Aris Adamantiadis
7fef6e817e
auth: implement gssapi-with-mic server side
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-07-13 14:21:36 +02:00
Aris Adamantiadis
1246ad812c
server: move message-specific call to ssh_*
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-07-13 14:21:36 +02:00
Aris Adamantiadis
3b52e38a33
auth: adapt libssh to gssapi-with-mic server
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-07-13 14:21:36 +02:00
Aris Adamantiadis
6c26a23cf4
build: build with gssapi if detected
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-07-13 14:19:23 +02:00
Aris Adamantiadis
4c99f5de4d
GSSAPI: added stub
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-07-13 14:11:26 +02:00
Aris Adamantiadis
ff30a8feb0
Implement callbacks for servers in the message queue
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-07-13 14:06:57 +02:00
Aris Adamantiadis
82b4cffe66
bind: ssh_pki functions also return SSH_EOF error code
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-07-13 14:03:55 +02:00
Aris Adamantiadis
66b37c856c
session: Introduce SSH_TIMEOUT_DEFAULT
...
The default timeout of 30seconds is very nice when connecting to a new SSH
session, however it completely breaks the synchronous blocking API.
Use SSH_TIMEOUT_DEFAULT when in blocking mode so channel reads&write are blocking
as expected
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-07-13 14:03:42 +02:00
Aris Adamantiadis
6bc64c368d
server: added channel callbacks
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-07-13 14:00:18 +02:00
Aris Adamantiadis
ab2e641b4a
Defined SSH server callbacks interface
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-07-13 13:59:58 +02:00
Andreas Schneider
e52cc613e4
BUG 103: Disable proxy command if set to 'none'.
...
Signed-off-by: Andreas Schneider <asn@cryptomilk.org >
2013-07-11 15:34:50 +02:00
Andreas Schneider
36e4c2e5bc
messages: Fix a possible memory leak.
2013-06-19 12:29:54 +02:00
Andreas Schneider
aed9d7a84d
agent: Fix a possible memory leak.
2013-06-19 12:24:00 +02:00
Andreas Schneider
f0a362fdbe
agent: Fix possible memory leak.
2013-06-19 12:19:05 +02:00
Andreas Schneider
b698f6361c
kex1: Fix a possible null pointer dereference.
2013-06-19 12:06:43 +02:00
Andreas Schneider
e6be005236
ecdh: Add missing return in ssh_client_ecdh_init().
2013-06-19 12:04:38 +02:00
Andreas Schneider
8a4364a99b
ecdh: Avoid memory leaks in ssh_server_ecdh_init().
2013-06-19 11:19:08 +02:00
Andreas Schneider
6dae8baefc
src: Add fall trough comments.
2013-06-18 17:17:23 +02:00
Andreas Schneider
94a8c30feb
pki: Fix switch statement of pki_key_generate_ecdsa().
2013-06-18 17:16:59 +02:00
Andreas Schneider
1deb3412bb
connect: Use the correct close function.
2013-06-18 17:06:58 +02:00
Andreas Schneider
aaae3c4ec1
connect: Correctly fail in ssh_connect_host_nonblocking().
2013-06-18 17:05:57 +02:00
Andreas Schneider
b31efd9ff1
ecdh: Make sure we don't leak memory in ssh_client_ecdh_init().
...
This also adds more checks for return values.
2013-06-18 17:02:40 +02:00
Andreas Schneider
5d05aec2ef
auth: Cleanup the agent return code.
2013-06-18 16:42:33 +02:00
Nicolas Viennot
6306bee86c
auth: If the agent fails, fall back to regular path
...
It's causing issues on MacOSX when ssh_agent_get_ident_count()
reports "Agent count: 0".
2013-06-18 16:39:31 +02:00
Andreas Schneider
7ceaea479e
kex1: Fix null check of hostkey.
2013-06-17 13:21:51 +02:00
Andreas Schneider
2b68728552
socket: Check if socket (non)blocking is working.
2013-06-17 13:18:55 +02:00
Andreas Schneider
42c7bc5a21
socket: Check return value of getsockopt().
2013-06-17 13:09:50 +02:00
Andreas Schneider
ee47cab548
packet: Fix a possible segfault.
2013-06-17 13:04:27 +02:00
Andreas Schneider
a65029da5d
messages: Fix a possible segfault.
2013-06-17 13:02:49 +02:00
Andreas Schneider
f31c33bb31
ecdh: Check return values of buffer_add_* functions.
2013-06-17 12:59:22 +02:00
Andreas Schneider
4255a7223c
dh: Check return value of buffer_add_ssh_string().
2013-06-17 12:53:26 +02:00
Andreas Schneider
9ee45a18d7
connect: Check return value of getsockopt().
2013-06-17 12:47:21 +02:00
Andreas Schneider
0ba075e9ce
channels1: Check return value of buffer_add_u8().
2013-06-17 12:40:35 +02:00
Andreas Schneider
e4bcd063b7
packet1: Don't free an invalid address.
2013-06-17 12:10:55 +02:00
Andreas Schneider
d83b3d9ebe
pki: Limit privkey to 4M for now.
2013-06-17 12:07:32 +02:00
Andreas Schneider
6f8b5ed679
pki: Fix a resource leak on error.
2013-06-17 11:49:13 +02:00
Andreas Schneider
33e95792ce
pki: Fix resource leak on error.
2013-06-13 15:46:53 +02:00
Andreas Schneider
1a894e2cf2
client: Fix possible NULL pointer dereference.
2013-06-13 11:46:17 +02:00
Andreas Schneider
b8a3e5ffe3
known_hosts: Fix readablity.
2013-06-13 11:08:37 +02:00
Andreas Schneider
09663692dd
pki: Use fstat() after opening the file.
2013-06-13 11:04:59 +02:00
Andreas Schneider
abd6b8004e
kex: Fix a double free.
2013-06-13 10:51:12 +02:00
Andreas Schneider
e3c5096fcf
server: Fix a double free.
2013-06-13 10:48:50 +02:00
Andreas Schneider
fcf8af20f8
BUG 103: Fix ProxyCommand parsing.
2013-06-02 19:29:28 +02:00
Andreas Schneider
2d28ee7d22
config: Rename ssh_config_get_str().
2013-06-02 18:54:16 +02:00
Andreas Schneider
e41482fec4
opts: Fix segfault in option parser.
2013-06-02 18:34:39 +02:00
Andreas Schneider
992f00b145
getpass: Don't fail if stdin is not a tty.
...
We don't need to manipulate the tty state (such as turning off echo)
when prompting for passwords if we're not reading from a tty.
2013-04-05 14:14:22 +02:00
Aris Adamantiadis
222a0d78ca
poll: return error on poll() when pollset is empty
2013-02-26 23:52:25 +01:00
Johannes Krude
186116f34a
socket: Call data handler as long as handler takes data.
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-01-29 10:56:49 +01:00
Andreas Schneider
b2f52799c2
include: Fix the LGPL header.
...
This has been reported by rpmlint:
libssh-devel.x86_64: W: incorrect-fsf-address libssh.h
2013-01-23 00:22:46 +01:00
Andreas Schneider
21a45e89c5
options: Fix a free crash bug if we parse unknown options.
...
Thanks to Yong Chuan Koh, X-Force Research <kohyc@sg.ibm.com >
2013-01-22 11:32:47 +01:00