summaryrefslogtreecommitdiffstats
path: root/include
Commit message (Collapse)AuthorAgeFilesLines
* Bump version to 0.6.5libssh-0.6.5Andreas Schneider2015-04-291-1/+1
| | | | Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
* cmake: Detect __func__ and __FUNCTION__ during configure stepAndreas Schneider2015-04-022-3/+7
| | | | Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
* include: We should use __func__ which is C99Andreas Schneider2015-04-021-8/+6
| | | | Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
* cmake: Add libsshpp.hpp to the distributed headers list.Léo Peltier2015-01-201-0/+1
| | | | | | | BUG: https://red.libssh.org/issues/163 Reviewed-by: Andreas Schneider <asn@cryptomilk.org> (cherry picked from commit 8db4520d891249b287cc246626635dd550fb3e42)
* Fix the dh.c build with libgcryptAris Adamantiadis2014-12-291-0/+2
| | | | | Fixes bug reported by gentoo at https://bugs.gentoo.org/show_bug.cgi?id=533424 The function was only used by EDCSA backend which are not supported by the libgcrypt code anyway.
* Bump version to 0.6.4.libssh-0.6.4Andreas Schneider2014-12-171-1/+1
|
* pki_crypto.c: plug ecdsa_sig->[r,s] bignum leaksJon Simons2014-12-051-1/+1
| | | | | | | | | | | | | Per ecdsa(3ssl), ECDSA_SIG_new does allocate its 'r' and 's' bignum fields. Fix a bug where the initial 'r' and 's' bignums were being overwritten with newly-allocated bignums, resulting in a memory leak. BUG: https://red.libssh.org/issues/175 Signed-off-by: Jon Simons <jon@jonsimons.org> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> (cherry picked from commit 4745d652b5e71c27fd891edfe690162c0b8d3005)
* pki: Add missing semi-colon.Andreas Schneider2014-05-071-1/+1
|
* pki crypto: expose new ssh_pki_key_ecdsa_name APIJon Simons2014-05-071-0/+2
| | | | | | | | | | | | | Enable retrieving the "ecdsa-sha2-nistpNNN" name of ECDSA keys with a new 'ssh_pki_key_ecdsa_name' API. This gives more information than the 'ssh_key_type_to_char' API, which yields "ssh-ecdsa" for ECDSA keys. The motivation is that this info is useful to have in a server context. The torture_pki unit test is updated to include the new API, and a few more passes are added to additionally test 384 and 521-bit keys. Signed-off-by: Jon Simons <jon@jonsimons.org> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* pki: Make pki_key_ecdsa_nid_to_name() a shared function.Andreas Schneider2014-05-061-0/+1
| | | | (cherry picked from commit 11cfb2903eb319d32a2432a015c61506f50dc78b)
* doc: Improve and consolidate ssh_bind_options_set docsAlan Dunn2014-03-271-63/+0
| | | | | | Signed-off-by: Alan Dunn <amdunn@gmail.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> (cherry picked from commit 47bd0b6d1f3176a4539c22741848d37b9357175b)
* libssh: libhpp: overload read function to support timeout parameterPetar Koretic2014-03-271-1/+19
| | | | | | Signed-off-by: Petar Koretic <petar.koretic@sartura.hr> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> (cherry picked from commit 8e2590b5353f800a2dd11045a1e7ff4848fc8c25)
* libssh: libhpp: avoid unnecessary call to ssh_channel_readPetar Koretic2014-03-271-1/+1
| | | | | | | | | ssh_channel_read is a wrapper for ssh_channel_read_timeout with timeout -1 (infinite) so we call that directly. Signed-off-by: Petar Koretic <petar.koretic@sartura.hr> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> (cherry picked from commit c51f42a566879f61c2349066bc4e8dd35bc5c311)
* libssh: libhpp: fix multiple definitions for acceptForward functionPetar Koretic2014-03-271-2/+2
| | | | | | | | | | | | | Defining a non inlined class function in a header will cause multiple definitions when header is included in more that one file since for each file function will get defined. Signed-off-by: Petar Koretic <petar.koretic@sartura.hr> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> (cherry picked from commit 00d4fbe75336b66262fdca86430655094adb8322) Conflicts: include/libssh/libsshpp.hpp
* options: Allow use of host ECDSA keyAlan Dunn2014-03-271-1/+2
| | | | | | Signed-off-by: Alan Dunn <amdunn@gmail.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> (cherry picked from commit 2a1089d6079c14da8d24c996402e24a689a9f5d3)
* Prepare libssh-0.6.3.libssh-0.6.3Andreas Schneider2014-03-041-1/+1
| | | | We messed up some thing, so we release 0.6.3.
* bump version to 0.6.2Aris Adamantiadis2014-03-041-1/+1
|
* security: fix for vulnerability CVE-2014-0017Aris Adamantiadis2014-03-041-0/+1
| | | | | | | | | | When accepting a new connection, a forking server based on libssh forks and the child process handles the request. The RAND_bytes() function of openssl doesn't reset its state after the fork, but simply adds the current process id (getpid) to the PRNG state, which is not guaranteed to be unique. This can cause several children to end up with same PRNG state which is a security issue.
* session: add getters for session cipher namesJon Simons2014-02-061-0/+2
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* knownhosts: detect variations of ecdsaAris Adamantiadis2014-02-052-1/+27
|
* server: allow custom server banners (bug #83)Aris Adamantiadis2014-02-041-0/+1
|
* known_hosts: add ssh_knownhosts_algorithms()Aris Adamantiadis2014-02-041-0/+1
| | | | | | | | Goal of that function is to test the preferred key exchange methods based on what's available in the known_hosts file Conflicts: tests/client/torture_knownhosts.c
* build: remove OSX deprecated warnings for opensslAris Adamantiadis2014-02-041-10/+0
|
* doc: correct ssh_channel_read_timeout unitsJon Simons2014-02-021-1/+1
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* doc: Document expected return value of channel data callbackAudrius Butkevicius2014-02-021-0/+2
| | | | | Signed-off-by: Audrius Butkevicius <audrius.butkevicius@gmail.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* src: Define MAX_BUF_SIZE globally and use it.Joseph Southwell2014-02-021-0/+13
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* cmake: Increase version numbers for 0.6.1.Andreas Schneider2014-01-161-1/+1
|
* channel: Add ssh_channel_accept_forward().Oleksandr Shneyder2014-01-161-0/+1
| | | | | | | | This works same way as ssh_forward_accept() but can return a destination port of the channel (useful if SSH connection forwarding several TCP/IP ports). Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* threads: support libgcrypt 1.6 hackAris Adamantiadis2014-01-081-0/+2
| | | | | | | Not 100% satisfied of this patch, but the way libgcrypt handles threading in 1.6 is not compatible with custom handlers. The new code basicaly uses pthreads in every case. This will probably not work on windows.
* include: Remove warning cause VSC doesn't know about it.Andreas Schneider2014-01-081-1/+0
|
* include: Fix building if we do not have asm volatile.Andreas Schneider2014-01-081-1/+2
|
* session: Add ssh_get_clientbanner().Jon Simons2013-12-071-0/+1
|
* channels: Add a ssh_channel_read_timeout function.Andreas Schneider2013-12-041-0/+1
|
* pki: Add ssh_pki_import_privkey_file().Andreas Schneider2013-11-271-0/+5
|
* pki_gcrypt: Add pki_private_key_to_pem() stub.Andreas Schneider2013-11-271-0/+5
|
* ecdh: Check if we have ECC support.Andreas Schneider2013-11-272-2/+7
|
* server: Add a ssh_send_keepalive() function.Nicolas Viennot2013-11-241-0/+2
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* options: Add SSH_OPTIONS_GSSAPI_DELEGATE_CREDENTIALS option.Simo Sorce2013-11-172-1/+3
| | | | | Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* options: Add SSH_OPTIONS_GSSAPI_CLIENT_IDENTITY option.Andreas Schneider2013-11-152-1/+3
|
* gssapi: Add suppport to set GSSAPI server identity.Andreas Schneider2013-11-152-1/+3
|
* Add ssh_get_poll_flags()Colin Walters2013-11-092-0/+2
| | | | | | | | | | For integration with an external mainloop, we need to know how to replicate libssh's internal poll() calls. We originally through ssh_get_status() was that API, but it's not really - those flags only get updated from the *result* of a poll(), where what we really need is to know how libssh would *start* a poll(). Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* dh: Add new ssh_get_publickey_hash() function.Andreas Schneider2013-11-061-1/+13
|
* remove warnings on OSX (workaround)Aris Adamantiadis2013-11-041-0/+10
|
* curve25519: include reference implementationAris Adamantiadis2013-11-031-2/+10
|
* socket: Fix check for pending data.Aris Adamantiadis2013-11-031-1/+5
| | | | | | BUG: https://red.libssh.org/issues/119 Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* priv: Fix brackets of burn macros.Andreas Schneider2013-11-031-2/+2
|
* SSH_AUTH_OK -> SSH_AUTH_SUCCESS in commentsAlan Dunn2013-10-311-4/+4
| | | | | | | | A few callback descriptions refer to a non-existent value SSH_AUTH_OK, which should be SSH_AUTH_SUCCESS. This commit fixes these. Signed-off-by: Alan Dunn <amdunn@gmail.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* cmake: Check for isblank().Andreas Schneider2013-10-301-1/+3
|
* include: Fix build on platforms without ECC.Andreas Schneider2013-10-211-0/+2
|
* wrapper: Fix compilation with gcrypt.Andreas Schneider2013-10-191-0/+1
|