Commit Graph

198 Commits

Author SHA1 Message Date
Markus Friedl
00783f762b auth2-gss.c: PACKET_SKIP_COMPAT 2012-09-20 11:15:46 +02:00
Markus Friedl
866615b686 auth2-chall.c: PACKET_SKIP_COMPAT 2012-09-20 11:15:46 +02:00
Markus Friedl
c2b17bb9c2 sshconnect1.c: PACKET_SKIP_COMPAT 2012-09-20 11:15:46 +02:00
Markus Friedl
23f31b72d2 sshpkt_put_u8 should touch the OUTGOING buffer 2012-09-20 11:15:46 +02:00
Markus Friedl
383e471d75 PACKET_SKIP_COMPAT2 for sshconnect2.c 2012-09-20 11:15:45 +02:00
Markus Friedl
02c95ed3ec clientloop.c: cleanup and return error in the dispatch functions 2012-09-20 11:15:45 +02:00
Markus Friedl
0159ba24d4 ssh_packet_check_eom -> sshpkt_get_end 2012-09-20 11:15:45 +02:00
Markus Friedl
69fe69f28d PACKET_SKIP_COMPAT for clientloop.c 2012-09-20 11:15:45 +02:00
Damien Miller
a873d2e3a2 convert mux.c to new buffer API 2012-09-20 17:38:56 +10:00
Damien Miller
02bdd02dca fix from markus@ - remove replaced buffer_ call 2012-09-20 15:55:03 +10:00
Damien Miller
88779e59e4 make leakmalloc work again
sort of, it looks like PIE has broken it on other ways
2012-09-20 03:39:41 +10:00
Damien Miller
54c2c68956 This stated as a conversion of monitor*.[ch] to the new
buffer API, but it got away from me...

Includes a change from u_int -> size_t in the key API that
touches quite a few things
2012-09-20 01:22:35 +10:00
Markus Friedl
79d66b3de8 add sshpkt_get(), use it for the rsa-response 2012-09-19 14:55:31 +02:00
Markus Friedl
a3ba607c6e PACKET_SKIP_COMPAT2: make ssh_packet_put/get optional 2012-09-19 12:45:22 +02:00
Markus Friedl
74788552f7 auth2-pubkey.c: PACKET_SKIP_COMPAT 2012-09-19 12:31:31 +02:00
Markus Friedl
fb19315b10 add -Wuninitialized 2012-09-19 12:30:29 +02:00
Markus Friedl
874b586408 auth2-passwd: PACKET_SKIP_COMPAT, no xfree, sshpkt_get* 2012-09-19 11:57:54 +02:00
Markus Friedl
7f2a70f96d auth-rsa: set PACKET_SKIP_COMPAT 2012-09-19 11:57:54 +02:00
Markus Friedl
fa8ee9ffc4 remove DISPATCH_COMPAT 2012-09-19 11:57:54 +02:00
Damien Miller
5f13a96cef convert auth2-gss.c gss-genr.c sshconnect2.c to new buffer API 2012-09-19 19:43:19 +10:00
Damien Miller
ab2d02776f fix whitespace horror 2012-09-19 19:42:57 +10:00
Damien Miller
449fa4049d Convert auth-options.c auth.c auth2-pubkey.c and channels code to new
buffer API
2012-09-19 18:40:19 +10:00
Damien Miller
48e840c69e fix include guard and some whitespace nits 2012-09-19 18:39:46 +10:00
Damien Miller
7acfe18212 fix error return codes 2012-09-19 15:38:04 +10:00
Damien Miller
725fecd4cc defatal rsa.[ch] 2012-09-19 05:03:02 +10:00
Damien Miller
2a99b71b39 Include CRC compensation attack detector in per-transport state structure 2012-09-17 21:41:05 +02:00
Markus Friedl
fbbec84071 sync to cvs as of 2012-09-14 2012-09-14 18:59:11 +02:00
Markus Friedl
e3403f3457 update to openssh-6.1 2012-07-30 20:41:29 +02:00
Markus Friedl
8ed0e3c614 treat all PEM_read_bio_PrivateKey() errors as SSH_ERR_KEY_WRONG_PASSPHRASE 2012-04-06 14:08:12 +02:00
Markus Friedl
19d6c6ae8b do not leak existing comment 2012-04-02 21:13:32 +02:00
Damien Miller
bdc1f63423 fixes - bad message format in ssh_decrypt_challenge(), missing break in ssh_add_identity_constrained() 2012-03-27 09:43:50 +11:00
Damien Miller
4cc6b3c6c5 more verbosity on errors 2012-03-27 09:43:20 +11:00
Damien Miller
a40866a6be hush warnings for certificate loading if file is not present 2012-03-27 09:42:55 +11:00
Damien Miller
fab052172d fixes from Markus 2012-03-27 08:57:21 +11:00
Damien Miller
e237a835f2 gracefully skip unrecognised key types 2012-03-26 23:23:34 +11:00
Damien Miller
2c25fb2ede refactor agent client code
removed fatal()
buffer_ => sshbuf_
changed lookup of identies to return a fully-deserialised list of keys
removed AuthenticationConnection abstration; all operations now use plain socket
2012-03-26 23:10:27 +11:00
Damien Miller
67ce107972 sshbuf_free(NULL) should be a no-op 2012-03-26 17:04:40 +11:00
Damien Miller
44e5c0f6b2 memory leak in cert_free() 2012-03-21 10:56:06 +11:00
Damien Miller
cc51f0e811 fix free of uninitialised pointer; found by fuzzer 2012-03-20 15:09:18 +01:00
Damien Miller
0caf1913c7 allow KEY_UNSPEC in sshkey_load_private_cert() 2012-03-20 15:09:18 +01:00
Damien Miller
e0e7ddfa4a xmalloc.h not needed here 2012-03-20 15:09:17 +01:00
Damien Miller
3f69ecb299 activate leakmalloc support when LEAKMALLOC make variable is set
(mostly by markus@)
2012-03-15 13:27:43 +11:00
Markus Friedl
9fb8cdc7bd free the session id and version strings in kex_free() 2012-03-07 00:26:56 +01:00
Markus Friedl
faaf51919a free the internal state in ssh_packet_close() 2012-03-07 00:26:56 +01:00
Markus Friedl
9e7303d250 don't leak the hostkey-list in ssh_free() ...
as well as the pub-key variant of the private hostkey
2012-03-07 00:26:55 +01:00
Damien Miller
4a3c3a7baf fix some kex-related leaks 2012-03-07 00:26:54 +01:00
Damien Miller
4364319ce2 oops, sshbuf was never freeing its buffer memory 2012-03-07 00:26:52 +01:00
Damien Miller
b921712025 centralise error handling for sshkey_from_blob, fix leak 2012-03-07 00:26:51 +01:00
Markus Friedl
becc57491f ssh_set_app_data(): attach application specific data to 'struct ssh' 2012-03-04 21:19:24 +01:00
Markus Friedl
a9b5c1feef replace ssh_packet_payload() with sshpkt_ptr(); adapt ssh_packet_payload()
sshpkt_ptr() has similar argument/return types as sshbuf_ptr()
u_int -> size_t, void * -> u_char.
2012-03-04 21:19:24 +01:00