summaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* known_hosts: Fix a memleak.Andreas Schneider2011-09-071-2/+4
|
* pki: Add missing ECC ifdef.Andreas Schneider2011-09-061-0/+2
|
* options: Fix NULL value handling.Andreas Schneider2011-09-061-34/+64
|
* options: Fix the ssh_options_set() function.Andreas Schneider2011-09-051-321/+368
| | | | | This is a refactor so that we check if the values are sane the user wants to set. If not return an error.
* known_hosts: Migrate ssh_write_knownhost() to new pki.Andreas Schneider2011-09-051-172/+92
|
* pki: Add ssh_pki_export_pubkey_rsa1().Andreas Schneider2011-09-053-0/+82
|
* pki_crypto: Add ecdsa support for key duplication.Andreas Schneider2011-09-021-0/+31
|
* pki: Add ecdsa key support.Andreas Schneider2011-09-021-0/+7
|
* auth: fix things broken during mergeAris Adamantiadis2011-09-022-25/+5
|
* Update libssh to ssh_handle_packets_terminationAris Adamantiadis2011-09-027-217/+293
| | | | | | | | | | | cherry-picked from 0cb5248 Should resolve all timeout problems Conflicts: src/auth.c src/channels.c
* Channels: fix the "server specified invalid channel" bugAris Adamantiadis2011-09-022-11/+32
| | | | Resolved by introducing a flag entry in channel structure.
* channel: ssh_channel_read is nonblocking, + docfixesAris Adamantiadis2011-09-021-16/+46
| | | | | | | cherry-picked from 6091147 Conflicts: src/channels.c
* channels: replaced bugged lists with ssh_listAris Adamantiadis2011-09-024-38/+40
| | | | | | | cherry-picked from 0aef5f Conflicts: src/session.c
* SSH1: fix buildAris Adamantiadis2011-09-022-3/+14
|
* ssh_select converted to ssh_event, and bugfix to ssh_channel_selectAris Adamantiadis2011-09-022-123/+74
|
* poll: resolve use-after-free + inconsistent callbacks callAris Adamantiadis2011-09-021-18/+3
| | | | | | This code was weird in the first place. I suspect my change will break something else (probably the appcode that needed it). ssh_poll_ctx_free is not a good place to send exception callbacks imho.
* channels: ssh_channel_select implemented with ssh_pollAris Adamantiadis2011-09-021-50/+34
| | | | Should fix #56
* channel: implement ssh_channel_poll_timeoutAris Adamantiadis2011-09-021-0/+55
| | | | Resolves bug #57
* Channels: increase window size x10Aris Adamantiadis2011-09-021-1/+1
| | | | | Provides me a 3x performance boost for async sftp, 5x for sync sftp (on localhost)
* channels: made the remaining calls nonblocking + fix #52Aris Adamantiadis2011-09-021-22/+59
|
* channels: use hard random for the X11 cookieAris Adamantiadis2011-09-021-3/+5
| | | | We are in a security library or we are not.
* channels: made all channel requests nonblockingAris Adamantiadis2011-09-021-31/+104
|
* scp: Fixed documentation bug #9Aris Adamantiadis2011-09-021-2/+6
|
* pki: Check the type of the key blob earlier.Andreas Schneider2011-08-301-2/+9
|
* keys: Remove keys.h where it is obsolete.Andreas Schneider2011-08-303-3/+0
|
* keys: Remove obsolete keys.c.Andreas Schneider2011-08-302-50/+0
|
* keys: Move publickey_from_privatekey() to legacy.c.Andreas Schneider2011-08-302-194/+31
|
* keys: Move publickey_free() to legacy.c.Andreas Schneider2011-08-302-28/+29
|
* Include stdio.h for snprintfmilo2011-08-301-0/+1
|
* pki: Use consistent API for ssh_pki_export_privkey_to_pubkey().Andreas Schneider2011-08-303-9/+23
|
* pki: Use consistent API for ssh_pki_export_pubkey_blob().Andreas Schneider2011-08-306-22/+43
|
* pki: Fix session_id hashing.Andreas Schneider2011-08-291-2/+2
| | | | I don't understand why this code worked before. It was completly wrong.
* channels: Fix possible infinite loop in channel_read().rofl0r2011-08-291-1/+5
|
* sftp: Handle short reads of sftp_async_read().Jonas Jonsson2011-08-291-3/+2
| | | | | | | | sftp_async_read() and sftp_async_read_begin() assume that the whole read will be successful but when this is not the case, the offset will be wrong. Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
* pki: string_* -> ssh_string_*Andreas Schneider2011-08-281-4/+4
|
* pki: Refactor ssh_pki_do_sign().Andreas Schneider2011-08-281-10/+11
|
* pki: Refactor _RSA_do_sign().Andreas Schneider2011-08-281-15/+31
|
* pki: Cleanup crypto includes.Andreas Schneider2011-08-281-2/+0
|
* pki: Fix gcrypt includes and update copyright.Andreas Schneider2011-08-281-8/+3
|
* pki: Get rid of the string.h include in pki_gcrypt.c.Andreas Schneider2011-08-281-17/+28
|
* pki: Add Windows defines.Andreas Schneider2011-08-281-0/+14
|
* pki: Compile pki_gcrypt.c only if we need it.Andreas Schneider2011-08-282-30/+2
|
* keyfiles: Remove keyfiles.h.Andreas Schneider2011-08-284-9/+0
|
* keyfiles: Remove try_publickey_from_file().Andreas Schneider2011-08-281-83/+0
|
* keyfiles: Make ssh_try_publickey_from_file() legacy.Andreas Schneider2011-08-282-63/+65
|
* keyfiles: Make ssh_try_publickey_from_file() legacy.Andreas Schneider2011-08-282-78/+70
|
* auth: Refactor and rename kbdauth_send().Andreas Schneider2011-08-281-67/+65
|
* auth: Fix doc typos.Andreas Schneider2011-08-271-4/+4
|
* auth: Handle request service timeout in blocking mode.Andreas Schneider2011-08-261-2/+7
|
* pki: Handle hash correctly.Andreas Schneider2011-08-263-48/+54
| | | | | | | Looks like only DSA in grypt needs a leading zero to mark the has as positive. See http://lists.gnupg.org/pipermail/gcrypt-devel/2005-February/000754.html