Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2013-11-03 | socket: Fix check for pending data. | Aris Adamantiadis | 1 | -3/+3 | |
BUG: https://red.libssh.org/issues/119 Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
2013-11-03 | server: Fix ssh_execute_server_callbacks() client execution | Nicolas Viennot | 1 | -4/+2 | |
When the public key auth handler is executed and returns SSH_OK, ssh_execute_server_callbacks() still runs some client callbacks, which may set rc to SSH_AGAIN, which triggers a default reply on auth, denying auth. Signed-off-by: Nicolas Viennot <nicolas@viennot.biz> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
2013-11-03 | server kex: enable delayed compression | Nicolas Viennot | 1 | -4/+14 | |
The code is careful to reenable compression when rekeying. Signed-off-by: Nicolas Viennot <nicolas@viennot.biz> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
2013-11-03 | session: Make sure we correctly burn the buffer. | Andreas Schneider | 1 | -1/+1 | |
2013-11-03 | wrapper: Make sure we really burn the buffer. | Andreas Schneider | 1 | -1/+1 | |
2013-11-02 | server: fix pubkey reply for key probes | Jon Simons | 1 | -1/+9 | |
Per RFC 4252, it is required to send back only one of either SSH_MSG_USERAUTH_PK_OK or SSH_MSG_USERAUTH_FAILURE for public key probes. Update the handling of 'auth_pubkey_function' to send back PK_OK instead of SSH_MSG_USERAUTH_SUCCESS for the case that the state of the message at hand is SSH_PUBLICKEY_STATE_NONE. With this change, it is now possible to process an initial key probe and then subsequent signature validation using the server callbacks. Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
2013-11-02 | ssh_options_get can now return ProxyCommand | William Orr | 1 | -0/+9 | |
Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
2013-10-31 | connect: fix memory leak in ssh_select | Jon Simons | 1 | -2/+9 | |
Balance 'ssh_event_add_fd' with 'ssh_event_remove_fd' in 'ssh_select'. BUG: https://red.libssh.org/issues/128 Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
2013-10-31 | poll: fix leak in ssh_poll_ctx_free | Jon Simons | 1 | -1/+5 | |
Fix a memory leak in 'ssh_poll_ctx_free': issue 'ssh_poll_free' to remove the poll handle from its context and free it. BUG: https://red.libssh.org/issues/128 Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
2013-10-24 | bind: fix leak in ssh_bind_accept error path | Jon Simons | 1 | -2/+1 | |
Use 'ssh_socket_free' to cleanup if 'ssh_bind_accept_fd' fails, to be sure to free the ssh_socket in/out buffers. | |||||
2013-10-23 | auth: docs: Fix typo optoins -> options | Colin Walters | 1 | -6/+6 | |
I'm just getting my feet wet with this codebase. Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
2013-10-20 | channel: Reinit the buffer and reset the state on error. | Andreas Schneider | 1 | -23/+46 | |
BUG: https://red.libssh.org/issues/126 | |||||
2013-10-20 | channel: Fix ssh_global_request_termination(). | Andreas Schneider | 1 | -1/+1 | |
BUG: https://red.libssh.org/issues/126 | |||||
2013-10-19 | pki: Don't leak a buffer. | Andreas Schneider | 1 | -0/+2 | |
2013-10-18 | pki_crpypto: Fix ecdsa signature to blob. | Andreas Schneider | 1 | -12/+26 | |
BUG: https://red.libssh.org/issues/118 | |||||
2013-10-18 | pki: Add support for ECDSA private key signing. | Andreas Schneider | 1 | -14/+34 | |
2013-10-18 | pki: Add the type as a char pointer. | Andreas Schneider | 2 | -2/+5 | |
2013-10-18 | wrapper: Add more evp functions. | Andreas Schneider | 1 | -0/+24 | |
2013-10-18 | client: Fix the build. | Andreas Schneider | 1 | -1/+0 | |
2013-10-18 | scp: Fixed result of ssh_scp_string_mode() to get SCP working. | Oliver Stöneberg | 1 | -1/+1 | |
Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
2013-10-18 | client: Added a missing NULL pointer check. | Oliver Stöneberg | 1 | -8/+13 | |
Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
2013-10-01 | channel: Fix packets termination timeout in global_request(). | Andreas Schneider | 1 | -1/+1 | |
BUG: https://red.libssh.org/issues/126 | |||||
2013-10-01 | session: Try the ecdsa default key first. | Andreas Schneider | 1 | -0/+11 | |
2013-09-27 | callbacks: add support for auth_none_function | Tristan CACQUERAY | 1 | -0/+11 | |
2013-09-27 | kex: implement curve25519-sha256@libssh.org | Aris Adamantiadis | 7 | -2/+346 | |
2013-09-17 | channels: Correctly handle timeouts in channel functions. | Andreas Schneider | 1 | -5/+14 | |
2013-09-17 | channel: Use the correct timeout option in channel_open(). | Andreas Schneider | 1 | -1/+5 | |
BUG: https://red.libssh.org/issues/124 | |||||
2013-09-16 | session: Document return value of ssh_get_serverbanner(). | Andreas Schneider | 1 | -0/+3 | |
BUG: https://red.libssh.org/issues/122 | |||||
2013-09-16 | session: Remove obsolete status variables. | Andreas Schneider | 1 | -6/+4 | |
BUG: https://red.libssh.org/issues/121 | |||||
2013-09-16 | client: Add example code for ssh_get_openssh_version(). | Andreas Schneider | 1 | -0/+8 | |
BUG: https://red.libssh.org/issues/120 | |||||
2013-09-16 | channels: Correctly decrement timeout value in ssh_channel_accept(). | Andreas Schneider | 1 | -2/+5 | |
BUG: https://red.libssh.org/issues/116 | |||||
2013-09-16 | channel: Document SSH_AGAIN in ssh_channel_read(). | Andreas Schneider | 1 | -2/+2 | |
BUG: https://red.libssh.org/issues/115 | |||||
2013-09-10 | doc: Improve the PKI documentation a bit. | Andreas Schneider | 1 | -14/+18 | |
2013-09-09 | doc: Update documentation of ssh_set_blocking(). | Andreas Schneider | 1 | -2/+0 | |
This should work correctly in libssh 0.6.0. If not then you hit a bug. | |||||
2013-08-13 | ecdh: Refactor ecdh_build_k to check errors codes. | Andreas Schneider | 1 | -14/+40 | |
2013-08-13 | channel: Refactor channel_write_common() code. | Andreas Schneider | 1 | -16/+37 | |
This makes it easier to read and easier to debug. | |||||
2013-08-13 | channel: Make channel_write_common() static. | Andreas Schneider | 1 | -2/+4 | |
2013-08-13 | channel: Use MIN macro in channel_write_common(). | Andreas Schneider | 1 | -2/+4 | |
2013-08-12 | scp: Document more scp functionts. | Andreas Schneider | 1 | -3/+31 | |
2013-08-05 | server kex: Fix server side compression typo | Nicolas Viennot | 1 | -2/+3 | |
The original code had a typo (COMP was CRYPT). This fixes the zlib compression method. Signed-off-by: Nicolas Viennot <nicolas@viennot.biz> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
2013-07-26 | session: Add parentheses to fix a build warning. | Andreas Schneider | 1 | -1/+1 | |
2013-07-25 | session: Handle session state in ssh_get_status(). | Andreas Schneider | 1 | -1/+2 | |
BUG: https://red.libssh.org/issues/109 | |||||
2013-07-25 | session: ssh_handle_packets_termination() SSH_AGAIN bug fix | Nicolas Viennot | 1 | -0/+1 | |
ssh_handle_packets_termination() must not return SSH_OK when exiting due to a timeout while the termination function still returns 1. Signed-off-by: Nicolas Viennot <nicolas@viennot.biz> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
2013-07-25 | channels: allow channel_open() to return SSH_AGAIN | Nicolas Viennot | 1 | -1/+1 | |
Signed-off-by: Nicolas Viennot <nicolas@viennot.biz> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
2013-07-25 | gssapi: Fix a build warning if we build without server support. | Andreas Schneider | 1 | -5/+1 | |
2013-07-24 | cmake: Rewrote FindGSSAPI.cmake. | Andreas Schneider | 1 | -5/+10 | |
2013-07-24 | gssapi: Fix include with Heimdal. | Andreas Schneider | 1 | -1/+1 | |
2013-07-23 | gssapi: Fix a memory leak in ssh_gssapi_auth_mic(). | Andreas Schneider | 1 | -0/+1 | |
CID: 1046708 | |||||
2013-07-23 | callbacks: Fix value assigning. | Andreas Schneider | 1 | -1/+1 | |
CID: 1046709 | |||||
2013-07-23 | cmake: Check for unistd.h. | Andreas Schneider | 5 | -15/+29 | |