13 Commits

Author SHA1 Message Date
Markus Friedl
011c12f689 sync cvs as of 2012-12-14 (keep cipher-ctr.c) 2012-12-30 09:09:52 +01:00
Markus Friedl
f72f4b214f replace sshbuf_new/sshbuf_put with sshbuf_from. 2012-10-10 23:49:31 +02:00
Markus Friedl
eab15ba6bf ssh-keygen: missing s/sshbuf_get_stringb/sshbuf_froms/ 2012-10-10 23:01:40 +02:00
Damien Miller
8f73555808 protect sshbuf_from[bs] children by refusing modification of the parent buffers
This adds a reference mechanism to struct sshbuf, making parent buffers to
those created with buffer_froms() and buffer_fromb() read-only until the
child buffer is freed. It also delays freeing of the parent buffer until
all child buffers have freed.
2012-10-09 23:22:54 +02:00
Damien Miller
60cb7a627f new functions for read-only buffers with external storage
This adds some new functions: sshbuf_from(), sshbuf_fromb() and sshbuf_froms()
that create new buffers from a read-only blob, the contents of a buffer and
the contents of a string in a buffer respectively. In all cases the memory
contents are not copied - the new buffer, which is read-only, just refers to
the original location in memory.
2012-10-09 23:22:53 +02:00
Markus Friedl
96b8844e9e sync cvs as of 2012-10-05 2012-10-05 14:40:20 +02:00
Damien Miller
ece6575b3c convert serverloop.c ssh-keygen.c ssh-pkcs11-helper.c to new buffer API 2012-09-21 04:26:38 +10:00
Damien Miller
54c2c68956 This stated as a conversion of monitor*.[ch] to the new
buffer API, but it got away from me...

Includes a change from u_int -> size_t in the key API that
touches quite a few things
2012-09-20 01:22:35 +10:00
Markus Friedl
fbbec84071 sync to cvs as of 2012-09-14 2012-09-14 18:59:11 +02:00
Markus Friedl
e3403f3457 update to openssh-6.1 2012-07-30 20:41:29 +02:00
Damien Miller
68cf42d1fe convert everything to new authfile.[ch] API
NB. bugs remain
2012-03-04 21:19:22 +01:00
Damien Miller
ea5ceecdc2 first cut at merging disentangled buffer and library code. buffer_* continue
to exist as thin wrappers around sshbuf_*

doesn't yet pass regress (breakage in hostkey checking, probably related to
new sshkey_* return values)
2012-01-17 14:32:48 +01:00
Markus Friedl
a87828ec88 import openssh as of 2012/01/05 2012-01-05 12:08:12 +01:00