Aris Adamantiadis
2e6dbe8d3d
remove warnings on OSX (workaround)
2013-11-04 10:51:09 +01:00
Aris Adamantiadis
8bf6907c1d
curve25519: include reference implementation
2013-11-03 14:58:47 +01:00
Aris Adamantiadis
6e9e13cc24
examples: fix forktty() warning on OSX
2013-11-03 14:09:28 +01:00
Aris Adamantiadis
5bc32bfd88
Fix examples compilation on OSX (libargp)
2013-11-03 13:51:03 +01:00
Aris Adamantiadis
7c8a793b0a
socket: Fix check for pending data.
...
BUG: https://red.libssh.org/issues/119
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-11-03 12:48:12 +01:00
Nicolas Viennot
e9b0a8210d
server: Fix ssh_execute_server_callbacks() client execution
...
When the public key auth handler is executed and returns SSH_OK,
ssh_execute_server_callbacks() still runs some client callbacks,
which may set rc to SSH_AGAIN, which triggers a default reply on
auth, denying auth.
Signed-off-by: Nicolas Viennot <nicolas@viennot.biz >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-11-03 10:53:44 +01:00
Nicolas Viennot
fb63887c16
server kex: enable delayed compression
...
The code is careful to reenable compression when rekeying.
Signed-off-by: Nicolas Viennot <nicolas@viennot.biz >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-11-03 10:53:42 +01:00
Andreas Schneider
b113b78dfc
session: Make sure we correctly burn the buffer.
2013-11-03 10:53:41 +01:00
Andreas Schneider
646112b4e4
wrapper: Make sure we really burn the buffer.
2013-11-03 10:53:40 +01:00
Andreas Schneider
ba4346f089
priv: Fix brackets of burn macros.
2013-11-03 10:53:38 +01:00
Jon Simons
401865d725
server: fix pubkey reply for key probes
...
Per RFC 4252, it is required to send back only one of either
SSH_MSG_USERAUTH_PK_OK or SSH_MSG_USERAUTH_FAILURE for public
key probes.
Update the handling of 'auth_pubkey_function' to send back PK_OK
instead of SSH_MSG_USERAUTH_SUCCESS for the case that the state
of the message at hand is SSH_PUBLICKEY_STATE_NONE.
With this change, it is now possible to process an initial key probe
and then subsequent signature validation using the server callbacks.
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-11-02 21:03:20 +01:00
William Orr
d312af1ed5
ssh_options_get can now return ProxyCommand
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-11-02 21:03:19 +01:00
Jon Simons
3cfd8a126b
connect: fix memory leak in ssh_select
...
Balance 'ssh_event_add_fd' with 'ssh_event_remove_fd' in 'ssh_select'.
BUG: https://red.libssh.org/issues/128
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-10-31 12:48:56 +01:00
Andreas Schneider
24ebbb8b39
tests: Add a test for ssh_channel().
2013-10-31 12:48:55 +01:00
Jon Simons
447ee309b0
poll: fix leak in ssh_poll_ctx_free
...
Fix a memory leak in 'ssh_poll_ctx_free': issue 'ssh_poll_free'
to remove the poll handle from its context and free it.
BUG: https://red.libssh.org/issues/128
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-10-31 11:55:27 +01:00
Alan Dunn
6c213c913b
SSH_AUTH_OK -> SSH_AUTH_SUCCESS in comments
...
A few callback descriptions refer to a non-existent value SSH_AUTH_OK,
which should be SSH_AUTH_SUCCESS. This commit fixes these.
Signed-off-by: Alan Dunn <amdunn@gmail.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-10-31 08:19:35 +01:00
Andreas Schneider
f8f6eb0ce6
cmake: Check for isblank().
2013-10-30 17:33:32 +01:00
Jon Simons
54f89af6d3
bind: fix leak in ssh_bind_accept error path
...
Use 'ssh_socket_free' to cleanup if 'ssh_bind_accept_fd'
fails, to be sure to free the ssh_socket in/out buffers.
2013-10-24 10:37:59 +02:00
Andreas Schneider
0e4a1b1f66
tests: Add a sftp_read blocking test.
2013-10-23 15:54:40 +02:00
Colin Walters
5eeadf533f
auth: docs: Fix typo optoins -> options
...
I'm just getting my feet wet with this codebase.
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-10-23 09:55:39 +02:00
Andreas Schneider
a4e2e01d3e
doc: Improve sftp_read_sync() example.
2013-10-23 09:55:38 +02:00
Andreas Schneider
3911046f7e
include: Fix build on platforms without ECC.
2013-10-21 07:16:26 +02:00
Andreas Schneider
2727af0fe6
tests: Add a test for ssh_channel_request_env().
2013-10-20 17:06:23 +02:00
Andreas Schneider
c42da23348
tests: We can't test the accept right now.
2013-10-20 17:06:22 +02:00
Andreas Schneider
e0adcea90d
tests: Fix torture_forward.
2013-10-20 17:06:21 +02:00
Andreas Schneider
a62399fcd5
channel: Reinit the buffer and reset the state on error.
...
BUG: https://red.libssh.org/issues/126
2013-10-20 12:47:17 +02:00
Andreas Schneider
0ee68ac2a1
channel: Fix ssh_global_request_termination().
...
BUG: https://red.libssh.org/issues/126
2013-10-20 12:47:16 +02:00
Andreas Schneider
796d285eaf
tests: Add torture forward test.
2013-10-20 12:47:16 +02:00
Andreas Schneider
b5f71f35a3
pki: Don't leak a buffer.
2013-10-19 10:42:18 +02:00
Andreas Schneider
b98ea81903
wrapper: Fix compilation with gcrypt.
2013-10-19 10:39:44 +02:00
Andreas Schneider
beeca3c650
pki_crpypto: Fix ecdsa signature to blob.
...
BUG: https://red.libssh.org/issues/118
2013-10-18 23:50:09 +02:00
Andreas Schneider
9f5abdb526
pki: Add support for ECDSA private key signing.
2013-10-18 23:50:08 +02:00
Andreas Schneider
02f80eb288
pki: Add the type as a char pointer.
2013-10-18 23:50:08 +02:00
Andreas Schneider
5b7f07b484
wrapper: Add more evp functions.
2013-10-18 23:50:06 +02:00
Andreas Schneider
ec5278e34d
client: Fix the build.
2013-10-18 21:19:33 +02:00
Oliver Stöneberg
e554f0dc0d
scp: Fixed result of ssh_scp_string_mode() to get SCP working.
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-10-18 14:59:01 +02:00
Oliver Stöneberg
e8e1916d2e
client: Added a missing NULL pointer check.
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-10-18 14:58:59 +02:00
Andreas Schneider
58893352b0
doc: Make sure we have the defines to build all docs.
2013-10-14 15:40:18 +02:00
Aris Adamantiadis
cdcc92e344
Compile libssh with nacl if possible
...
Conflicts:
DefineOptions.cmake
2013-10-06 17:43:53 +02:00
Andreas Schneider
29b3a94032
channel: Fix packets termination timeout in global_request().
...
BUG: https://red.libssh.org/issues/126
2013-10-01 14:51:55 +02:00
Andreas Schneider
8f2b26a837
session: Try the ecdsa default key first.
2013-10-01 14:48:20 +02:00
Andreas Schneider
42c07f379d
channels: Correctly handle timeouts in channel functions.
2013-10-01 14:47:58 +02:00
Andreas Schneider
f79c4fd7a3
channel: Use the correct timeout option in channel_open().
...
BUG: https://red.libssh.org/issues/124
2013-10-01 14:47:58 +02:00
Andreas Schneider
7b2aee90f0
callbacks: Improve the documentation of ssh_threads_set_callbacks().
...
BUG: https://red.libssh.org/issues/123
2013-10-01 14:47:58 +02:00
Andreas Schneider
aaacd18031
callbacks: Improve the documentation of ssh_threads_get_noop().
...
BUG: https://red.libssh.org/issues/123
2013-10-01 14:47:58 +02:00
Andreas Schneider
9f60352497
session: Document return value of ssh_get_serverbanner().
...
BUG: https://red.libssh.org/issues/122
2013-10-01 14:47:58 +02:00
Andreas Schneider
70c796e8b8
session: Remove obsolete status variables.
...
BUG: https://red.libssh.org/issues/121
2013-10-01 14:47:57 +02:00
Andreas Schneider
5b7a696cf2
client: Add example code for ssh_get_openssh_version().
...
BUG: https://red.libssh.org/issues/120
2013-10-01 14:47:57 +02:00
Andreas Schneider
c59568c3c1
channels: Correctly decrement timeout value in ssh_channel_accept().
...
BUG: https://red.libssh.org/issues/116
2013-10-01 14:47:57 +02:00
Andreas Schneider
6f10422685
channel: Document SSH_AGAIN in ssh_channel_read().
...
BUG: https://red.libssh.org/issues/115
2013-10-01 14:47:57 +02:00