Markus Friedl
00783f762b
auth2-gss.c: PACKET_SKIP_COMPAT
2012-09-20 11:15:46 +02:00
Markus Friedl
866615b686
auth2-chall.c: PACKET_SKIP_COMPAT
2012-09-20 11:15:46 +02:00
Markus Friedl
c2b17bb9c2
sshconnect1.c: PACKET_SKIP_COMPAT
2012-09-20 11:15:46 +02:00
Markus Friedl
23f31b72d2
sshpkt_put_u8 should touch the OUTGOING buffer
2012-09-20 11:15:46 +02:00
Markus Friedl
383e471d75
PACKET_SKIP_COMPAT2 for sshconnect2.c
2012-09-20 11:15:45 +02:00
Markus Friedl
02c95ed3ec
clientloop.c: cleanup and return error in the dispatch functions
2012-09-20 11:15:45 +02:00
Markus Friedl
0159ba24d4
ssh_packet_check_eom -> sshpkt_get_end
2012-09-20 11:15:45 +02:00
Markus Friedl
69fe69f28d
PACKET_SKIP_COMPAT for clientloop.c
2012-09-20 11:15:45 +02:00
Damien Miller
a873d2e3a2
convert mux.c to new buffer API
2012-09-20 17:38:56 +10:00
Damien Miller
02bdd02dca
fix from markus@ - remove replaced buffer_ call
2012-09-20 15:55:03 +10:00
Damien Miller
88779e59e4
make leakmalloc work again
...
sort of, it looks like PIE has broken it on other ways
2012-09-20 03:39:41 +10:00
Damien Miller
54c2c68956
This stated as a conversion of monitor*.[ch] to the new
...
buffer API, but it got away from me...
Includes a change from u_int -> size_t in the key API that
touches quite a few things
2012-09-20 01:22:35 +10:00
Markus Friedl
79d66b3de8
add sshpkt_get(), use it for the rsa-response
2012-09-19 14:55:31 +02:00
Markus Friedl
a3ba607c6e
PACKET_SKIP_COMPAT2: make ssh_packet_put/get optional
2012-09-19 12:45:22 +02:00
Markus Friedl
74788552f7
auth2-pubkey.c: PACKET_SKIP_COMPAT
2012-09-19 12:31:31 +02:00
Markus Friedl
fb19315b10
add -Wuninitialized
2012-09-19 12:30:29 +02:00
Markus Friedl
874b586408
auth2-passwd: PACKET_SKIP_COMPAT, no xfree, sshpkt_get*
2012-09-19 11:57:54 +02:00
Markus Friedl
7f2a70f96d
auth-rsa: set PACKET_SKIP_COMPAT
2012-09-19 11:57:54 +02:00
Markus Friedl
fa8ee9ffc4
remove DISPATCH_COMPAT
2012-09-19 11:57:54 +02:00
Damien Miller
5f13a96cef
convert auth2-gss.c gss-genr.c sshconnect2.c to new buffer API
2012-09-19 19:43:19 +10:00
Damien Miller
ab2d02776f
fix whitespace horror
2012-09-19 19:42:57 +10:00
Damien Miller
449fa4049d
Convert auth-options.c auth.c auth2-pubkey.c and channels code to new
...
buffer API
2012-09-19 18:40:19 +10:00
Damien Miller
48e840c69e
fix include guard and some whitespace nits
2012-09-19 18:39:46 +10:00
Damien Miller
7acfe18212
fix error return codes
2012-09-19 15:38:04 +10:00
Damien Miller
725fecd4cc
defatal rsa.[ch]
2012-09-19 05:03:02 +10:00
Damien Miller
2a99b71b39
Include CRC compensation attack detector in per-transport state structure
2012-09-17 21:41:05 +02:00
Markus Friedl
fbbec84071
sync to cvs as of 2012-09-14
2012-09-14 18:59:11 +02:00
Markus Friedl
e3403f3457
update to openssh-6.1
2012-07-30 20:41:29 +02:00
Markus Friedl
41aac846f1
objdump -rd *.o | objdump2.pl -b asn1_d2i_read_bio | dot -Tpdf > asn1_d2i_read_bio.pdf
2012-04-26 11:12:31 +02:00
Markus Friedl
8ed0e3c614
treat all PEM_read_bio_PrivateKey() errors as SSH_ERR_KEY_WRONG_PASSPHRASE
2012-04-06 14:08:12 +02:00
Markus Friedl
19d6c6ae8b
do not leak existing comment
2012-04-02 21:13:32 +02:00
Markus Friedl
0de3e0e043
set BT_MAX_DEPTH for older versions of libexecinfo
2012-04-02 21:13:32 +02:00
Damien Miller
bdc1f63423
fixes - bad message format in ssh_decrypt_challenge(), missing break in ssh_add_identity_constrained()
2012-03-27 09:43:50 +11:00
Damien Miller
4cc6b3c6c5
more verbosity on errors
2012-03-27 09:43:20 +11:00
Damien Miller
a40866a6be
hush warnings for certificate loading if file is not present
2012-03-27 09:42:55 +11:00
Damien Miller
fab052172d
fixes from Markus
2012-03-27 08:57:21 +11:00
Damien Miller
e237a835f2
gracefully skip unrecognised key types
2012-03-26 23:23:34 +11:00
Damien Miller
2c25fb2ede
refactor agent client code
...
removed fatal()
buffer_ => sshbuf_
changed lookup of identies to return a fully-deserialised list of keys
removed AuthenticationConnection abstration; all operations now use plain socket
2012-03-26 23:10:27 +11:00
Damien Miller
67ce107972
sshbuf_free(NULL) should be a no-op
2012-03-26 17:04:40 +11:00
Damien Miller
44e5c0f6b2
memory leak in cert_free()
2012-03-21 10:56:06 +11:00
Damien Miller
d403adfa35
fuzz certificate parsing
2012-03-20 15:09:18 +01:00
Damien Miller
3f5b354ed7
test certificate loading
2012-03-20 15:09:18 +01:00
Damien Miller
cc51f0e811
fix free of uninitialised pointer; found by fuzzer
2012-03-20 15:09:18 +01:00
Damien Miller
3a5cb4965b
correct test names: s/RSA/RSA1 for a few
2012-03-20 15:09:18 +01:00
Damien Miller
0caf1913c7
allow KEY_UNSPEC in sshkey_load_private_cert()
2012-03-20 15:09:18 +01:00
Damien Miller
e0e7ddfa4a
xmalloc.h not needed here
2012-03-20 15:09:17 +01:00
Damien Miller
3f69ecb299
activate leakmalloc support when LEAKMALLOC make variable is set
...
(mostly by markus@)
2012-03-15 13:27:43 +11:00
Damien Miller
dfecc980bc
Merge branch 'master' of /home/djm/cvs/leakmalloc into merge-leakmalloc
2012-03-15 12:24:27 +11:00
Damien Miller
6161ebb123
move everything into subdirectory in preparation for merge to libopenssh
2012-03-15 12:23:01 +11:00
Damien Miller
4e552cbf80
adjust for new paths
2012-03-07 15:34:41 +11:00