summaryrefslogtreecommitdiffstats
path: root/src/session.c
Commit message (Collapse)AuthorAgeFilesLines
* server: Add support for ed25519 keys in the server.Aris Adamantiadis2015-02-021-0/+2
| | | | | Signed-off-by: Aris Adamantiadis <aris@0xbadc0de.be> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* options: Fix setting the port.Andreas Schneider2014-12-251-1/+1
| | | | | | Make sure we correctly read the port from the config file. Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
* session: add getter for kexalgoJon Simons2014-12-051-0/+29
| | | | | Signed-off-by: Jon Simons <jon@jonsimons.org> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* buffers: adapt session.c to ssh_buffer_(un)pack()Aris Adamantiadis2014-08-061-37/+15
| | | | Reviewed-by: Andreas Schneider <asn@samba.org>
* session: fix ssh_session->srv.ecdsa_key leakJon Simons2014-05-281-0/+4
| | | | | Signed-off-by: Jon Simons <jon@jonsimons.org> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* Add options support for setting and getting HMAC algorithmsDirkjan Bussink2014-04-221-1/+31
| | | | | | BUG: https://red.libssh.org/issues/91 Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* session: Fix a memory leak with custom banner.Andreas Schneider2014-04-101-0/+1
| | | | BUG: https://red.libssh.org/issues/152
* session: fix comment typoLuka Perkov2014-03-271-1/+1
| | | | | Signed-off-by: Luka Perkov <luka.perkov@sartura.hr> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* Add session/channel byte/packet countersAudrius Butkevicius2014-02-121-0/+39
| | | | Signed-off-by: Audrius Butkevicius <audrius.butkevicius@elastichosts.com>
* session: skip timestamp init for non-blocking caseJon Simons2014-02-061-1/+5
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* session: add getters for session cipher namesJon Simons2014-02-061-0/+32
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* client: Fix EOF session error reporting.Joseph Southwell2014-02-021-2/+7
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* src: Rename buffer_init to ssh_buffer_init().Andreas Schneider2014-01-191-2/+2
|
* update copyright informationAris Adamantiadis2014-01-071-1/+1
|
* session: Fix a possible memory leak.Andreas Schneider2014-01-051-0/+1
|
* session: Add ssh_get_clientbanner().Jon Simons2013-12-071-0/+15
|
* options: Add SSH_OPTIONS_GSSAPI_CLIENT_IDENTITY option.Andreas Schneider2013-11-151-0/+1
|
* gssapi: Add suppport to set GSSAPI server identity.Andreas Schneider2013-11-151-0/+1
|
* session: Always request POLLINColin Walters2013-11-091-3/+1
| | | | | | | The assumption is that if libssh functions are being invoked, we want to read data. Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* Add ssh_get_poll_flags()Colin Walters2013-11-091-0/+19
| | | | | | | | | | For integration with an external mainloop, we need to know how to replicate libssh's internal poll() calls. We originally through ssh_get_status() was that API, but it's not really - those flags only get updated from the *result* of a poll(), where what we really need is to know how libssh would *start* a poll(). Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* session: Make sure we correctly burn the buffer.Andreas Schneider2013-11-031-1/+1
|
* session: Try the ecdsa default key first.Andreas Schneider2013-10-011-0/+11
|
* session: Document return value of ssh_get_serverbanner().Andreas Schneider2013-09-161-0/+3
| | | | BUG: https://red.libssh.org/issues/122
* session: Remove obsolete status variables.Andreas Schneider2013-09-161-6/+4
| | | | BUG: https://red.libssh.org/issues/121
* doc: Update documentation of ssh_set_blocking().Andreas Schneider2013-09-091-2/+0
| | | | This should work correctly in libssh 0.6.0. If not then you hit a bug.
* session: Add parentheses to fix a build warning.Andreas Schneider2013-07-261-1/+1
|
* session: Handle session state in ssh_get_status().Andreas Schneider2013-07-251-1/+2
| | | | BUG: https://red.libssh.org/issues/109
* session: ssh_handle_packets_termination() SSH_AGAIN bug fixNicolas Viennot2013-07-251-0/+1
| | | | | | | | ssh_handle_packets_termination() must not return SSH_OK when exiting due to a timeout while the termination function still returns 1. Signed-off-by: Nicolas Viennot <nicolas@viennot.biz> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* session: Add brackets to ssh_handle_packets_termination().Andreas Schneider2013-07-211-28/+39
|
* src: Remove enter_function() and leave_function().Andreas Schneider2013-07-141-22/+16
|
* src: Migrate to SSH_LOG.Andreas Schneider2013-07-141-1/+1
|
* session: Introduce SSH_TIMEOUT_DEFAULTAris Adamantiadis2013-07-131-0/+6
| | | | | | | | | The default timeout of 30seconds is very nice when connecting to a new SSH session, however it completely breaks the synchronous blocking API. Use SSH_TIMEOUT_DEFAULT when in blocking mode so channel reads&write are blocking as expected Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* session: Fix a possible use after free in ssh_free().Andreas Schneider2012-10-221-33/+54
| | | | | | | We need to cleanup the channels first cause we call ssh_channel_close() on the channels which still require a working socket and poll context. Thanks to sh4rm4!
* session: Don't leak memory in ssh_send_debug().Andreas Schneider2012-10-121-4/+4
| | | | Found by Coverity.
* session: Make sure we don't segfault on freeing id.Andreas Schneider2012-10-071-1/+1
|
* session: Fix a memory leak in ssh_new() on error.Andreas Schneider2012-10-051-0/+1
|
* socket: Add a SSH_WRITE_PENDING socket status.Andreas Schneider2012-07-171-3/+7
|
* session: Use a struct for all options.Andreas Schneider2012-02-051-38/+40
|
* Ignore and debug messages can be sent using public APIMartin Drasar2012-01-051-0/+90
| | | | | Signed-off-by: Martin Drasar <drasar@ics.muni.cz> Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
* commit a7e14524c4f7903f607cdcd02b83782e89f0a82crofl0r2012-01-021-0/+11
|
* session: Cleanup timeout functions.rofl0r2012-01-021-12/+1
| | | | | | It is possible that we get unrelated packets while waiting for termination, thus waiting indefinitely. As a workaround we have to check the user-supplied timeout.
* packet: Move packet callbacks to packet_cb.c.Andreas Schneider2011-09-181-45/+0
|
* priv: Remove crypto.h and add correct includes to src files.Andreas Schneider2011-09-181-1/+4
|
* kex: moved KEX structures to ssh_crypto_structAris Adamantiadis2011-09-181-11/+0
|
* kex: split key selection and sendingAris Adamantiadis2011-09-181-2/+0
|
* Update libssh to ssh_handle_packets_terminationAris Adamantiadis2011-09-021-37/+57
| | | | | | | | | | | cherry-picked from 0cb5248 Should resolve all timeout problems Conflicts: src/auth.c src/channels.c
* Channels: fix the "server specified invalid channel" bugAris Adamantiadis2011-09-021-1/+1
| | | | Resolved by introducing a flag entry in channel structure.
* channels: replaced bugged lists with ssh_listAris Adamantiadis2011-09-021-2/+6
| | | | | | | cherry-picked from 0aef5f Conflicts: src/session.c
* server: Use new pki infrastructure.Andreas Schneider2011-08-221-2/+3
|
* session: Fix ssh_free() with NULL argument.Andreas Schneider2011-08-201-1/+1
|