summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* torture: Fix a resource leak on error.Andreas Schneider2013-06-131-0/+1
|
* tests: Don't leak memory.Andreas Schneider2013-06-131-1/+2
|
* client: Fix possible NULL pointer dereference.Andreas Schneider2013-06-131-2/+2
|
* known_hosts: Fix readablity.Andreas Schneider2013-06-131-1/+1
|
* pki: Use fstat() after opening the file.Andreas Schneider2013-06-131-16/+16
|
* examples: Fix a use after free in scp example.Andreas Schneider2013-06-131-1/+1
|
* kex: Fix a double free.Andreas Schneider2013-06-131-0/+1
|
* server: Fix a double free.Andreas Schneider2013-06-131-4/+1
|
* tests: Check the return value of write.Andreas Schneider2013-06-111-1/+2
|
* BUG 103: Fix ProxyCommand parsing.Andreas Schneider2013-06-021-2/+21
|
* config: Rename ssh_config_get_str().Andreas Schneider2013-06-021-11/+11
|
* opts: Fix segfault in option parser.Andreas Schneider2013-06-021-3/+11
|
* getpass: Don't fail if stdin is not a tty.Andreas Schneider2013-04-051-23/+27
| | | | | We don't need to manipulate the tty state (such as turning off echo) when prompting for passwords if we're not reading from a tty.
* cmake: Fix installation path for some strange platforms.Andreas Schneider2013-03-201-13/+13
|
* priv: Make really sure memset doesn't get optimzed out.Andreas Schneider2013-03-131-2/+2
|
* poll: return error on poll() when pollset is emptyAris Adamantiadis2013-02-261-1/+1
|
* cmake: Fix config include dir variable name.Andreas Schneider2013-02-132-2/+2
|
* cmake: Add cmake config files for new find_package() mode.Andreas Schneider2013-02-125-0/+44
|
* cmake: Fix setting -D_FORTIFY_SOURCE=2.Andreas Schneider2013-02-071-6/+8
|
* socket: Call data handler as long as handler takes data.Johannes Krude2013-01-291-4/+6
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* include: Fix the LGPL header.Andreas Schneider2013-01-2335-402/+409
| | | | | This has been reported by rpmlint: libssh-devel.x86_64: W: incorrect-fsf-address libssh.h
* BUG 99: Fix string function if no build type is set.Andreas Schneider2013-01-221-1/+1
|
* options: Fix a free crash bug if we parse unknown options.Andreas Schneider2013-01-221-6/+8
| | | | Thanks to Yong Chuan Koh, X-Force Research <kohyc@sg.ibm.com>
* Report according status when errors are detectedAris Adamantiadis2012-12-272-3/+19
|
* Test for bug #64, ssh_channel_read doesn't detect errorsAris Adamantiadis2012-12-271-0/+108
|
* cmake: Only set -D_FORTIFY_SOURCE=2 if we have optimizations.Andreas Schneider2012-12-251-4/+7
|
* Benchmarks: parse config filesAris Adamantiadis2012-12-231-0/+1
|
* Fix channel_write to wait during key reexchangesAris Adamantiadis2012-12-231-1/+20
|
* Implement key re-exchangeAris Adamantiadis2012-12-238-14/+48
|
* BUG 82: Fix function names of ssh_forward_*.Andreas Schneider2012-12-191-5/+5
|
* doc: Fix forward function names.Andreas Schneider2012-12-191-2/+2
|
* Fix an invalid strlen comparison in ssh_message_auth_reply_defaultAndrew Collins2012-12-191-1/+1
| | | | | | | | | During the transition to strncat in ssh_message_auth_reply_default, an invalid strlen comparison was added which causes the function to fail whenever it's called. Signed-off-by: Andrew Collins <bsderandrew@gmail.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* string: Fix memory leak in ssh_string_to_char().Andreas Schneider2012-12-131-6/+6
| | | | This was probably a mistake by me fixing up a patch after merging.
* BUG 97: Fix strtoull() detection on serveral platforms.Andreas Schneider2012-12-033-1/+21
|
* BUG 96: Guard ntohll() and htonll prototypes correctly.Andreas Schneider2012-12-033-1/+10
|
* BUG 98: Use __attribute__ ((packed)) only with GCC.Andreas Schneider2012-12-031-1/+1
|
* BUG 97: Remove obsolete hsterror().Andreas Schneider2012-12-032-18/+1
| | | | | | This function is pretty much obsolete on most platforms. The standard errno should be used. If it is not enough on Windows we should use WSAGetLastError() in future.
* BUG 94: Fix big endian issue.Andreas Schneider2012-12-031-3/+5
|
* test: Try to fetch wrong values in buffer.Aris Adamantiadis2012-11-271-0/+33
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* priv: Add BURN_BUFFER macro and make sure it isn't optimzed out.Andreas Schneider2012-11-231-2/+5
|
* pki: Add a size limit for pubkey files.Andreas Schneider2012-11-212-1/+3
|
* CVE-2012-4559: Make sure we don't free name and longname twice on error.Andreas Schneider2012-11-141-10/+16
|
* CVE-2012-4559: Ensure that we don't free req twice.Andreas Schneider2012-11-141-1/+1
|
* CVE-2012-4560: Fix a write one past the end of 'buf'.Andreas Schneider2012-11-141-2/+3
|
* CVE-2012-4560: Fix a write one past the end of the 'u' buffer.Andreas Schneider2012-11-141-1/+1
|
* CVE-2012-4562: Fix a possible infinite loop in buffer_reinit().Andreas Schneider2012-11-141-4/+9
| | | | | If needed is bigger than the highest power of two or a which fits in an integer we will loop forever.
* CVE-2012-4562: Fix multiple integer overflows in buffer-related functions.Xi Wang2012-11-141-5/+21
|
* CVE-2012-4562: Fix possible integer overflows.Xi Wang2012-11-141-2/+14
|
* CVE-2012-4562: Fix possible integer overflow in ssh_get_hexa().Xi Wang2012-11-141-0/+5
| | | | No exploit known, but it is better to check the string length.
* pki: Fix integer overflow in ssh_pki_import_privkey_file().Xi Wang2012-10-221-0/+5
| | | | | If the file size is ULONG_MAX, the call to malloc() may allocate a small buffer, leading to a memory corruption.