Age | Commit message (Collapse) | Author | |
---|---|---|---|
2020-01-25 | upstream: Add a connection test for proxycommand. This would have | dtucker@openbsd.org | |
caught the problem caused by ssh.c rev 1.507 wherein Host and Hostname were swapped. Prompted by beck@ OpenBSD-Regress-ID: d218500ae6aca4c479c27318fb5b09ebc00f7aae | |||
2020-01-24 | upstream: Do not warn about permissions on symlinks. | dtucker@openbsd.org | |
OpenBSD-Regress-ID: 339d4cbae224bd8743ffad9c3afb0cf3cb66c357 | |||
2020-01-23 | upstream: Handle zlib compression being disabled now that it's | dtucker@openbsd.org | |
optional. OpenBSD-Regress-ID: 0af4fbc5168e62f89d0350de524bff1cb00e707a | |||
2020-01-23 | upstream: When checking for unsafe directories, ignore non-directories | dtucker@openbsd.org | |
(ie symlinks, where permissions are not relevant). OpenBSD-Regress-ID: fb6cfc8b022becb62b2dcb99ed3f072b3326e501 | |||
2020-01-23 | upstream: Check for and warn about StrictModes permission problems. ok tb@ | dtucker@openbsd.org | |
OpenBSD-Regress-ID: 4841704ccdee50ee7efc6035bc686695c6ac2991 | |||
2020-01-23 | upstream: Also test PuTTY chacha20. | dtucker@openbsd.org | |
OpenBSD-Regress-ID: 7af6a0e8763b05f1f8eee6bca5f31fcb16151040 | |||
2020-01-23 | upstream: Also test PuTTY ecdh kex methods. | dtucker@openbsd.org | |
OpenBSD-Regress-ID: ec4017dce612131842398a03e93007a869c2c133 | |||
2020-01-22 | upstream: Increase keyscan timeout from default. On slow hosts 3 | dtucker@openbsd.org | |
concurrent keyscans can hit the default 5 second timeout, so increase to 15 seconds. OpenBSD-Regress-ID: 16383dec166af369b7fb9948572856f5d544c93f | |||
2020-01-22 | unbreak fuzzer support for recent ssh-sk.h changes | Damien Miller | |
2020-01-21 | upstream: pass SSH_SK_HELPER explicitly past $SUDO to avoid it getting | djm@openbsd.org | |
cleared; with dtucker@ OpenBSD-Regress-ID: 03178a0580324bf0dff28f7eac6c3edbc5407f8e | |||
2020-01-15 | Wrap stdint.h in ifdef HAVE_STDINT_H. | Darren Tucker | |
2020-01-06 | upstream: adapt sk-dummy to SK API changes | djm@openbsd.org | |
also, make it pull prototypes directly from sk-api.c and #error if the expected version changes. This will make any future regress test breakage because of SK API changes much more apparent OpenBSD-Regress-ID: 79b07055de4feb988e31da71a89051ad5969829d | |||
2020-01-04 | upstream: what bozo decided to use 2020 as a future date in a regress | djm@openbsd.org | |
test? OpenBSD-Regress-ID: 3b953df5a7e14081ff6cf495d4e8d40e153cbc3a | |||
2020-01-03 | upstream: implement recent SK API change to support resident keys | djm@openbsd.org | |
and PIN prompting in the dummy middleware that we use for the tests. Should fix breakage spotted by dtucker@ OpenBSD-Regress-ID: 379cf9eabfea57aaf7f3f59dafde59889566c484 | |||
2020-01-03 | upstream: Update keygen moduli screen test to match recent command | dtucker@openbsd.org | |
line option change to ssh-keygen(1). OpenBSD-Regress-ID: 744a72755004377e9669b662c13c6aa9ead8a0c3 | |||
2020-01-02 | ssh-sk-null.cc needs extern "C" {} | Damien Miller | |
2020-01-02 | add dummy ssh-sk API for linking with fuzzers | Damien Miller | |
2019-12-21 | upstream: unit tests for ForwardAgent=/path; from Eric Chiang | djm@openbsd.org | |
OpenBSD-Regress-ID: 24f693f78290b2c17725dab2c614dffe4a88c8da | |||
2019-12-21 | upstream: test security key host keys in addition to user keys | djm@openbsd.org | |
OpenBSD-Regress-ID: 9fb45326106669a27e4bf150575c321806e275b1 | |||
2019-12-16 | upstream: adapt to ssh-sk-client change | djm@openbsd.org | |
OpenBSD-Regress-ID: 40481999a5928d635ab2e5b029e8239c112005ea | |||
2019-12-16 | upstream: it's no longer possible to disable privilege separation | djm@openbsd.org | |
in sshd, so don't double the tests' work by trying both off/on OpenBSD-Regress-ID: d366665466dbd09e9b707305da884be3e7619c68 | |||
2019-12-06 | Wrap ECC specific bits in ifdef. | Darren Tucker | |
Fixes tests when built against an OpenSSL configured with no-ec. | |||
2019-11-29 | includes.h for sk-dummy.c, dummy | Damien Miller | |
2019-11-29 | another attempt at sk-dummy.so working x-platform | Damien Miller | |
include a fatal() implementation to satisfy libopenbsd-compat clean up .lo and .so files .gitignore .lo and .so files | |||
2019-11-29 | upstream: lots of dependencies go away here with ed25519 no longer | djm@openbsd.org | |
needing the ssh_digest API. OpenBSD-Regress-ID: 785847ec78cb580d141e29abce351a436d6b5d49 | |||
2019-11-27 | upstream: test FIDO2/U2F key types; ok markus@ | djm@openbsd.org | |
OpenBSD-Regress-ID: 367e06d5a260407619b4b113ea0bd7004a435474 | |||
2019-11-27 | upstream: add dummy security key middleware based on work by | djm@openbsd.org | |
markus@ This will allow us to test U2F/FIDO2 support in OpenSSH without requiring real hardware. ok markus@ OpenBSD-Regress-ID: 88b309464b8850c320cf7513f26d97ee1fdf9aae | |||
2019-11-25 | unbreak fuzzers for recent security key changes | Damien Miller | |
2019-11-25 | upstream: unbreak tests for recent security key changes | djm@openbsd.org | |
OpenBSD-Regress-ID: 2cdf2fcae9962ca4d711338f3ceec3c1391bdf95 | |||
2019-11-25 | upstream: unbreak after security key support landed | djm@openbsd.org | |
OpenBSD-Regress-ID: 3ab578b0dbeb2aa6d9969b54a9c1bad329c0dcba | |||
2019-11-25 | upstream: Remove workaround for broken 'openssl rsa -text' output | tb@openbsd.org | |
that was fixed in libcrypto/rsa/rsa_ameth.c r1.24. ok dtucker inoguchi OpenBSD-Regress-ID: c260edfac177daa8fcce90141587cf04a95c4f5f | |||
2019-11-18 | upstream: LibreSSL change the format for openssl rsa -text output from | dtucker@openbsd.org | |
"publicExponent" to "Exponent" so accept either. with djm. OpenBSD-Regress-ID: b7e6c4bf700029a31c98be14600d4472fe0467e6 | |||
2019-11-01 | Check if IP_TOS is defined before using. | Darren Tucker | |
2019-11-01 | upstream: more additional source files | djm@openbsd.org | |
OpenBSD-Regress-ID: 8eaa25fb901594aee23b76eda99dca5b8db94c6f | |||
2019-11-01 | upstream: additional source files here too | djm@openbsd.org | |
OpenBSD-Regress-ID: 8809f8e1c8f7459e7096ab6b58d8e56cb2f483fd | |||
2019-11-01 | upstream: additional source files here too | djm@openbsd.org | |
OpenBSD-Regress-ID: 09297e484327f911fd353489518cceaa0c1b95ce | |||
2019-11-01 | upstream: adapt to extra sshkey_sign() argument and additional | djm@openbsd.org | |
dependencies OpenBSD-Regress-ID: 7a25604968486c4d6f81d06e8fbc7d17519de50e | |||
2019-11-01 | upstream: skip security-key key types for tests until we have a | djm@openbsd.org | |
dummy U2F middleware to use. OpenBSD-Regress-ID: 37200462b44334a4ad45e6a1f7ad1bd717521a95 | |||
2019-11-01 | Missing unit test files | Damien Miller | |
2019-10-09 | add a fuzzer for private key parsing | Damien Miller | |
2019-10-07 | upstream: Instead of running sed over the whole log to remove CRs, | dtucker@openbsd.org | |
remove them only where it's needed (and confuses test(1) on at least OS X in portable). OpenBSD-Regress-ID: a6ab9b4bd1d33770feaf01b2dfb96f9e4189d2d0 | |||
2019-10-04 | upstream: more sshsig regress tests: check key revocation, the | djm@openbsd.org | |
check-novalidate signature test mode and signing keys in ssh-agent. From Sebastian Kinne (slightly tweaked) OpenBSD-Regress-ID: b39566f5cec70140674658cdcedf38752a52e2e2 | |||
2019-09-30 | Add SKIP_LTESTS for skipping specific tests. | Darren Tucker | |
2019-09-27 | upstream: Test for empty result in expected bits. Remove CRs from log | dtucker@openbsd.org | |
as they confuse tools on some platforms. Re-enable the 3des-cbc test. OpenBSD-Regress-ID: edf536d4f29fc1ba412889b37247a47f1b49d250 | |||
2019-09-27 | Re-enable dhgex test. | Darren Tucker | |
Since we've added larger fallback groups to dh.c this test will pass even if there is no moduli file installed on the system. | |||
2019-09-08 | make unittests pass for no-openssl case | Damien Miller | |
2019-09-06 | upstream: Check for RSA support before using it for the user key, | dtucker@openbsd.org | |
otherwise use ed25519 which is supported when built without OpenSSL. OpenBSD-Regress-ID: 3d23ddfe83c5062f00ac845d463f19a2ec78c0f7 | |||
2019-09-05 | update fuzzing makefile to more recent clang | Damien Miller | |
2019-09-05 | fuzzer for sshsig allowed_signers option parsing | Damien Miller | |
2019-09-05 | Fuzzer harness for sshsig | Damien Miller | |