summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* src: Do not use deprecated functions.Andreas Schneider2014-01-169-35/+35
|
* include: Mark functions as deprecated!Andreas Schneider2014-01-161-45/+45
|
* bind: fix possible double-frees in ssh_bind_freeJon Simons2014-01-161-0/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Make sure to explicitly set key pointers to NULL following the use of 'ssh_key_free' throughout bind.c. Before this change, a double free can happen via 'ssh_bind_free' as in this example callpath: // create an ssh_bind ssh_bind b = ssh_bind_new(); // provide a path to a wrong key-type ssh_bind_options_set(b, SSH_BIND_OPTIONS_DSAKEY, path_to_rsa_key); // initialize set key-type ssh_bind_listen(b); -> error path "The DSA host key has the wrong type: %d", ssh_key_free(sshbind->dsa) -> ssh_key_clean(key) // OK -> SAFE_FREE(key) // OK, but, sshbind->dsa is *not* set to NULL // ssh_bind_listen failed, so clean up ssh_bind ssh_bind_free(b); -> ssh_key_free(sshbind->dsa) // double-free here To fix, set pointers to NULL that have been free'd with 'ssh_key_free'. Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* doc: Add changes to the forwarding tutorial.Andreas Schneider2014-01-161-5/+6
|
* channel: Fix the name scheme of the forward functions.Andreas Schneider2014-01-165-24/+40
|
* channel: Add ssh_channel_accept_forward().Oleksandr Shneyder2014-01-162-3/+24
| | | | | | | | This works same way as ssh_forward_accept() but can return a destination port of the channel (useful if SSH connection forwarding several TCP/IP ports). Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* Rename build directory to obj.Andreas Schneider2014-01-163-2/+2
| | | | | Some buildsystem use build in the pathname and so we will filter out e.g. docs generation.
* threads: support libgcrypt 1.6 hackAris Adamantiadis2014-01-083-2/+26
| | | | | | | Not 100% satisfied of this patch, but the way libgcrypt handles threading in 1.6 is not compatible with custom handlers. The new code basicaly uses pthreads in every case. This will probably not work on windows.
* include: Remove warning cause VSC doesn't know about it.Andreas Schneider2014-01-081-1/+0
|
* include: Fix building if we do not have asm volatile.Andreas Schneider2014-01-081-1/+2
|
* src: Update my mail address.Andreas Schneider2014-01-0719-19/+19
|
* cmake: Remove unused macro modules.Andreas Schneider2014-01-075-108/+0
|
* update copyright informationAris Adamantiadis2014-01-0720-26/+26
|
* tests: avoid reading uninitialized bytesAris Adamantiadis2014-01-071-2/+2
|
* pki: fix gcrypt signature processAris Adamantiadis2014-01-071-1/+1
|
* examples: Make sure buffer is initialized.Andreas Schneider2014-01-071-1/+1
|
* example: Add missing include for forkpty().Andreas Schneider2014-01-071-0/+3
|
* test: fixed torture_auth_none conditionAris Adamantiadis2014-01-061-2/+2
|
* test: test case for async auth_noneAris Adamantiadis2014-01-061-0/+59
| | | | This test currently fails
* tests: auth_agent_nonblocking should run in nonblockingAris Adamantiadis2014-01-061-0/+2
|
* tests: use LC_LIBSSH instead of LANG for env tests.Aris Adamantiadis2014-01-061-2/+2
| | | | | LANG is stripped and replaced on many distros and LC_* is accepted by default on debian
* session: Fix a possible memory leak.Andreas Schneider2014-01-051-0/+1
|
* poll: fix poll_handles ownershipsAris Adamantiadis2014-01-051-5/+27
|
* socket: don't attempt reading a non-connected socketAris Adamantiadis2014-01-051-1/+1
|
* examples: Fix building samplesshd-tty on FreeBSD.Andreas Schneider2013-12-261-2/+2
|
* poll: Correctly free ssh_event_fd_wrapper.Andreas Schneider2013-12-221-3/+9
| | | | This is allocated by ssh_event_add_fd.
* config: Support expansion in the Host variable too.Andreas Schneider2013-12-211-9/+18
| | | | BUG: https://red.libssh.org/issues/127
* tests: Fix non-blocking auth tests.Andreas Schneider2013-12-151-7/+15
| | | | | | The ssh_userauth_none() call should already be non-blocking. However this this function is broken in non-blocking mode. It should reveal the existing bug.
* tests: Fix blocking mode in password auth test.Andreas Schneider2013-12-151-1/+1
|
* tests: Use new auth API in the torture_session test.Andreas Schneider2013-12-151-2/+3
|
* tests: Use new auth API in the torture_auth test.Andreas Schneider2013-12-151-10/+19
|
* tests: Fix pki test with gcrypt.Andreas Schneider2013-12-111-0/+4
|
* channel: fix setting of channel->flagsJon Simons2013-12-111-3/+3
| | | | | | | | Fix the setting of 'channel->flags' to use '|='. Before this change, one bug symptom can be that channels are never fully free'd via ssh_channel_free, resulting in memory leaks. Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* client: use ssh_channel_do_free in ssh_disconnectJon Simons2013-12-111-1/+1
| | | | | | | | | | Ensure to use 'ssh_channel_do_free' in 'ssh_disconnect', when removing and free'ing up a session's channels. This matches the behavior in 'ssh_free', and is necessary to fully free any channel which may not have been closed completely (see usage of flags SSH_CHANNEL_FLAG_CLOSED_REMOTE, SSH_CHANNEL_FLAG_FREED_LOCAL). Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* bind: Correctly free all memory in ssh_bind_free().Andreas Schneider2013-12-091-3/+7
| | | | Thanks to Jacob Baines.
* session: Add ssh_get_clientbanner().Jon Simons2013-12-072-0/+16
|
* channels: Add a ssh_channel_read_timeout function.Andreas Schneider2013-12-042-3/+44
|
* tests: Try to fix torture_forward.Andreas Schneider2013-12-041-4/+4
|
* tests: Fix memory leaks.Andreas Schneider2013-11-281-0/+9
|
* tests: Add missing line breaks.Andreas Schneider2013-11-281-2/+2
|
* pki: Fix a memory leak.Andreas Schneider2013-11-281-0/+1
| | | | CID #1132819
* tests: Add torture_pki_write_privkey_ecdsa test.Andreas Schneider2013-11-271-0/+44
|
* tests: Add torture_pki_write_privkey_dsa test.Andreas Schneider2013-11-271-0/+40
|
* tests: Add torture_pki_write_privkey_rsa test.Andreas Schneider2013-11-271-0/+40
|
* pki: Add ssh_pki_import_privkey_file().Andreas Schneider2013-11-272-0/+63
|
* pki_crypto: Add pki_private_key_to_pem().Andreas Schneider2013-11-271-0/+118
|
* pki_gcrypt: Add pki_private_key_to_pem() stub.Andreas Schneider2013-11-272-0/+18
|
* curve25519: Fix memory leaks in ssh_server_curve25519_init().Andreas Schneider2013-11-271-20/+23
| | | | CID #1125255
* curve25519: Do not leak q_s_string.Andreas Schneider2013-11-271-0/+1
| | | | CID #1125256
* curve25519: Fix a memory leak.Andreas Schneider2013-11-271-1/+1
| | | | CID #1125257