| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
|
|
| |
Thanks to Giovanni Panozzo <giovanni@panozzo.it>.
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
| |
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
|
|
|
| |
CID: 1230358
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
Reviewed-by: Aris Adamantiadis <aris@0xbadc0de.be>
|
|
|
|
|
|
|
| |
CID: 1230357
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
Reviewed-by: Aris Adamantiadis <aris@0xbadc0de.be>
|
|
|
|
|
|
|
| |
CID: 1230356
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
Reviewed-by: Aris Adamantiadis <aris@0xbadc0de.be>
|
|
|
|
|
| |
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
Reviewed-by: Aris Adamantiadis <aris@0xbadc0de.be>
|
|
|
|
|
| |
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
Reviewed-by: Aris Adamantiadis <aris@0xbadc0de.be>
|
|
|
|
|
| |
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
Reviewed-by: Aris Adamantiadis <aris@0xbadc0de.be>
|
|
|
|
|
| |
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
Reviewed-by: Aris Adamantiadis <aris@0xbadc0de.be>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Signed-off-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
| |
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@samba.org>
|
|
|
|
| |
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
|
|
|
| |
That function permits chaining of buffer values to minimize buffer handling
in packet sending code.
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
|
| |
For some reason I got a segfault in gdb here. Make sure it works
correctly.
|
|
|
|
|
| |
Signed-off-by: Jon Simons <jon@jonsimons.org>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
| |
|
|
|
|
| |
Signed-off-by: Andreas Schneider <asn@samba.org>
|
|
|
|
|
|
|
|
| |
Add NULL checks to 'is_first_kex_packet_follows_guess_wrong'
to ensure that a 'strdup(NULL)' path can not be taken.
Signed-off-by: Jon Simons <jon@jonsimons.org>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
|
|
|
| |
BUG: https://red.libssh.org/issues/160
Signed-off-by: Alan Dunn <amdunn@gmail.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
|
| |
Signed-off-by: Hani Benhabiles <hani@linux.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
BUG: https://red.libssh.org/issues/91
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
|
|
| |
BUG: https://red.libssh.org/issues/91
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
|
|
| |
BUG: https://red.libssh.org/issues/91
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
|
|
| |
BUG: https://red.libssh.org/issues/91
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
|
| |
Signed-off-by: Gangadhar Sandrani <gangadhar.sandrani@gmail.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Ensure to honor the 'first_kex_packet_follow' field when processing
KEXINIT messages in the 'ssh_packet_kexinit' callback. Until now
libssh would assume that this field is always unset (zero). But
some clients may set this (dropbear at or beyond version 2013.57),
and it needs to be included when computing the session ID.
Also include logic for handling wrongly-guessed key exchange algorithms.
Save whether a client's guess is wrong in a new field in the session
struct: when set, the next KEX_DHINIT message to be processed will be
ignored per RFC 4253, 7.1.
While here, update both 'ssh_packet_kexinit' and 'make_sessionid' to
use softabs with a 4 space indent level throughout, and also convert
various error-checking to store intermediate values into an explicit
'rc'.
Patch adjusted from original to ensure that client tests remain passing
(ie 'torture_connect'): restrict the changes in 'ssh_packet_kexinit'
only for the 'server_kex' case.
Signed-off-by: Jon Simons <jon@jonsimons.org>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
|
| |
Signed-off-by: Alan Dunn <amdunn@gmail.com>
Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
|
|
|
|
|
|
| |
The patch breaks the client with ECDSA.
This reverts commit 5865b9436fda96ac9fc7c18e4dffe5fb12dcc515.
|
|
|
|
| |
BUG: https://red.libssh.org/issues/154
|
|
|
|
| |
BUG: https://red.libssh.org/issues/153
|