summaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
...
* channels: use hard random for the X11 cookieAris Adamantiadis2011-09-021-3/+5
| | | | We are in a security library or we are not.
* channels: made all channel requests nonblockingAris Adamantiadis2011-09-021-31/+104
|
* scp: Fixed documentation bug #9Aris Adamantiadis2011-09-021-2/+6
|
* pki: Check the type of the key blob earlier.Andreas Schneider2011-08-301-2/+9
|
* keys: Remove keys.h where it is obsolete.Andreas Schneider2011-08-303-3/+0
|
* keys: Remove obsolete keys.c.Andreas Schneider2011-08-302-50/+0
|
* keys: Move publickey_from_privatekey() to legacy.c.Andreas Schneider2011-08-302-194/+31
|
* keys: Move publickey_free() to legacy.c.Andreas Schneider2011-08-302-28/+29
|
* Include stdio.h for snprintfmilo2011-08-301-0/+1
|
* pki: Use consistent API for ssh_pki_export_privkey_to_pubkey().Andreas Schneider2011-08-303-9/+23
|
* pki: Use consistent API for ssh_pki_export_pubkey_blob().Andreas Schneider2011-08-306-22/+43
|
* pki: Fix session_id hashing.Andreas Schneider2011-08-291-2/+2
| | | | I don't understand why this code worked before. It was completly wrong.
* channels: Fix possible infinite loop in channel_read().rofl0r2011-08-291-1/+5
|
* sftp: Handle short reads of sftp_async_read().Jonas Jonsson2011-08-291-3/+2
| | | | | | | | sftp_async_read() and sftp_async_read_begin() assume that the whole read will be successful but when this is not the case, the offset will be wrong. Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
* pki: string_* -> ssh_string_*Andreas Schneider2011-08-281-4/+4
|
* pki: Refactor ssh_pki_do_sign().Andreas Schneider2011-08-281-10/+11
|
* pki: Refactor _RSA_do_sign().Andreas Schneider2011-08-281-15/+31
|
* pki: Cleanup crypto includes.Andreas Schneider2011-08-281-2/+0
|
* pki: Fix gcrypt includes and update copyright.Andreas Schneider2011-08-281-8/+3
|
* pki: Get rid of the string.h include in pki_gcrypt.c.Andreas Schneider2011-08-281-17/+28
|
* pki: Add Windows defines.Andreas Schneider2011-08-281-0/+14
|
* pki: Compile pki_gcrypt.c only if we need it.Andreas Schneider2011-08-282-30/+2
|
* keyfiles: Remove keyfiles.h.Andreas Schneider2011-08-284-9/+0
|
* keyfiles: Remove try_publickey_from_file().Andreas Schneider2011-08-281-83/+0
|
* keyfiles: Make ssh_try_publickey_from_file() legacy.Andreas Schneider2011-08-282-63/+65
|
* keyfiles: Make ssh_try_publickey_from_file() legacy.Andreas Schneider2011-08-282-78/+70
|
* auth: Refactor and rename kbdauth_send().Andreas Schneider2011-08-281-67/+65
|
* auth: Fix doc typos.Andreas Schneider2011-08-271-4/+4
|
* auth: Handle request service timeout in blocking mode.Andreas Schneider2011-08-261-2/+7
|
* pki: Handle hash correctly.Andreas Schneider2011-08-263-48/+54
| | | | | | | Looks like only DSA in grypt needs a leading zero to mark the has as positive. See http://lists.gnupg.org/pipermail/gcrypt-devel/2005-February/000754.html
* Quick fix for gcrypt DSA signaturemilo2011-08-261-5/+22
|
* legacy: Remove privatekey_from_base64().Andreas Schneider2011-08-261-34/+0
| | | | | This function has been introduced for libssh 0.6. So we can remove it completely.
* messages: Fix ssh_packet_userauth_request().Andreas Schneider2011-08-261-11/+3
| | | | Remove useless ssh_pki_import_signature_blob().
* Free sig_blob if an error occursmilo2011-08-261-0/+2
|
* Fix double free in ssh_packet_userauth_requestmilo2011-08-261-1/+0
|
* auth: Refactor and fix ssh_userauth_kbdint().Andreas Schneider2011-08-261-45/+30
|
* auth: Fix ssh_userauth_agent_publickey pending state.Andreas Schneider2011-08-261-2/+2
|
* auth: Don't fail in publickey_auto if we can't read the key.Andreas Schneider2011-08-261-1/+4
| | | | | We should go on and try the next one as it was before. Also make sure we don't leak memory ;)
* auth: Fix ssh_userauth_publickey() pending_call_state.Andreas Schneider2011-08-261-3/+3
|
* keys: Remove obsolete signatue functions.Andreas Schneider2011-08-262-115/+0
|
* pki: Fix build with DEBUG_CRYPTO.Andreas Schneider2011-08-261-4/+4
|
* pki: Migrate ssh_pki_do_sign to new pki.Andreas Schneider2011-08-263-62/+80
|
* auth: Fix a segfault in ssh_userauth_kbdint_init().Andreas Schneider2011-08-261-0/+4
|
* auth: Refactor kbdauth_init().Andreas Schneider2011-08-251-60/+94
| | | | Rename it to ssh_userauth_kbdint_init.
* auth: Prefix kbdint functions.Andreas Schneider2011-08-253-78/+77
|
* auth: Make ssh_userauth_privatekey_file() legacy.Andreas Schneider2011-08-252-68/+47
|
* auth: Refactor ssh_userauth_password().Andreas Schneider2011-08-251-141/+145
|
* auth: Make ssh_userauth_autopubkey legacy.Andreas Schneider2011-08-252-171/+4
|
* auth: Add ssh_userauth_publickey_auto().Andreas Schneider2011-08-251-0/+182
|
* keys: Remove obsolete ssh_do_sign().Andreas Schneider2011-08-251-140/+0
|