Jakub Jelen
238dbabef8
tests: Unbreak strict builds on Ubuntu
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 9d5616a18c )
2020-01-23 09:49:45 +01:00
Jakub Jelen
ee7ee2404a
libgcrypt: Do not leak memory with invalid key lengths
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 7e692ee1b6 )
2020-01-23 09:49:35 +01:00
Jakub Jelen
6205cad534
pki_gcrypt: Do not confuse static analyzers
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit dd54ffb2f1 )
2020-01-23 09:49:30 +01:00
Jakub Jelen
d5a37e2bf5
legacy,keys: Fix the macro conditions
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 3642224ee5 )
2020-01-23 09:49:26 +01:00
Jakub Jelen
226d2a16b0
mbedcrypto_missing: Always check return values
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 9b858f57c5 )
2020-01-23 09:49:22 +01:00
Jakub Jelen
46105f4aa6
mbedcrypto_missing: Avoid potential memory leaks as reported by csbuild
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 13c88a2e0a )
2020-01-23 09:49:19 +01:00
Jakub Jelen
62f7004d5a
pki_mbedtls: Avoid potential memory leaks
...
reported by csbuild
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 059b6851dc )
2020-01-23 09:49:16 +01:00
Jakub Jelen
d7358ee5a7
pki_mbedtls: Do not warn about unused arguments
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 71ba61cc5b )
2020-01-23 09:49:12 +01:00
Jakub Jelen
ec8cedd803
options: Avoid needless assignment as reported by csbuild
...
The error was
src/options.c:971:13: warning: Value stored to 'u' is never read
# u = 0;
# ^ ~
src/options.c:971:13: note: Value stored to 'u' is never read
# u = 0;
# ^ ~
# 969| case SSH_OPTIONS_KBDINT_AUTH:
# 970| case SSH_OPTIONS_GSSAPI_AUTH:
# 971|-> u = 0;
# 972| if (value == NULL) {
# 973| ssh_set_error_invalid(session);
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 30cc1568f4 )
2020-01-23 09:49:07 +01:00
Jakub Jelen
92124ae65a
tests: Do not require strict host key checking in openssh
...
as nothing really sets these keys up and they are probably preserverd
from some previous test, which is really not a good testing strategy.
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 8eda4165cf )
2020-01-23 09:49:02 +01:00
Jakub Jelen
ea198fee43
tests: Avoid needless assignment as reported by csbuild
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 1563bddf88 )
2020-01-23 09:48:36 +01:00
Jakub Jelen
393cd36c01
kex: Avoid always-false comparisons as reported by csbuild
...
/builds/jjelen/libssh-mirror/src/kex.c:360:17: warning: comparison of unsigned expression < 0 is always false [-Wtype-limits] <--[cc]
360 | if (len < 0) {
| ^
/builds/jjelen/libssh-mirror/src/kex.c:372:17: warning: comparison of unsigned expression < 0 is always false [-Wtype-limits] <--[cc]
372 | if (len < 0) {
| ^
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit e2841908fb )
2020-01-23 09:48:32 +01:00
Aris Adamantiadis
93bf0ab6a3
tests: fix typos
...
Signed-off-by: Aris Adamantiadis <aris@0xbadc0de.be >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 23c529c888 )
2020-01-23 09:47:57 +01:00
Jon Simons
251f60c031
curve25519: fix uninitialized arg to EVP_PKEY_derive
...
Ensure that the `keylen` argument as provided to `EVP_PKEY_derive`
is initialized, otherwise depending on stack contents, the function
call may fail.
Fixes T205.
Signed-off-by: Jon Simons <jon@jonsimons.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit b94ecf18bd )
2019-12-16 12:59:58 +01:00
Jakub Jelen
b33dcda94d
torture: Accept whole pid_t range
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit d2a32ca6d3 )
2019-12-11 11:39:01 +01:00
Aris Adamantiadis
f0335d1b59
tests: bigger sshd config buffer (fixes #T180)
...
Signed-off-by: Aris Adamantiadis <aris@0xbadc0de.be >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit e42307bbe3 )
2019-12-11 11:38:58 +01:00
Andreas Schneider
ed87c2221c
include: Rename __unused__ to __attr_unused__
...
This avoids a collision with valgrind.h
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 742d81ec5d )
2019-12-11 11:38:56 +01:00
Jakub Jelen
ac2f4853bb
init: Fix documentation about return values of void functions
...
Fixes T203
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit b03818aaed )
2019-12-11 11:38:54 +01:00
Andreas Schneider
64ce53fdba
Bump version to 0.9.3
...
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
libssh-0.9.3
2019-12-09 19:26:16 +01:00
Andreas Schneider
295739e0c8
cpack: Ignore patch files
...
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit ecc78ec154 )
2019-12-09 19:26:16 +01:00
Jakub Jelen
101ffd70a7
config: Ignore empty lines to avoid OOB array access
...
Fixes T187
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 574690ae2e )
2019-12-09 16:39:24 +01:00
Jakub Jelen
45878b131c
tests: Check behavior of match_pattern()
...
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit c7cacf986f )
2019-12-09 16:39:22 +01:00
Jakub Jelen
21adb54dc6
match: Limit possible recursion when parsing wildcards to a sensible number
...
Fixes T186
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 31f9c39479 )
2019-12-09 16:38:37 +01:00
Jakub Jelen
13fa009a2e
match: Avoid recursion with many asterisks in pattern
...
Partially fixes T186
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit cf0beff987 )
2019-12-09 16:38:37 +01:00
Andreas Schneider
8600015b3e
pki: Fix possible information leak via uninitialized stack buffer
...
Fixes T190
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 178b53f924 )
2019-12-09 16:38:37 +01:00
Andreas Schneider
8f20ece14f
pki_container_openssh: Initialize pointers to NULL
...
Fixes T190
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit e065d2bb3f )
2019-12-09 16:38:37 +01:00
Andreas Schneider
d15fa16213
SSH-01-012: Fix information leak via uninitialized stack buffer
...
Fixes T190
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 9d67ca251c )
2019-12-09 16:38:37 +01:00
Andreas Schneider
a91e5f7585
SSH-01-010: Improve documentation for fingerprinting functions
...
Fixes T184
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit cb0ccf372e )
2019-12-09 16:38:37 +01:00
Jakub Jelen
7b7b2acd23
doc: Use https where possible
...
Related to T196
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 1fa1a467ed )
2019-12-09 16:38:37 +01:00
Jakub Jelen
1c66217875
doc: Update the list of RFCs and clearly mention which are not implemented in libssh
...
Fixes T196
Signed-off-by: Jakub Jelen <jjelen@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
(cherry picked from commit 606a97c4d6 )
2019-12-09 16:38:37 +01:00
Anderson Toshiyuki Sasaki
95eb071c22
tests: Add a test for SCP with protocol message injection
...
Test if the file name is correctly escaped to avoid protocol message
injection.
Fixes T189
Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit cc9db5b56c )
2019-12-09 16:38:37 +01:00
Anderson Toshiyuki Sasaki
d117de188f
scp: Do not allow newlines in pushed files names
...
When pushing files or directories, encode the newlines contained in the
names as the string "\\n". This way the user cannot inject protocol
messages through the file name.
Fixes T189
Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit bab7ba0146 )
2019-12-09 16:38:37 +01:00
Anderson Toshiyuki Sasaki
ae68f13a78
misc: Add a function to encode newlines
...
Given a string, the added function encodes existing newline characters
('\n') as the string "\\n" and puts into a given output buffer.
The output buffer must have at least 2 times the length of the input
string plus 1 for the terminating '\0'. In the worst case, each
character can be replaced by 2 characters.
Fixes T189
Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit c9ce8fa40b )
2019-12-09 16:38:37 +01:00
Andreas Schneider
ad49f0a556
gzip: Use SSH_BUFFER_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 6c79ed9801 )
2019-12-09 16:38:37 +01:00
Andreas Schneider
975eb87c19
knownhosts: Use SSH_BUFFER_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 7ae47df16a )
2019-12-09 16:38:37 +01:00
Andreas Schneider
a888b65ff5
pcap: Use SSH_BUFFER_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 6734516278 )
2019-12-09 16:38:37 +01:00
Andreas Schneider
375724bafe
base64: Use SSH_BUFFER_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 3cf665a53d )
2019-12-09 16:38:37 +01:00
Andreas Schneider
b7b9c6d5b9
packet: Use SSH_BUFFER_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 35799bb1c6 )
2019-12-09 16:38:37 +01:00
Andreas Schneider
1c7efb7b46
socket: Use SSH_BUFFER_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 476bde4d69 )
2019-12-09 16:38:37 +01:00
Andreas Schneider
128fb03d7e
examples: Use SSH_STRING_FREE_CHAR()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 0938d397be )
2019-12-09 16:38:37 +01:00
Andreas Schneider
994b653161
tests: Use SSH_STRING_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 4e809ef122 )
2019-12-09 16:38:37 +01:00
Andreas Schneider
9817d13de0
dh-gex: Use SSH_STRING_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 80d092037f )
2019-12-09 16:38:37 +01:00
Andreas Schneider
41cd5f4012
message: Use SSH_BUFFER_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 45d9802e1b )
2019-12-09 16:38:37 +01:00
Andreas Schneider
e6fdb28faf
message: Use SSH_STRING_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 5db5e7e527 )
2019-12-09 16:38:36 +01:00
Andreas Schneider
b21cba0c3c
pki_container_openssh: Use SSH_BUFFER_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit d7abfe7e8f )
2019-12-09 16:38:36 +01:00
Andreas Schneider
7498167e6c
pki_container_openssh: Use SSH_STRING_FREE
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit f422fb02f6 )
2019-12-09 16:38:36 +01:00
Andreas Schneider
f1b1355975
gssapi: Use SSH_BUFFER_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit b719f705c6 )
2019-12-09 16:38:36 +01:00
Andreas Schneider
83a8c87b08
gssapi: Use SSH_STRING_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 3b8fcbad24 )
2019-12-09 16:38:36 +01:00
Andreas Schneider
48c34509f2
kex: Use SSH_BUFFER_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 3ab8b76921 )
2019-12-09 16:38:36 +01:00
Andreas Schneider
0469458194
kex: Use SSH_STRING_FREE()
...
Fixes T183
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
Reviewed-by: Jakub Jelen <jjelen@redhat.com >
(cherry picked from commit 7c3a6ca6bc )
2019-12-09 16:38:36 +01:00