1; | 1859 | kex->server = 1; |
1859 | kex->hostkey_type = buffer_get_int(m); | 1860 | kex->hostkey_type = buffer_get_int(m); |
1860 | kex->kex_type = buffer_get_int(m); | 1861 | kex->kex_type = buffer_get_int(m); |
diff --git a/regress/modpipe.c b/regress/modpipe.c index 85747cf7d..183a58695 100755 --- a/regress/modpipe.c +++ b/regress/modpipe.c | |||
@@ -68,7 +68,7 @@ usage(void) | |||
68 | #define MAX_MODIFICATIONS 256 | 68 | #define MAX_MODIFICATIONS 256 |
69 | struct modification { | 69 | struct modification { |
70 | enum { MOD_XOR, MOD_AND_OR } what; | 70 | enum { MOD_XOR, MOD_AND_OR } what; |
71 | u_int64_t offset; | 71 | unsigned long long offset; |
72 | u_int8_t m1, m2; | 72 | u_int8_t m1, m2; |
73 | }; | 73 | }; |
74 | 74 | ||
@@ -79,7 +79,7 @@ parse_modification(const char *s, struct modification *m) | |||
79 | int n, m1, m2; | 79 | int n, m1, m2; |
80 | 80 | ||
81 | bzero(m, sizeof(*m)); | 81 | bzero(m, sizeof(*m)); |
82 | if ((n = sscanf(s, "%16[^:]%*[:]%lli%*[:]%i%*[:]%i", | 82 | if ((n = sscanf(s, "%16[^:]%*[:]%llu%*[:]%i%*[:]%i", |
83 | what, &m->offset, &m1, &m2)) < 3) | 83 | what, &m->offset, &m1, &m2)) < 3) |
84 | errx(1, "Invalid modification spec \"%s\"", s); | 84 | errx(1, "Invalid modification spec \"%s\"", s); |
85 | if (strcasecmp(what, "xor") == 0) { | 85 | if (strcasecmp(what, "xor") == 0) { |
diff --git a/regress/rekey.sh b/regress/rekey.sh index 8eb7efaf9..cf3dce99f 100644 --- a/regress/rekey.sh +++ b/regress/rekey.sh | |||
@@ -1,6 +1,8 @@ | |||
1 | # $OpenBSD: rekey.sh,v 1.8 2013/05/17 04:29:14 dtucker Exp $ | 1 | # $OpenBSD: rekey.sh,v 1.8 2013/05/17 04:29:14 dtucker Exp $ |
2 | # Placed in the Public Domain. | 2 | # Placed in the Public Domain. |
3 | 3 | ||
4 | set -x | ||
5 | |||
4 | tid="rekey" | 6 | tid="rekey" |
5 | 7 | ||
6 | LOG=${TEST_SSH_LOGFILE} | 8 | LOG=${TEST_SSH_LOGFILE} |