Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | pki: Do not use deprecated string functions. | Andreas Schneider | 2014-01-17 | 1 | -1/+1 | |
| | ||||||
* | src: Do not use deprecated functions. | Andreas Schneider | 2014-01-16 | 6 | -15/+15 | |
| | ||||||
* | bind: fix possible double-frees in ssh_bind_free | Jon Simons | 2014-01-16 | 1 | -0/+10 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Make sure to explicitly set key pointers to NULL following the use of 'ssh_key_free' throughout bind.c. Before this change, a double free can happen via 'ssh_bind_free' as in this example callpath: // create an ssh_bind ssh_bind b = ssh_bind_new(); // provide a path to a wrong key-type ssh_bind_options_set(b, SSH_BIND_OPTIONS_DSAKEY, path_to_rsa_key); // initialize set key-type ssh_bind_listen(b); -> error path "The DSA host key has the wrong type: %d", ssh_key_free(sshbind->dsa) -> ssh_key_clean(key) // OK -> SAFE_FREE(key) // OK, but, sshbind->dsa is *not* set to NULL // ssh_bind_listen failed, so clean up ssh_bind ssh_bind_free(b); -> ssh_key_free(sshbind->dsa) // double-free here To fix, set pointers to NULL that have been free'd with 'ssh_key_free'. Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
* | channel: Fix the name scheme of the forward functions. | Andreas Schneider | 2014-01-16 | 2 | -15/+17 | |
| | ||||||
* | channel: Add ssh_channel_accept_forward(). | Oleksandr Shneyder | 2014-01-16 | 1 | -3/+23 | |
| | | | | | | | | This works same way as ssh_forward_accept() but can return a destination port of the channel (useful if SSH connection forwarding several TCP/IP ports). Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
* | threads: support libgcrypt 1.6 hack | Aris Adamantiadis | 2014-01-08 | 1 | -2/+23 | |
| | | | | | | | Not 100% satisfied of this patch, but the way libgcrypt handles threading in 1.6 is not compatible with custom handlers. The new code basicaly uses pthreads in every case. This will probably not work on windows. | |||||
* | src: Update my mail address. | Andreas Schneider | 2014-01-07 | 11 | -11/+11 | |
| | ||||||
* | update copyright information | Aris Adamantiadis | 2014-01-07 | 20 | -26/+26 | |
| | ||||||
* | pki: fix gcrypt signature process | Aris Adamantiadis | 2014-01-07 | 1 | -1/+1 | |
| | ||||||
* | session: Fix a possible memory leak. | Andreas Schneider | 2014-01-05 | 1 | -0/+1 | |
| | ||||||
* | poll: fix poll_handles ownerships | Aris Adamantiadis | 2014-01-05 | 1 | -5/+27 | |
| | ||||||
* | socket: don't attempt reading a non-connected socket | Aris Adamantiadis | 2014-01-05 | 1 | -1/+1 | |
| | ||||||
* | poll: Correctly free ssh_event_fd_wrapper. | Andreas Schneider | 2013-12-22 | 1 | -3/+9 | |
| | | | | This is allocated by ssh_event_add_fd. | |||||
* | config: Support expansion in the Host variable too. | Andreas Schneider | 2013-12-21 | 1 | -9/+18 | |
| | | | | BUG: https://red.libssh.org/issues/127 | |||||
* | channel: fix setting of channel->flags | Jon Simons | 2013-12-11 | 1 | -3/+3 | |
| | | | | | | | | Fix the setting of 'channel->flags' to use '|='. Before this change, one bug symptom can be that channels are never fully free'd via ssh_channel_free, resulting in memory leaks. Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
* | client: use ssh_channel_do_free in ssh_disconnect | Jon Simons | 2013-12-11 | 1 | -1/+1 | |
| | | | | | | | | | | Ensure to use 'ssh_channel_do_free' in 'ssh_disconnect', when removing and free'ing up a session's channels. This matches the behavior in 'ssh_free', and is necessary to fully free any channel which may not have been closed completely (see usage of flags SSH_CHANNEL_FLAG_CLOSED_REMOTE, SSH_CHANNEL_FLAG_FREED_LOCAL). Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
* | bind: Correctly free all memory in ssh_bind_free(). | Andreas Schneider | 2013-12-09 | 1 | -3/+7 | |
| | | | | Thanks to Jacob Baines. | |||||
* | session: Add ssh_get_clientbanner(). | Jon Simons | 2013-12-07 | 1 | -0/+15 | |
| | ||||||
* | channels: Add a ssh_channel_read_timeout function. | Andreas Schneider | 2013-12-04 | 1 | -3/+43 | |
| | ||||||
* | pki: Fix a memory leak. | Andreas Schneider | 2013-11-28 | 1 | -0/+1 | |
| | | | | CID #1132819 | |||||
* | pki: Add ssh_pki_import_privkey_file(). | Andreas Schneider | 2013-11-27 | 1 | -0/+58 | |
| | ||||||
* | pki_crypto: Add pki_private_key_to_pem(). | Andreas Schneider | 2013-11-27 | 1 | -0/+118 | |
| | ||||||
* | pki_gcrypt: Add pki_private_key_to_pem() stub. | Andreas Schneider | 2013-11-27 | 1 | -0/+13 | |
| | ||||||
* | curve25519: Fix memory leaks in ssh_server_curve25519_init(). | Andreas Schneider | 2013-11-27 | 1 | -20/+23 | |
| | | | | CID #1125255 | |||||
* | curve25519: Do not leak q_s_string. | Andreas Schneider | 2013-11-27 | 1 | -0/+1 | |
| | | | | CID #1125256 | |||||
* | curve25519: Fix a memory leak. | Andreas Schneider | 2013-11-27 | 1 | -1/+1 | |
| | | | | CID #1125257 | |||||
* | packet: Remove logically dead code. | Andreas Schneider | 2013-11-27 | 1 | -3/+1 | |
| | | | | CID #1128796 | |||||
* | ecdh: Use bignum_bin2bn. | Andreas Schneider | 2013-11-27 | 2 | -2/+2 | |
| | ||||||
* | server: Add a ssh_send_keepalive() function. | Nicolas Viennot | 2013-11-24 | 1 | -0/+41 | |
| | | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
* | channel: fix infinite loop in channel_write_common | Jon Simons | 2013-11-22 | 1 | -1/+3 | |
| | | | | | | BUG: https://red.libssh.org/issues/130 Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
* | flush channel after EOF and CLOSE | Rod Vagg | 2013-11-18 | 1 | -0/+8 | |
| | ||||||
* | logging: fix server-side logging | Aris Adamantiadis | 2013-11-18 | 1 | -2/+3 | |
| | ||||||
* | gssapi: fix logging | Aris Adamantiadis | 2013-11-18 | 1 | -14/+14 | |
| | ||||||
* | sockets: null pointer check | Aris Adamantiadis | 2013-11-18 | 1 | -5/+7 | |
| | ||||||
* | gssapi: Fix support of delegated credentials | Simo Sorce | 2013-11-15 | 1 | -23/+37 | |
| | | | | | | | | | | | | In a previous refactoring patch, the code underpinning the ssh_gssapi_set_creds() API was inadvertently removed. This patch fixes the problem. Also clarify what variable holds which credentials and insure that credentials created within the library are propelry freed. Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
* | gssapi: Add support for GSSAPIDelegateCredentials config option. | Simo Sorce | 2013-11-15 | 2 | -1/+12 | |
| | | | | | Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
* | options: Add SSH_OPTIONS_GSSAPI_DELEGATE_CREDENTIALS option. | Simo Sorce | 2013-11-15 | 1 | -0/+15 | |
| | | | | | Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
* | gssapi: Add error checks and cleanup the code in ssh_gssapi_auth_mic(). | Andreas Schneider | 2013-11-15 | 1 | -2/+13 | |
| | ||||||
* | gssapi: Use GSSAPIClientIdentity to acquire creds | Simo Sorce | 2013-11-15 | 1 | -3/+23 | |
| | | | | | Signed-off-by: Simo Sorce <simo@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
* | gssapi: Add support for GSSAPIClientIdentity config option. | Andreas Schneider | 2013-11-15 | 1 | -1/+9 | |
| | ||||||
* | options: Add SSH_OPTIONS_GSSAPI_CLIENT_IDENTITY option. | Andreas Schneider | 2013-11-15 | 2 | -0/+19 | |
| | ||||||
* | gssapi: Add support for GSSAPIServerIdentity config option. | Andreas Schneider | 2013-11-15 | 1 | -1/+9 | |
| | ||||||
* | gssapi: Add suppport to set GSSAPI server identity. | Andreas Schneider | 2013-11-15 | 3 | -1/+25 | |
| | ||||||
* | Fix gssapi credential handling. | Simo Sorce | 2013-11-15 | 1 | -105/+65 | |
| | | | | | | | | | | | - Properly acquire and inquitre credentials to get the list of available credentials. - Avoid enforcing a specific username it breaks some use cases (k5login). - Remove confusing references to delegated credentials as there is no code that actually uses delegated credentials in the initialization case. Signed-off-by: Siom Sorce <simo@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org> | |||||
* | socket: Fix connect if we pass in a fd. | Andreas Schneider | 2013-11-15 | 1 | -9/+13 | |
| | | | | | | BUG: https://red.libssh.org/issues/106 Thanks to Saju Panikulam. | |||||
* | packet: Remove dead code. | Andreas Schneider | 2013-11-14 | 1 | -6/+0 | |
| | ||||||
* | packet: Set the packet to the processed data position. | Andreas Schneider | 2013-11-14 | 1 | -1/+1 | |
| | | | | Else we could end up with packet - current_macsize if to_be_read is 0. | |||||
* | dh: Fix wrong assignment. | Andreas Schneider | 2013-11-14 | 1 | -1/+1 | |
| | | | | Ups, sorry. | |||||
* | poll: Fix realloc in ssh_poll_ctx_resize(). | Andreas Schneider | 2013-11-09 | 1 | -2/+6 | |
| | ||||||
* | dh: Avoid possible memory leaks with realloc. | Andreas Schneider | 2013-11-09 | 1 | -4/+13 | |
| |