aboutsummaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)AuthorFilesLines
2011-09-02poll: resolve use-after-free + inconsistent callbacks callAris Adamantiadis1-18/+3
This code was weird in the first place. I suspect my change will break something else (probably the appcode that needed it). ssh_poll_ctx_free is not a good place to send exception callbacks imho.
2011-09-02channels: ssh_channel_select implemented with ssh_pollAris Adamantiadis1-50/+34
Should fix #56
2011-09-02channel: implement ssh_channel_poll_timeoutAris Adamantiadis1-0/+55
Resolves bug #57
2011-09-02Channels: increase window size x10Aris Adamantiadis1-1/+1
Provides me a 3x performance boost for async sftp, 5x for sync sftp (on localhost)
2011-09-02channels: made the remaining calls nonblocking + fix #52Aris Adamantiadis1-22/+59
2011-09-02channels: use hard random for the X11 cookieAris Adamantiadis1-3/+5
We are in a security library or we are not.
2011-09-02channels: made all channel requests nonblockingAris Adamantiadis1-31/+104
2011-09-02scp: Fixed documentation bug #9Aris Adamantiadis1-2/+6
2011-08-30pki: Check the type of the key blob earlier.Andreas Schneider1-2/+9
2011-08-30keys: Remove keys.h where it is obsolete.Andreas Schneider3-3/+0
2011-08-30keys: Remove obsolete keys.c.Andreas Schneider2-50/+0
2011-08-30keys: Move publickey_from_privatekey() to legacy.c.Andreas Schneider2-194/+31
2011-08-30keys: Move publickey_free() to legacy.c.Andreas Schneider2-28/+29
2011-08-30Include stdio.h for snprintfmilo1-0/+1
2011-08-30pki: Use consistent API for ssh_pki_export_privkey_to_pubkey().Andreas Schneider3-9/+23
2011-08-30pki: Use consistent API for ssh_pki_export_pubkey_blob().Andreas Schneider6-22/+43
2011-08-29pki: Fix session_id hashing.Andreas Schneider1-2/+2
I don't understand why this code worked before. It was completly wrong.
2011-08-29channels: Fix possible infinite loop in channel_read().rofl0r1-1/+5
2011-08-29sftp: Handle short reads of sftp_async_read().Jonas Jonsson1-3/+2
sftp_async_read() and sftp_async_read_begin() assume that the whole read will be successful but when this is not the case, the offset will be wrong. Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
2011-08-28pki: string_* -> ssh_string_*Andreas Schneider1-4/+4
2011-08-28pki: Refactor ssh_pki_do_sign().Andreas Schneider1-10/+11
2011-08-28pki: Refactor _RSA_do_sign().Andreas Schneider1-15/+31
2011-08-28pki: Cleanup crypto includes.Andreas Schneider1-2/+0
2011-08-28pki: Fix gcrypt includes and update copyright.Andreas Schneider1-8/+3
2011-08-28pki: Get rid of the string.h include in pki_gcrypt.c.Andreas Schneider1-17/+28
2011-08-28pki: Add Windows defines.Andreas Schneider1-0/+14
2011-08-28pki: Compile pki_gcrypt.c only if we need it.Andreas Schneider2-30/+2
2011-08-28keyfiles: Remove keyfiles.h.Andreas Schneider4-9/+0
2011-08-28keyfiles: Remove try_publickey_from_file().Andreas Schneider1-83/+0
2011-08-28keyfiles: Make ssh_try_publickey_from_file() legacy.Andreas Schneider2-63/+65
2011-08-28keyfiles: Make ssh_try_publickey_from_file() legacy.Andreas Schneider2-78/+70
2011-08-28auth: Refactor and rename kbdauth_send().Andreas Schneider1-67/+65
2011-08-27auth: Fix doc typos.Andreas Schneider1-4/+4
2011-08-26auth: Handle request service timeout in blocking mode.Andreas Schneider1-2/+7
2011-08-26pki: Handle hash correctly.Andreas Schneider3-48/+54
Looks like only DSA in grypt needs a leading zero to mark the has as positive. See http://lists.gnupg.org/pipermail/gcrypt-devel/2005-February/000754.html
2011-08-26Quick fix for gcrypt DSA signaturemilo1-5/+22
2011-08-26legacy: Remove privatekey_from_base64().Andreas Schneider1-34/+0
This function has been introduced for libssh 0.6. So we can remove it completely.
2011-08-26messages: Fix ssh_packet_userauth_request().Andreas Schneider1-11/+3
Remove useless ssh_pki_import_signature_blob().
2011-08-26Free sig_blob if an error occursmilo1-0/+2
2011-08-26Fix double free in ssh_packet_userauth_requestmilo1-1/+0
2011-08-26auth: Refactor and fix ssh_userauth_kbdint().Andreas Schneider1-45/+30
2011-08-26auth: Fix ssh_userauth_agent_publickey pending state.Andreas Schneider1-2/+2
2011-08-26auth: Don't fail in publickey_auto if we can't read the key.Andreas Schneider1-1/+4
We should go on and try the next one as it was before. Also make sure we don't leak memory ;)
2011-08-26auth: Fix ssh_userauth_publickey() pending_call_state.Andreas Schneider1-3/+3
2011-08-26keys: Remove obsolete signatue functions.Andreas Schneider2-115/+0
2011-08-26pki: Fix build with DEBUG_CRYPTO.Andreas Schneider1-4/+4
2011-08-26pki: Migrate ssh_pki_do_sign to new pki.Andreas Schneider3-62/+80
2011-08-26auth: Fix a segfault in ssh_userauth_kbdint_init().Andreas Schneider1-0/+4
2011-08-25auth: Refactor kbdauth_init().Andreas Schneider1-60/+94
Rename it to ssh_userauth_kbdint_init.
2011-08-25auth: Prefix kbdint functions.Andreas Schneider3-78/+77