Damien Miller
60cb7a627f
new functions for read-only buffers with external storage
...
This adds some new functions: sshbuf_from(), sshbuf_fromb() and sshbuf_froms()
that create new buffers from a read-only blob, the contents of a buffer and
the contents of a string in a buffer respectively. In all cases the memory
contents are not copied - the new buffer, which is read-only, just refers to
the original location in memory.
2012-10-09 23:22:53 +02:00
Damien Miller
5020b06a6b
remove the last traces of the old buffer API
...
yay :)
2012-09-21 05:35:30 +10:00
Markus Friedl
e3403f3457
update to openssh-6.1
2012-07-30 20:41:29 +02:00
Markus Friedl
8ed0e3c614
treat all PEM_read_bio_PrivateKey() errors as SSH_ERR_KEY_WRONG_PASSPHRASE
2012-04-06 14:08:12 +02:00
Damien Miller
0caf1913c7
allow KEY_UNSPEC in sshkey_load_private_cert()
2012-03-20 15:09:18 +01:00
Damien Miller
0fe974bd62
expose sshkey_parse_public_rsa1() for unit testing
2012-03-04 21:19:23 +01:00
Damien Miller
79061f1d6e
signed/unsigned comparison
2012-03-04 21:19:22 +01:00
Markus Friedl
37f4c4a78f
remove remaining xstrdup from sshkey_try_load_public()
2012-03-04 21:19:22 +01:00
Markus Friedl
ff45a11b5a
fix re-try for files with .pub suffix (e.g. for cert tests or encrypted private keys)
2012-03-04 21:19:22 +01:00
Markus Friedl
56b8e0979c
fix rsa1 key loading and passphrase change
2012-03-04 21:19:22 +01:00
Damien Miller
68cf42d1fe
convert everything to new authfile.[ch] API
...
NB. bugs remain
2012-03-04 21:19:22 +01:00
Damien Miller
ce24556633
NULL *commentp in functions that take it
2012-03-04 21:19:21 +01:00
Damien Miller
f576b5ee39
fixes from Markus
2012-03-04 21:19:21 +01:00
Damien Miller
c412d88561
zero *keyp in each function that uses it
2012-03-04 21:19:21 +01:00
Damien Miller
24db83513f
rework authfile.c to avoid fatal and return error codes
2012-03-04 21:19:21 +01:00
Damien Miller
ef0c2e123f
defatal cipher.[ch]
...
unbreak arcfour(128|256)
2012-01-17 14:37:27 +01:00
Damien Miller
ea5ceecdc2
first cut at merging disentangled buffer and library code. buffer_* continue
...
to exist as thin wrappers around sshbuf_*
doesn't yet pass regress (breakage in hostkey checking, probably related to
new sshkey_* return values)
2012-01-17 14:32:48 +01:00
Markus Friedl
a87828ec88
import openssh as of 2012/01/05
2012-01-05 12:08:12 +01:00