summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* tests: Fix non-blocking auth tests.Andreas Schneider2013-12-151-7/+15
| | | | | | The ssh_userauth_none() call should already be non-blocking. However this this function is broken in non-blocking mode. It should reveal the existing bug.
* tests: Fix blocking mode in password auth test.Andreas Schneider2013-12-151-1/+1
|
* tests: Use new auth API in the torture_session test.Andreas Schneider2013-12-151-2/+3
|
* tests: Use new auth API in the torture_auth test.Andreas Schneider2013-12-151-10/+19
|
* tests: Fix pki test with gcrypt.Andreas Schneider2013-12-111-0/+4
|
* channel: fix setting of channel->flagsJon Simons2013-12-111-3/+3
| | | | | | | | Fix the setting of 'channel->flags' to use '|='. Before this change, one bug symptom can be that channels are never fully free'd via ssh_channel_free, resulting in memory leaks. Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* client: use ssh_channel_do_free in ssh_disconnectJon Simons2013-12-111-1/+1
| | | | | | | | | | Ensure to use 'ssh_channel_do_free' in 'ssh_disconnect', when removing and free'ing up a session's channels. This matches the behavior in 'ssh_free', and is necessary to fully free any channel which may not have been closed completely (see usage of flags SSH_CHANNEL_FLAG_CLOSED_REMOTE, SSH_CHANNEL_FLAG_FREED_LOCAL). Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* bind: Correctly free all memory in ssh_bind_free().Andreas Schneider2013-12-091-3/+7
| | | | Thanks to Jacob Baines.
* session: Add ssh_get_clientbanner().Jon Simons2013-12-072-0/+16
|
* channels: Add a ssh_channel_read_timeout function.Andreas Schneider2013-12-042-3/+44
|
* tests: Try to fix torture_forward.Andreas Schneider2013-12-041-4/+4
|
* tests: Fix memory leaks.Andreas Schneider2013-11-281-0/+9
|
* tests: Add missing line breaks.Andreas Schneider2013-11-281-2/+2
|
* pki: Fix a memory leak.Andreas Schneider2013-11-281-0/+1
| | | | CID #1132819
* tests: Add torture_pki_write_privkey_ecdsa test.Andreas Schneider2013-11-271-0/+44
|
* tests: Add torture_pki_write_privkey_dsa test.Andreas Schneider2013-11-271-0/+40
|
* tests: Add torture_pki_write_privkey_rsa test.Andreas Schneider2013-11-271-0/+40
|
* pki: Add ssh_pki_import_privkey_file().Andreas Schneider2013-11-272-0/+63
|
* pki_crypto: Add pki_private_key_to_pem().Andreas Schneider2013-11-271-0/+118
|
* pki_gcrypt: Add pki_private_key_to_pem() stub.Andreas Schneider2013-11-272-0/+18
|
* curve25519: Fix memory leaks in ssh_server_curve25519_init().Andreas Schneider2013-11-271-20/+23
| | | | CID #1125255
* curve25519: Do not leak q_s_string.Andreas Schneider2013-11-271-0/+1
| | | | CID #1125256
* curve25519: Fix a memory leak.Andreas Schneider2013-11-271-1/+1
| | | | CID #1125257
* examples: Fix else branch.Andreas Schneider2013-11-271-1/+2
| | | | CID #1127816
* packet: Remove logically dead code.Andreas Schneider2013-11-271-3/+1
| | | | CID #1128796
* tests: Try to fix valgrind warnings.Andreas Schneider2013-11-272-4/+4
|
* tests: Fix a valgrind warning.Andreas Schneider2013-11-271-0/+1
|
* ecdh: Check if we have ECC support.Andreas Schneider2013-11-272-2/+7
|
* ecdh: Use bignum_bin2bn.Andreas Schneider2013-11-272-2/+2
|
* server: Add a ssh_send_keepalive() function.Nicolas Viennot2013-11-242-0/+43
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* channel: fix infinite loop in channel_write_commonJon Simons2013-11-221-1/+3
| | | | | | BUG: https://red.libssh.org/issues/130 Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* flush channel after EOF and CLOSERod Vagg2013-11-181-0/+8
|
* logging: fix server-side loggingAris Adamantiadis2013-11-181-2/+3
|
* gssapi: fix loggingAris Adamantiadis2013-11-181-14/+14
|
* sockets: null pointer checkAris Adamantiadis2013-11-181-5/+7
|
* gssapi: Fix support of delegated credentialsSimo Sorce2013-11-151-23/+37
| | | | | | | | | | | | In a previous refactoring patch, the code underpinning the ssh_gssapi_set_creds() API was inadvertently removed. This patch fixes the problem. Also clarify what variable holds which credentials and insure that credentials created within the library are propelry freed. Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* gssapi: Add support for GSSAPIDelegateCredentials config option.Simo Sorce2013-11-152-1/+12
| | | | | Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* options: Add SSH_OPTIONS_GSSAPI_DELEGATE_CREDENTIALS option.Simo Sorce2013-11-153-1/+18
| | | | | Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* gssapi: Add error checks and cleanup the code in ssh_gssapi_auth_mic().Andreas Schneider2013-11-151-2/+13
|
* gssapi: Use GSSAPIClientIdentity to acquire credsSimo Sorce2013-11-151-3/+23
| | | | | Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* gssapi: Add support for GSSAPIClientIdentity config option.Andreas Schneider2013-11-151-1/+9
|
* options: Add SSH_OPTIONS_GSSAPI_CLIENT_IDENTITY option.Andreas Schneider2013-11-154-1/+22
|
* gssapi: Add support for GSSAPIServerIdentity config option.Andreas Schneider2013-11-151-1/+9
|
* gssapi: Add suppport to set GSSAPI server identity.Andreas Schneider2013-11-155-2/+28
|
* Fix gssapi credential handling.Simo Sorce2013-11-151-105/+65
| | | | | | | | | | | - Properly acquire and inquitre credentials to get the list of available credentials. - Avoid enforcing a specific username it breaks some use cases (k5login). - Remove confusing references to delegated credentials as there is no code that actually uses delegated credentials in the initialization case. Signed-off-by: Siom Sorce <simo@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* socket: Fix connect if we pass in a fd.Andreas Schneider2013-11-151-9/+13
| | | | | | BUG: https://red.libssh.org/issues/106 Thanks to Saju Panikulam.
* packet: Remove dead code.Andreas Schneider2013-11-141-6/+0
|
* packet: Set the packet to the processed data position.Andreas Schneider2013-11-141-1/+1
| | | | Else we could end up with packet - current_macsize if to_be_read is 0.
* dh: Fix wrong assignment.Andreas Schneider2013-11-141-1/+1
| | | | Ups, sorry.
* poll: Fix realloc in ssh_poll_ctx_resize().Andreas Schneider2013-11-091-2/+6
|