sync with OpenBSD -current

This commit is contained in:
purplerain 2024-10-16 01:51:11 +00:00
parent 74987653ce
commit 037d9f0129
Signed by: purplerain
GPG Key ID: F42C07F07E2E35B7
17 changed files with 71 additions and 68 deletions

View File

@ -1,4 +1,4 @@
.\" $OpenBSD: ps.1,v 1.138 2024/10/10 10:24:14 claudio Exp $ .\" $OpenBSD: ps.1,v 1.139 2024/10/15 13:49:49 claudio Exp $
.\" $NetBSD: ps.1,v 1.16 1996/03/21 01:36:28 jtc Exp $ .\" $NetBSD: ps.1,v 1.16 1996/03/21 01:36:28 jtc Exp $
.\" .\"
.\" Copyright (c) 1980, 1990, 1991, 1993, 1994 .\" Copyright (c) 1980, 1990, 1991, 1993, 1994
@ -30,7 +30,7 @@
.\" .\"
.\" @(#)ps.1 8.3 (Berkeley) 4/18/94 .\" @(#)ps.1 8.3 (Berkeley) 4/18/94
.\" .\"
.Dd $Mdocdate: October 10 2024 $ .Dd $Mdocdate: October 15 2024 $
.Dt PS 1 .Dt PS 1
.Os .Os
.Sh NAME .Sh NAME
@ -359,6 +359,7 @@ PS_CHROOT 0x01000000 process is chrooted
PS_NOBTCFI 0x02000000 no Branch Target CFI PS_NOBTCFI 0x02000000 no Branch Target CFI
PS_CONTINUED 0x20000000 process continued from stopped state PS_CONTINUED 0x20000000 process continued from stopped state
but has not been waited for yet but has not been waited for yet
PS_STOPPED 0x40000000 process is in stopped state
.Ed .Ed
.It Cm re .It Cm re
Core residency time (in seconds; 127 = infinity). Core residency time (in seconds; 127 = infinity).

View File

@ -1,7 +1,7 @@
# $OpenBSD: Makefile,v 1.35 2024/06/09 17:24:19 deraadt Exp $ # $OpenBSD: Makefile,v 1.36 2024/10/15 00:08:28 deraadt Exp $
FS= install${OSrev}.img FS= install${OSrev}.img
FSSIZE= 921600 FSSIZE= 931840
FSDISKTYPE= install360 FSDISKTYPE= install360
CDROM= install${OSrev}.iso CDROM= install${OSrev}.iso

View File

@ -1,4 +1,4 @@
# $OpenBSD: disktab,v 1.35 2023/04/19 11:20:03 krw Exp $ # $OpenBSD: disktab,v 1.36 2024/10/15 00:08:27 deraadt Exp $
mini34|gzip bsd.rd disk image 4.34375MB:\ mini34|gzip bsd.rd disk image 4.34375MB:\
:dt=rdroot:se#512:nt#1:ns#64:nc#132:\ :dt=rdroot:se#512:nt#1:ns#64:nc#132:\
@ -7,8 +7,8 @@ mini34|gzip bsd.rd disk image 4.34375MB:\
install360|install.img disk image 360MB:\ install360|install.img disk image 360MB:\
:dt=rdroot:se#512:nt#1:ns#64:nc#14400:\ :dt=rdroot:se#512:nt#1:ns#64:nc#14400:\
:pa#921536:oa#64:ba#8192:fa#1024:ta=4.2BSD: \ :pa#931776:oa#64:ba#8192:fa#1024:ta=4.2BSD: \
:pc#921600:oc#0: :pc#931840:oc#0:
floppy288|3in|3.5in High Density Floppy, 2.88MB:\ floppy288|3in|3.5in High Density Floppy, 2.88MB:\
:dt=floppy:se#512:nt#2:ns#36:nc#80:\ :dt=floppy:se#512:nt#2:ns#36:nc#80:\

View File

@ -1,4 +1,4 @@
/* $OpenBSD: ec_asn1.c,v 1.72 2024/10/14 18:17:11 tb Exp $ */ /* $OpenBSD: ec_asn1.c,v 1.73 2024/10/15 06:35:59 tb Exp $ */
/* /*
* Written by Nils Larsch for the OpenSSL project. * Written by Nils Larsch for the OpenSSL project.
*/ */
@ -695,15 +695,11 @@ ec_asn1_group2parameters(const EC_GROUP *group)
int ok = 0; int ok = 0;
size_t len = 0; size_t len = 0;
ECPARAMETERS *ret = NULL; ECPARAMETERS *ret = NULL;
BIGNUM *tmp = NULL; const BIGNUM *order, *cofactor;
unsigned char *buffer = NULL; unsigned char *buffer = NULL;
const EC_POINT *point = NULL; const EC_POINT *point = NULL;
point_conversion_form_t form; point_conversion_form_t form;
if ((tmp = BN_new()) == NULL) {
ECerror(ERR_R_MALLOC_FAILURE);
goto err;
}
if ((ret = ECPARAMETERS_new()) == NULL) { if ((ret = ECPARAMETERS_new()) == NULL) {
ECerror(ERR_R_MALLOC_FAILURE); ECerror(ERR_R_MALLOC_FAILURE);
goto err; goto err;
@ -750,19 +746,27 @@ ec_asn1_group2parameters(const EC_GROUP *group)
ECerror(ERR_R_ASN1_LIB); ECerror(ERR_R_ASN1_LIB);
goto err; goto err;
} }
if (!EC_GROUP_get_order(group, tmp, NULL)) { if ((order = EC_GROUP_get0_order(group)) == NULL) {
ECerror(ERR_R_EC_LIB);
goto err;
}
if (BN_is_zero(order)) {
ECerror(ERR_R_EC_LIB); ECerror(ERR_R_EC_LIB);
goto err; goto err;
} }
ASN1_INTEGER_free(ret->order); ASN1_INTEGER_free(ret->order);
if ((ret->order = BN_to_ASN1_INTEGER(tmp, NULL)) == NULL) { if ((ret->order = BN_to_ASN1_INTEGER(order, NULL)) == NULL) {
ECerror(ERR_R_ASN1_LIB); ECerror(ERR_R_ASN1_LIB);
goto err; goto err;
} }
ASN1_INTEGER_free(ret->cofactor); ASN1_INTEGER_free(ret->cofactor);
ret->cofactor = NULL; ret->cofactor = NULL;
if (EC_GROUP_get_cofactor(group, tmp, NULL)) { if ((cofactor = EC_GROUP_get0_cofactor(group)) == NULL) {
if ((ret->cofactor = BN_to_ASN1_INTEGER(tmp, NULL)) == NULL) { ECerror(ERR_R_EC_LIB);
goto err;
}
if (!BN_is_zero(cofactor)) {
if ((ret->cofactor = BN_to_ASN1_INTEGER(cofactor, NULL)) == NULL) {
ECerror(ERR_R_ASN1_LIB); ECerror(ERR_R_ASN1_LIB);
goto err; goto err;
} }
@ -774,7 +778,6 @@ ec_asn1_group2parameters(const EC_GROUP *group)
ECPARAMETERS_free(ret); ECPARAMETERS_free(ret);
ret = NULL; ret = NULL;
} }
BN_free(tmp);
free(buffer); free(buffer);
return (ret); return (ret);
} }

View File

@ -1,4 +1,4 @@
/* $OpenBSD: ec_lib.c,v 1.67 2024/04/23 10:52:08 tb Exp $ */ /* $OpenBSD: ec_lib.c,v 1.69 2024/10/15 17:44:43 tb Exp $ */
/* /*
* Originally written by Bodo Moeller for the OpenSSL project. * Originally written by Bodo Moeller for the OpenSSL project.
*/ */
@ -335,11 +335,11 @@ EC_GROUP_set_generator(EC_GROUP *group, const EC_POINT *generator,
return 0; return 0;
} }
if (group->generator == NULL) { if (group->generator == NULL)
group->generator = EC_POINT_new(group); group->generator = EC_POINT_new(group);
if (group->generator == NULL) if (group->generator == NULL)
return 0; return 0;
}
if (!EC_POINT_copy(group->generator, generator)) if (!EC_POINT_copy(group->generator, generator))
return 0; return 0;
@ -393,6 +393,12 @@ EC_GROUP_get_cofactor(const EC_GROUP *group, BIGNUM *cofactor, BN_CTX *ctx)
} }
LCRYPTO_ALIAS(EC_GROUP_get_cofactor); LCRYPTO_ALIAS(EC_GROUP_get_cofactor);
const BIGNUM *
EC_GROUP_get0_cofactor(const EC_GROUP *group)
{
return &group->cofactor;
}
void void
EC_GROUP_set_curve_name(EC_GROUP *group, int nid) EC_GROUP_set_curve_name(EC_GROUP *group, int nid)
{ {

View File

@ -1,4 +1,4 @@
/* $OpenBSD: ec_local.h,v 1.28 2024/10/03 06:24:07 tb Exp $ */ /* $OpenBSD: ec_local.h,v 1.29 2024/10/15 06:27:43 tb Exp $ */
/* /*
* Originally written by Bodo Moeller for the OpenSSL project. * Originally written by Bodo Moeller for the OpenSSL project.
*/ */
@ -356,6 +356,7 @@ int EC_POINT_get_Jprojective_coordinates(const EC_GROUP *group,
const EC_POINT *p, BIGNUM *x, BIGNUM *y, BIGNUM *z, BN_CTX *ctx); const EC_POINT *p, BIGNUM *x, BIGNUM *y, BIGNUM *z, BN_CTX *ctx);
/* Public API in OpenSSL */ /* Public API in OpenSSL */
const BIGNUM *EC_GROUP_get0_cofactor(const EC_GROUP *group);
const BIGNUM *EC_GROUP_get0_order(const EC_GROUP *group); const BIGNUM *EC_GROUP_get0_order(const EC_GROUP *group);
__END_HIDDEN_DECLS __END_HIDDEN_DECLS

View File

@ -1,4 +1,5 @@
[workspace] [workspace]
resolver = "2"
members = [ members = [
"openssl", "openssl",
"openssl-errors", "openssl-errors",

View File

@ -1,7 +1,8 @@
# $OpenBSD: Makefile,v 1.6 2020/09/16 14:02:23 mpi Exp $ # $OpenBSD: Makefile,v 1.7 2024/10/15 15:06:25 claudio Exp $
SUBDIR+= sigfpe siginfo_addr fpsig earlysig cansig sigaltstack_fork SUBDIR+= sigfpe siginfo_addr fpsig earlysig cansig sigaltstack_fork
SUBDIR+= sig-stop SUBDIR+= sig-stop
SUBDIR+= sig-stop3
SUBDIR+= siginfo-fault SUBDIR+= siginfo-fault
SUBDIR+= sigio SUBDIR+= sigio
SUBDIR+= signal-stress SUBDIR+= signal-stress

View File

@ -1,9 +1,10 @@
# $OpenBSD: Makefile,v 1.1 2024/09/04 04:34:14 tb Exp $ # $OpenBSD: Makefile,v 1.2 2024/10/15 21:03:10 tb Exp $
EOPENSSL = eopenssl32 EOPENSSL = eopenssl32
LDADD += -Wl,-rpath,/usr/local/lib/${EOPENSSL} -L/usr/local/lib/${EOPENSSL} LDADD += -Wl,-rpath,/usr/local/lib/${EOPENSSL} -L/usr/local/lib/${EOPENSSL}
CFLAGS += -I${.CURDIR}/ -I/usr/local/include/${EOPENSSL}/ CFLAGS += -I${.CURDIR}/ -I/usr/local/include/${EOPENSSL}/
CFLAGS += -DOPENSSL_SUPPRESS_DEPRECATED
.PATH: ${.CURDIR}/.. .PATH: ${.CURDIR}/..

View File

@ -1,4 +1,4 @@
/* $OpenBSD: pcb.h,v 1.5 2022/01/01 18:52:37 kettenis Exp $ */ /* $OpenBSD: pcb.h,v 1.6 2024/10/15 09:16:39 jsg Exp $ */
/* /*
* Copyright (c) 2016 Dale Rahn <drahn@dalerahn.com> * Copyright (c) 2016 Dale Rahn <drahn@dalerahn.com>
* *
@ -18,8 +18,6 @@
#define _MACHINE_PCB_H_ #define _MACHINE_PCB_H_
#include <machine/frame.h> #include <machine/frame.h>
#include <machine/pte.h>
#include <machine/reg.h> #include <machine/reg.h>
struct trapframe; struct trapframe;

View File

@ -1,4 +1,4 @@
/* $OpenBSD: kern_exit.c,v 1.237 2024/10/08 12:02:24 claudio Exp $ */ /* $OpenBSD: kern_exit.c,v 1.239 2024/10/15 13:49:26 claudio Exp $ */
/* $NetBSD: kern_exit.c,v 1.39 1996/04/22 01:38:25 christos Exp $ */ /* $NetBSD: kern_exit.c,v 1.39 1996/04/22 01:38:25 christos Exp $ */
/* /*
@ -172,7 +172,7 @@ exit1(struct proc *p, int xexit, int xsig, int flags)
/* proc is off ps_threads list so update accounting of process now */ /* proc is off ps_threads list so update accounting of process now */
tuagg_add_runtime(); tuagg_add_runtime();
tuagg_add_process(p->p_p, p); tuagg_add_process(pr, p);
if ((p->p_flag & P_THREAD) == 0) { if ((p->p_flag & P_THREAD) == 0) {
/* main thread gotta wait because it has the pid, et al */ /* main thread gotta wait because it has the pid, et al */
@ -502,7 +502,6 @@ dowait6(struct proc *q, idtype_t idtype, id_t id, int *statusp, int options,
{ {
int nfound; int nfound;
struct process *pr; struct process *pr;
struct proc *p;
int error; int error;
if (info != NULL) if (info != NULL)
@ -516,8 +515,6 @@ loop:
(idtype == P_PGID && id != pr->ps_pgid)) (idtype == P_PGID && id != pr->ps_pgid))
continue; continue;
p = pr->ps_mainproc;
nfound++; nfound++;
if ((options & WEXITED) && (pr->ps_flags & PS_ZOMBIE)) { if ((options & WEXITED) && (pr->ps_flags & PS_ZOMBIE)) {
*retval = pr->ps_pid; *retval = pr->ps_pid;
@ -571,11 +568,9 @@ loop:
memset(rusage, 0, sizeof(*rusage)); memset(rusage, 0, sizeof(*rusage));
return (0); return (0);
} }
if (p->p_stat == SSTOP && if (((pr->ps_flags & PS_TRACED) || (options & WUNTRACED)) &&
(pr->ps_flags & PS_WAITED) == 0 && (pr->ps_flags & PS_WAITED) == 0 &&
(p->p_flag & P_SUSPSINGLE) == 0 && (pr->ps_flags & PS_STOPPED)) {
((pr->ps_flags & PS_TRACED) ||
(options & WUNTRACED))) {
if ((options & WNOWAIT) == 0) if ((options & WNOWAIT) == 0)
atomic_setbits_int(&pr->ps_flags, PS_WAITED); atomic_setbits_int(&pr->ps_flags, PS_WAITED);

View File

@ -1,4 +1,4 @@
/* $OpenBSD: kern_proc.c,v 1.99 2024/07/08 13:17:12 claudio Exp $ */ /* $OpenBSD: kern_proc.c,v 1.100 2024/10/15 13:49:26 claudio Exp $ */
/* $NetBSD: kern_proc.c,v 1.14 1996/02/09 18:59:41 christos Exp $ */ /* $NetBSD: kern_proc.c,v 1.14 1996/02/09 18:59:41 christos Exp $ */
/* /*
@ -462,7 +462,7 @@ orphanpg(struct pgrp *pg)
struct process *pr; struct process *pr;
LIST_FOREACH(pr, &pg->pg_members, ps_pglist) { LIST_FOREACH(pr, &pg->pg_members, ps_pglist) {
if (pr->ps_mainproc->p_stat == SSTOP) { if (pr->ps_flags & PS_STOPPED) {
LIST_FOREACH(pr, &pg->pg_members, ps_pglist) { LIST_FOREACH(pr, &pg->pg_members, ps_pglist) {
prsignal(pr, SIGHUP); prsignal(pr, SIGHUP);
prsignal(pr, SIGCONT); prsignal(pr, SIGCONT);

View File

@ -1,4 +1,4 @@
/* $OpenBSD: kern_resource.c,v 1.91 2024/10/08 11:57:59 claudio Exp $ */ /* $OpenBSD: kern_resource.c,v 1.92 2024/10/15 12:26:53 claudio Exp $ */
/* $NetBSD: kern_resource.c,v 1.38 1996/10/23 07:19:38 matthias Exp $ */ /* $NetBSD: kern_resource.c,v 1.38 1996/10/23 07:19:38 matthias Exp $ */
/*- /*-
@ -448,7 +448,7 @@ tuagg_add_runtime(void)
{ {
struct schedstate_percpu *spc = &curcpu()->ci_schedstate; struct schedstate_percpu *spc = &curcpu()->ci_schedstate;
struct proc *p = curproc; struct proc *p = curproc;
struct timespec ts; struct timespec ts, delta;
/* /*
* Compute the amount of time during which the current * Compute the amount of time during which the current
@ -463,14 +463,14 @@ tuagg_add_runtime(void)
(long long)spc->spc_runtime.tv_sec, (long long)spc->spc_runtime.tv_sec,
spc->spc_runtime.tv_nsec); spc->spc_runtime.tv_nsec);
#endif #endif
timespecclear(&ts); timespecclear(&delta);
} else { } else {
timespecsub(&ts, &spc->spc_runtime, &ts); timespecsub(&ts, &spc->spc_runtime, &delta);
} }
/* update spc_runtime */ /* update spc_runtime */
spc->spc_runtime = ts; spc->spc_runtime = ts;
tu_enter(&p->p_tu); tu_enter(&p->p_tu);
timespecadd(&p->p_tu.tu_runtime, &ts, &p->p_tu.tu_runtime); timespecadd(&p->p_tu.tu_runtime, &delta, &p->p_tu.tu_runtime);
tu_leave(&p->p_tu); tu_leave(&p->p_tu);
} }

View File

@ -1,4 +1,4 @@
/* $OpenBSD: kern_sig.c,v 1.341 2024/10/09 08:58:19 claudio Exp $ */ /* $OpenBSD: kern_sig.c,v 1.342 2024/10/15 13:49:26 claudio Exp $ */
/* $NetBSD: kern_sig.c,v 1.54 1996/04/22 01:38:32 christos Exp $ */ /* $NetBSD: kern_sig.c,v 1.54 1996/04/22 01:38:32 christos Exp $ */
/* /*
@ -1100,6 +1100,8 @@ ptsignal(struct proc *p, int signum, enum signal_type type)
* Otherwise, process goes back to sleep state. * Otherwise, process goes back to sleep state.
*/ */
atomic_setbits_int(&pr->ps_flags, PS_CONTINUED); atomic_setbits_int(&pr->ps_flags, PS_CONTINUED);
atomic_clearbits_int(&pr->ps_flags,
PS_WAITED | PS_STOPPED);
atomic_clearbits_int(&p->p_flag, P_SUSPSIG); atomic_clearbits_int(&p->p_flag, P_SUSPSIG);
wakeparent = 1; wakeparent = 1;
if (action == SIG_DFL) if (action == SIG_DFL)
@ -1512,6 +1514,7 @@ proc_stop_sweep(void *v)
LIST_FOREACH(pr, &allprocess, ps_list) { LIST_FOREACH(pr, &allprocess, ps_list) {
if ((pr->ps_flags & PS_STOPPING) == 0) if ((pr->ps_flags & PS_STOPPING) == 0)
continue; continue;
atomic_setbits_int(&pr->ps_flags, PS_STOPPED);
atomic_clearbits_int(&pr->ps_flags, PS_STOPPING); atomic_clearbits_int(&pr->ps_flags, PS_STOPPING);
if ((pr->ps_pptr->ps_sigacts->ps_sigflags & SAS_NOCLDSTOP) == 0) if ((pr->ps_pptr->ps_sigacts->ps_sigflags & SAS_NOCLDSTOP) == 0)

View File

@ -1,4 +1,4 @@
/* $OpenBSD: if_arp.h,v 1.7 2017/01/24 10:08:30 krw Exp $ */ /* $OpenBSD: if_arp.h,v 1.8 2024/10/15 00:41:40 jsg Exp $ */
/* $NetBSD: if_arp.h,v 1.8 1995/03/08 02:56:52 cgd Exp $ */ /* $NetBSD: if_arp.h,v 1.8 1995/03/08 02:56:52 cgd Exp $ */
/* /*
@ -71,19 +71,4 @@ struct arphdr {
u_int8_t ar_tpa[]; /* target protocol address */ u_int8_t ar_tpa[]; /* target protocol address */
#endif #endif
}; };
/*
* ARP ioctl request
*/
struct arpreq {
struct sockaddr arp_pa; /* protocol address */
struct sockaddr arp_ha; /* hardware address */
int arp_flags; /* flags */
};
/* arp_flags and at_flags field values */
#define ATF_INUSE 0x01 /* entry in use */
#define ATF_COM 0x02 /* completed entry (enaddr valid) */
#define ATF_PERM 0x04 /* permanent entry */
#define ATF_PUBL 0x08 /* publish entry (respond for other host) */
#define ATF_USETRAILERS 0x10 /* has requested trailers */
#endif /* _NET_IF_ARP_H_ */ #endif /* _NET_IF_ARP_H_ */

View File

@ -1,4 +1,4 @@
/* $OpenBSD: proc.h,v 1.374 2024/10/08 12:02:24 claudio Exp $ */ /* $OpenBSD: proc.h,v 1.375 2024/10/15 13:49:26 claudio Exp $ */
/* $NetBSD: proc.h,v 1.44 1996/04/22 01:23:21 christos Exp $ */ /* $NetBSD: proc.h,v 1.44 1996/04/22 01:23:21 christos Exp $ */
/*- /*-
@ -304,15 +304,16 @@ struct process {
#define PS_NOBTCFI 0x02000000 /* No Branch Target CFI */ #define PS_NOBTCFI 0x02000000 /* No Branch Target CFI */
#define PS_ITIMER 0x04000000 /* Virtual interval timers running */ #define PS_ITIMER 0x04000000 /* Virtual interval timers running */
#define PS_CONTINUED 0x20000000 /* Continued proc not yet waited for */ #define PS_CONTINUED 0x20000000 /* Continued proc not yet waited for */
#define PS_STOPPED 0x40000000 /* Stopped process */
#define PS_BITS \ #define PS_BITS \
("\20" "\01CONTROLT" "\02EXEC" "\03INEXEC" "\04EXITING" "\05SUGID" \ ("\20" "\01CONTROLT" "\02EXEC" "\03INEXEC" "\04EXITING" "\05SUGID" \
"\06SUGIDEXEC" "\07PPWAIT" "\010ISPWAIT" "\011PROFIL" "\012TRACED" \ "\06SUGIDEXEC" "\07PPWAIT" "\010ISPWAIT" "\011PROFIL" "\012TRACED" \
"\013WAITED" "\014COREDUMP" "\015SINGLEEXIT" "\016SINGLEUNWIND" \ "\013WAITED" "\014COREDUMP" "\015SINGLEEXIT" "\016SINGLEUNWIND" \
"\017NOZOMBIE" "\020STOPPED" "\021SYSTEM" "\022EMBRYO" "\023ZOMBIE" \ "\017NOZOMBIE" "\020STOPPING" "\021SYSTEM" "\022EMBRYO" "\023ZOMBIE" \
"\024NOBROADCASTKILL" "\025PLEDGE" "\026WXNEEDED" "\027EXECPLEDGE" \ "\024NOBROADCASTKILL" "\025PLEDGE" "\026WXNEEDED" "\027EXECPLEDGE" \
"\030ORPHAN" "\031CHROOT" "\032NOBTCFI" "\033ITIMER" "\034PIN" \ "\030ORPHAN" "\031CHROOT" "\032NOBTCFI" "\033ITIMER" "\036CONTINUED" \
"\035LIBCPIN" "\036CONTINUED") "\037STOPPED")
struct kcov_dev; struct kcov_dev;
struct lock_list_entry; struct lock_list_entry;

View File

@ -33,8 +33,8 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\" .\"
.\" $OpenBSD: sshd_config.5,v 1.375 2024/10/06 23:37:17 djm Exp $ .\" $OpenBSD: sshd_config.5,v 1.376 2024/10/14 23:53:34 naddy Exp $
.Dd $Mdocdate: October 6 2024 $ .Dd $Mdocdate: October 14 2024 $
.Dt SSHD_CONFIG 5 .Dt SSHD_CONFIG 5
.Os .Os
.Sh NAME .Sh NAME
@ -1846,6 +1846,13 @@ via
.Cm AcceptEnv .Cm AcceptEnv
or or
.Cm PermitUserEnvironment . .Cm PermitUserEnvironment .
.It Cm SshdAuthPath
Overrides the default path to the
.Cm sshd-auth
binary that is invoked to complete user authentication.
The default is
.Pa /usr/libexec/sshd-auth .
This option is intended for use by tests.
.It Cm SshdSessionPath .It Cm SshdSessionPath
Overrides the default path to the Overrides the default path to the
.Cm sshd-session .Cm sshd-session