summaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* server: move message-specific call to ssh_*Aris Adamantiadis2013-07-131-17/+40
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* auth: adapt libssh to gssapi-with-mic serverAris Adamantiadis2013-07-132-3/+63
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* build: build with gssapi if detectedAris Adamantiadis2013-07-131-0/+7
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* GSSAPI: added stubAris Adamantiadis2013-07-132-0/+26
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* Implement callbacks for servers in the message queueAris Adamantiadis2013-07-131-7/+115
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* bind: ssh_pki functions also return SSH_EOF error codeAris Adamantiadis2013-07-131-3/+3
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* session: Introduce SSH_TIMEOUT_DEFAULTAris Adamantiadis2013-07-132-6/+12
| | | | | | | | | The default timeout of 30seconds is very nice when connecting to a new SSH session, however it completely breaks the synchronous blocking API. Use SSH_TIMEOUT_DEFAULT when in blocking mode so channel reads&write are blocking as expected Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* server: added channel callbacksAris Adamantiadis2013-07-131-14/+27
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* Defined SSH server callbacks interfaceAris Adamantiadis2013-07-131-0/+16
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* BUG 103: Disable proxy command if set to 'none'.Andreas Schneider2013-07-111-4/+8
| | | | Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
* messages: Fix a possible memory leak.Andreas Schneider2013-06-191-0/+1
|
* agent: Fix a possible memory leak.Andreas Schneider2013-06-191-5/+16
|
* agent: Fix possible memory leak.Andreas Schneider2013-06-191-2/+7
|
* kex1: Fix a possible null pointer dereference.Andreas Schneider2013-06-191-0/+3
|
* ecdh: Add missing return in ssh_client_ecdh_init().Andreas Schneider2013-06-191-0/+1
|
* ecdh: Avoid memory leaks in ssh_server_ecdh_init().Andreas Schneider2013-06-191-36/+69
|
* src: Add fall trough comments.Andreas Schneider2013-06-183-0/+3
|
* pki: Fix switch statement of pki_key_generate_ecdsa().Andreas Schneider2013-06-181-0/+2
|
* connect: Use the correct close function.Andreas Schneider2013-06-181-1/+1
|
* connect: Correctly fail in ssh_connect_host_nonblocking().Andreas Schneider2013-06-181-0/+2
|
* ecdh: Make sure we don't leak memory in ssh_client_ecdh_init().Andreas Schneider2013-06-181-12/+27
| | | | This also adds more checks for return values.
* auth: Cleanup the agent return code.Andreas Schneider2013-06-181-4/+2
|
* auth: If the agent fails, fall back to regular pathNicolas Viennot2013-06-181-1/+1
| | | | | It's causing issues on MacOSX when ssh_agent_get_ident_count() reports "Agent count: 0".
* kex1: Fix null check of hostkey.Andreas Schneider2013-06-171-1/+1
|
* socket: Check if socket (non)blocking is working.Andreas Schneider2013-06-172-12/+34
|
* socket: Check return value of getsockopt().Andreas Schneider2013-06-171-1/+4
|
* packet: Fix a possible segfault.Andreas Schneider2013-06-171-7/+6
|
* messages: Fix a possible segfault.Andreas Schneider2013-06-171-1/+3
|
* ecdh: Check return values of buffer_add_* functions.Andreas Schneider2013-06-171-4/+23
|
* dh: Check return value of buffer_add_ssh_string().Andreas Schneider2013-06-171-2/+8
|
* connect: Check return value of getsockopt().Andreas Schneider2013-06-171-3/+4
|
* channels1: Check return value of buffer_add_u8().Andreas Schneider2013-06-171-1/+6
|
* packet1: Don't free an invalid address.Andreas Schneider2013-06-171-1/+0
|
* pki: Limit privkey to 4M for now.Andreas Schneider2013-06-171-0/+6
|
* pki: Fix a resource leak on error.Andreas Schneider2013-06-171-0/+3
|
* pki: Fix resource leak on error.Andreas Schneider2013-06-131-0/+1
|
* client: Fix possible NULL pointer dereference.Andreas Schneider2013-06-131-2/+2
|
* known_hosts: Fix readablity.Andreas Schneider2013-06-131-1/+1
|
* pki: Use fstat() after opening the file.Andreas Schneider2013-06-131-16/+16
|
* kex: Fix a double free.Andreas Schneider2013-06-131-0/+1
|
* server: Fix a double free.Andreas Schneider2013-06-131-4/+1
|
* BUG 103: Fix ProxyCommand parsing.Andreas Schneider2013-06-021-2/+21
|
* config: Rename ssh_config_get_str().Andreas Schneider2013-06-021-11/+11
|
* opts: Fix segfault in option parser.Andreas Schneider2013-06-021-3/+11
|
* getpass: Don't fail if stdin is not a tty.Andreas Schneider2013-04-051-23/+27
| | | | | We don't need to manipulate the tty state (such as turning off echo) when prompting for passwords if we're not reading from a tty.
* poll: return error on poll() when pollset is emptyAris Adamantiadis2013-02-261-1/+1
|
* socket: Call data handler as long as handler takes data.Johannes Krude2013-01-291-4/+6
| | | | Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
* include: Fix the LGPL header.Andreas Schneider2013-01-231-13/+12
| | | | | This has been reported by rpmlint: libssh-devel.x86_64: W: incorrect-fsf-address libssh.h
* options: Fix a free crash bug if we parse unknown options.Andreas Schneider2013-01-221-6/+8
| | | | Thanks to Yong Chuan Koh, X-Force Research <kohyc@sg.ibm.com>
* Report according status when errors are detectedAris Adamantiadis2012-12-271-3/+18
|