summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* server: Fix ssh_execute_server_callbacks() client executionNicolas Viennot2013-11-031-4/+2
| | | | | | | | | | When the public key auth handler is executed and returns SSH_OK, ssh_execute_server_callbacks() still runs some client callbacks, which may set rc to SSH_AGAIN, which triggers a default reply on auth, denying auth. Signed-off-by: Nicolas Viennot <nicolas@viennot.biz> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* server kex: enable delayed compressionNicolas Viennot2013-11-031-4/+14
| | | | | | | The code is careful to reenable compression when rekeying. Signed-off-by: Nicolas Viennot <nicolas@viennot.biz> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* session: Make sure we correctly burn the buffer.Andreas Schneider2013-11-031-1/+1
|
* wrapper: Make sure we really burn the buffer.Andreas Schneider2013-11-031-1/+1
|
* priv: Fix brackets of burn macros.Andreas Schneider2013-11-031-2/+2
|
* doc: Add missing RFCs.Andreas Schneider2013-11-031-0/+8
|
* server: fix pubkey reply for key probesJon Simons2013-11-021-1/+9
| | | | | | | | | | | | | | | Per RFC 4252, it is required to send back only one of either SSH_MSG_USERAUTH_PK_OK or SSH_MSG_USERAUTH_FAILURE for public key probes. Update the handling of 'auth_pubkey_function' to send back PK_OK instead of SSH_MSG_USERAUTH_SUCCESS for the case that the state of the message at hand is SSH_PUBLICKEY_STATE_NONE. With this change, it is now possible to process an initial key probe and then subsequent signature validation using the server callbacks. Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* ssh_options_get can now return ProxyCommandWilliam Orr2013-11-021-0/+9
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* connect: fix memory leak in ssh_selectJon Simons2013-10-311-2/+9
| | | | | | | | Balance 'ssh_event_add_fd' with 'ssh_event_remove_fd' in 'ssh_select'. BUG: https://red.libssh.org/issues/128 Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* tests: Add a test for ssh_channel().Andreas Schneider2013-10-312-0/+50
|
* poll: fix leak in ssh_poll_ctx_freeJon Simons2013-10-311-1/+5
| | | | | | | | | Fix a memory leak in 'ssh_poll_ctx_free': issue 'ssh_poll_free' to remove the poll handle from its context and free it. BUG: https://red.libssh.org/issues/128 Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* SSH_AUTH_OK -> SSH_AUTH_SUCCESS in commentsAlan Dunn2013-10-311-4/+4
| | | | | | | | A few callback descriptions refer to a non-existent value SSH_AUTH_OK, which should be SSH_AUTH_SUCCESS. This commit fixes these. Signed-off-by: Alan Dunn <amdunn@gmail.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* cmake: Check for isblank().Andreas Schneider2013-10-303-1/+7
|
* bind: fix leak in ssh_bind_accept error pathJon Simons2013-10-241-2/+1
| | | | | Use 'ssh_socket_free' to cleanup if 'ssh_bind_accept_fd' fails, to be sure to free the ssh_socket in/out buffers.
* tests: Add a sftp_read blocking test.Andreas Schneider2013-10-232-0/+84
|
* auth: docs: Fix typo optoins -> optionsColin Walters2013-10-231-6/+6
| | | | | | I'm just getting my feet wet with this codebase. Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* doc: Improve sftp_read_sync() example.Andreas Schneider2013-10-231-44/+60
|
* include: Fix build on platforms without ECC.Andreas Schneider2013-10-211-0/+2
|
* tests: Add a test for ssh_channel_request_env().Andreas Schneider2013-10-202-0/+115
|
* tests: We can't test the accept right now.Andreas Schneider2013-10-201-1/+5
|
* tests: Fix torture_forward.Andreas Schneider2013-10-201-3/+4
|
* channel: Reinit the buffer and reset the state on error.Andreas Schneider2013-10-201-23/+46
| | | | BUG: https://red.libssh.org/issues/126
* channel: Fix ssh_global_request_termination().Andreas Schneider2013-10-201-1/+1
| | | | BUG: https://red.libssh.org/issues/126
* tests: Add torture forward test.Andreas Schneider2013-10-202-0/+90
|
* pki: Don't leak a buffer.Andreas Schneider2013-10-191-0/+2
|
* wrapper: Fix compilation with gcrypt.Andreas Schneider2013-10-191-0/+1
|
* pki_crpypto: Fix ecdsa signature to blob.Andreas Schneider2013-10-181-12/+26
| | | | BUG: https://red.libssh.org/issues/118
* pki: Add support for ECDSA private key signing.Andreas Schneider2013-10-181-14/+34
|
* pki: Add the type as a char pointer.Andreas Schneider2013-10-183-2/+6
|
* wrapper: Add more evp functions.Andreas Schneider2013-10-183-0/+30
|
* client: Fix the build.Andreas Schneider2013-10-181-1/+0
|
* scp: Fixed result of ssh_scp_string_mode() to get SCP working.Oliver Stöneberg2013-10-181-1/+1
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* client: Added a missing NULL pointer check.Oliver Stöneberg2013-10-181-8/+13
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* doc: Make sure we have the defines to build all docs.Andreas Schneider2013-10-141-1/+1
|
* channel: Fix packets termination timeout in global_request().Andreas Schneider2013-10-011-1/+1
| | | | BUG: https://red.libssh.org/issues/126
* session: Try the ecdsa default key first.Andreas Schneider2013-10-011-0/+11
|
* callbacks: add support for auth_none_functionTristan CACQUERAY2013-09-271-0/+11
|
* doc: Documentation of curve25519-sha256@libssh.orgAris Adamantiadis2013-09-271-0/+119
|
* kex: implement curve25519-sha256@libssh.orgAris Adamantiadis2013-09-279-3/+401
|
* channels: Correctly handle timeouts in channel functions.Andreas Schneider2013-09-171-5/+14
|
* channel: Use the correct timeout option in channel_open().Andreas Schneider2013-09-171-1/+5
| | | | BUG: https://red.libssh.org/issues/124
* callbacks: Improve the documentation of ssh_threads_set_callbacks().Andreas Schneider2013-09-161-6/+11
| | | | BUG: https://red.libssh.org/issues/123
* callbacks: Improve the documentation of ssh_threads_get_noop().Andreas Schneider2013-09-161-3/+7
| | | | BUG: https://red.libssh.org/issues/123
* session: Document return value of ssh_get_serverbanner().Andreas Schneider2013-09-161-0/+3
| | | | BUG: https://red.libssh.org/issues/122
* session: Remove obsolete status variables.Andreas Schneider2013-09-162-9/+4
| | | | BUG: https://red.libssh.org/issues/121
* client: Add example code for ssh_get_openssh_version().Andreas Schneider2013-09-161-0/+8
| | | | BUG: https://red.libssh.org/issues/120
* channels: Correctly decrement timeout value in ssh_channel_accept().Andreas Schneider2013-09-161-2/+5
| | | | BUG: https://red.libssh.org/issues/116
* channel: Document SSH_AGAIN in ssh_channel_read().Andreas Schneider2013-09-161-2/+2
| | | | BUG: https://red.libssh.org/issues/115
* cmake: Allow to build without examples.Andreas Schneider2013-09-162-1/+4
| | | | BUG: https://red.libssh.org/issues/114
* doc: Improve the PKI documentation a bit.Andreas Schneider2013-09-101-14/+18
|