aboutsummaryrefslogtreecommitdiff
path: root/src
AgeCommit message (Collapse)AuthorFilesLines
2013-11-03socket: Fix check for pending data.Aris Adamantiadis1-3/+3
BUG: https://red.libssh.org/issues/119 Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-11-03server: Fix ssh_execute_server_callbacks() client executionNicolas Viennot1-4/+2
When the public key auth handler is executed and returns SSH_OK, ssh_execute_server_callbacks() still runs some client callbacks, which may set rc to SSH_AGAIN, which triggers a default reply on auth, denying auth. Signed-off-by: Nicolas Viennot <nicolas@viennot.biz> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-11-03server kex: enable delayed compressionNicolas Viennot1-4/+14
The code is careful to reenable compression when rekeying. Signed-off-by: Nicolas Viennot <nicolas@viennot.biz> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-11-03session: Make sure we correctly burn the buffer.Andreas Schneider1-1/+1
2013-11-03wrapper: Make sure we really burn the buffer.Andreas Schneider1-1/+1
2013-11-02server: fix pubkey reply for key probesJon Simons1-1/+9
Per RFC 4252, it is required to send back only one of either SSH_MSG_USERAUTH_PK_OK or SSH_MSG_USERAUTH_FAILURE for public key probes. Update the handling of 'auth_pubkey_function' to send back PK_OK instead of SSH_MSG_USERAUTH_SUCCESS for the case that the state of the message at hand is SSH_PUBLICKEY_STATE_NONE. With this change, it is now possible to process an initial key probe and then subsequent signature validation using the server callbacks. Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-11-02ssh_options_get can now return ProxyCommandWilliam Orr1-0/+9
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-10-31connect: fix memory leak in ssh_selectJon Simons1-2/+9
Balance 'ssh_event_add_fd' with 'ssh_event_remove_fd' in 'ssh_select'. BUG: https://red.libssh.org/issues/128 Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-10-31poll: fix leak in ssh_poll_ctx_freeJon Simons1-1/+5
Fix a memory leak in 'ssh_poll_ctx_free': issue 'ssh_poll_free' to remove the poll handle from its context and free it. BUG: https://red.libssh.org/issues/128 Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-10-24bind: fix leak in ssh_bind_accept error pathJon Simons1-2/+1
Use 'ssh_socket_free' to cleanup if 'ssh_bind_accept_fd' fails, to be sure to free the ssh_socket in/out buffers.
2013-10-23auth: docs: Fix typo optoins -> optionsColin Walters1-6/+6
I'm just getting my feet wet with this codebase. Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-10-20channel: Reinit the buffer and reset the state on error.Andreas Schneider1-23/+46
BUG: https://red.libssh.org/issues/126
2013-10-20channel: Fix ssh_global_request_termination().Andreas Schneider1-1/+1
BUG: https://red.libssh.org/issues/126
2013-10-19pki: Don't leak a buffer.Andreas Schneider1-0/+2
2013-10-18pki_crpypto: Fix ecdsa signature to blob.Andreas Schneider1-12/+26
BUG: https://red.libssh.org/issues/118
2013-10-18pki: Add support for ECDSA private key signing.Andreas Schneider1-14/+34
2013-10-18pki: Add the type as a char pointer.Andreas Schneider2-2/+5
2013-10-18wrapper: Add more evp functions.Andreas Schneider1-0/+24
2013-10-18client: Fix the build.Andreas Schneider1-1/+0
2013-10-18scp: Fixed result of ssh_scp_string_mode() to get SCP working.Oliver Stöneberg1-1/+1
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-10-18client: Added a missing NULL pointer check.Oliver Stöneberg1-8/+13
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-10-01channel: Fix packets termination timeout in global_request().Andreas Schneider1-1/+1
BUG: https://red.libssh.org/issues/126
2013-10-01session: Try the ecdsa default key first.Andreas Schneider1-0/+11
2013-09-27callbacks: add support for auth_none_functionTristan CACQUERAY1-0/+11
2013-09-27kex: implement curve25519-sha256@libssh.orgAris Adamantiadis7-2/+346
2013-09-17channels: Correctly handle timeouts in channel functions.Andreas Schneider1-5/+14
2013-09-17channel: Use the correct timeout option in channel_open().Andreas Schneider1-1/+5
BUG: https://red.libssh.org/issues/124
2013-09-16session: Document return value of ssh_get_serverbanner().Andreas Schneider1-0/+3
BUG: https://red.libssh.org/issues/122
2013-09-16session: Remove obsolete status variables.Andreas Schneider1-6/+4
BUG: https://red.libssh.org/issues/121
2013-09-16client: Add example code for ssh_get_openssh_version().Andreas Schneider1-0/+8
BUG: https://red.libssh.org/issues/120
2013-09-16channels: Correctly decrement timeout value in ssh_channel_accept().Andreas Schneider1-2/+5
BUG: https://red.libssh.org/issues/116
2013-09-16channel: Document SSH_AGAIN in ssh_channel_read().Andreas Schneider1-2/+2
BUG: https://red.libssh.org/issues/115
2013-09-10doc: Improve the PKI documentation a bit.Andreas Schneider1-14/+18
2013-09-09doc: Update documentation of ssh_set_blocking().Andreas Schneider1-2/+0
This should work correctly in libssh 0.6.0. If not then you hit a bug.
2013-08-13ecdh: Refactor ecdh_build_k to check errors codes.Andreas Schneider1-14/+40
2013-08-13channel: Refactor channel_write_common() code.Andreas Schneider1-16/+37
This makes it easier to read and easier to debug.
2013-08-13channel: Make channel_write_common() static.Andreas Schneider1-2/+4
2013-08-13channel: Use MIN macro in channel_write_common().Andreas Schneider1-2/+4
2013-08-12scp: Document more scp functionts.Andreas Schneider1-3/+31
2013-08-05server kex: Fix server side compression typoNicolas Viennot1-2/+3
The original code had a typo (COMP was CRYPT). This fixes the zlib compression method. Signed-off-by: Nicolas Viennot <nicolas@viennot.biz> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-07-26session: Add parentheses to fix a build warning.Andreas Schneider1-1/+1
2013-07-25session: Handle session state in ssh_get_status().Andreas Schneider1-1/+2
BUG: https://red.libssh.org/issues/109
2013-07-25session: ssh_handle_packets_termination() SSH_AGAIN bug fixNicolas Viennot1-0/+1
ssh_handle_packets_termination() must not return SSH_OK when exiting due to a timeout while the termination function still returns 1. Signed-off-by: Nicolas Viennot <nicolas@viennot.biz> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-07-25channels: allow channel_open() to return SSH_AGAINNicolas Viennot1-1/+1
Signed-off-by: Nicolas Viennot <nicolas@viennot.biz> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
2013-07-25gssapi: Fix a build warning if we build without server support.Andreas Schneider1-5/+1
2013-07-24cmake: Rewrote FindGSSAPI.cmake.Andreas Schneider1-5/+10
2013-07-24gssapi: Fix include with Heimdal.Andreas Schneider1-1/+1
2013-07-23gssapi: Fix a memory leak in ssh_gssapi_auth_mic().Andreas Schneider1-0/+1
CID: 1046708
2013-07-23callbacks: Fix value assigning.Andreas Schneider1-1/+1
CID: 1046709
2013-07-23cmake: Check for unistd.h.Andreas Schneider5-15/+29