Damien Miller
|
e7643ba14f
|
convert auth2-hostbased.c schnorr.c ssh-pkcs11-client.c to new buffer API
|
2012-09-21 04:26:38 +10:00 |
|
Damien Miller
|
ece6575b3c
|
convert serverloop.c ssh-keygen.c ssh-pkcs11-helper.c to new buffer API
|
2012-09-21 04:26:38 +10:00 |
|
Damien Miller
|
75875617b2
|
convert clientloop.c to new buffer API
|
2012-09-21 04:26:38 +10:00 |
|
Markus Friedl
|
359c0b5398
|
remove redundant kex->ssh assignment
|
2012-09-20 17:47:09 +02:00 |
|
Markus Friedl
|
d45e8a05ab
|
sshd.c: PACKET_SKIP_COMPAT and move creation of 'ssh' to main().
|
2012-09-20 17:47:09 +02:00 |
|
Damien Miller
|
c726a5f036
|
fix a crash when loading RSA1 keys
tidy and refactor a little more
|
2012-09-20 17:39:24 +02:00 |
|
Damien Miller
|
055804bec5
|
move ssh-agent to new buffer API
factor out key parsing to make it more readable and separable in
the future.
|
2012-09-20 17:39:24 +02:00 |
|
Damien Miller
|
025f752c90
|
convert sftp* to new buffer API
|
2012-09-20 16:34:54 +02:00 |
|
Damien Miller
|
12d60b5fa2
|
be more careful with initialisation/free
|
2012-09-20 16:34:54 +02:00 |
|
Markus Friedl
|
976287cf8d
|
auth1.c: PACKET_SKIP_COMPAT
|
2012-09-20 13:00:33 +02:00 |
|
Markus Friedl
|
657870f5a3
|
auth2.c: PACKET_SKIP_COMPAT
|
2012-09-20 12:40:32 +02:00 |
|
Markus Friedl
|
f49fa0e0b2
|
auth2-jpake.c: PACKET_SKIP_COMPAT
|
2012-09-20 12:27:59 +02:00 |
|
Markus Friedl
|
45b1a33a8e
|
monitor*.c: make JPAKE compile
|
2012-09-20 12:27:34 +02:00 |
|
Markus Friedl
|
253e997d49
|
sshconnect2.c: fix JPAKE
|
2012-09-20 12:16:43 +02:00 |
|
Markus Friedl
|
148890964a
|
auth2-kbdint.c: PACKET_SKIP_COMPAT
|
2012-09-20 11:34:42 +02:00 |
|
Markus Friedl
|
1a44de2fcb
|
auth2-hostbased.c: PACKET_SKIP_COMPAT
|
2012-09-20 11:31:49 +02:00 |
|
Markus Friedl
|
fbd7e0b979
|
feedback djm@: no need to protect free(); fix typo
|
2012-09-20 11:15:46 +02:00 |
|
Markus Friedl
|
df2113d4ba
|
pass struct ssh to serverloop.c:wait_until_can_do_something()
|
2012-09-20 11:15:46 +02:00 |
|
Markus Friedl
|
f72bcc6f56
|
serverloop.c: PACKET_SKIP_COMPAT
|
2012-09-20 11:15:46 +02:00 |
|
Markus Friedl
|
00783f762b
|
auth2-gss.c: PACKET_SKIP_COMPAT
|
2012-09-20 11:15:46 +02:00 |
|
Markus Friedl
|
866615b686
|
auth2-chall.c: PACKET_SKIP_COMPAT
|
2012-09-20 11:15:46 +02:00 |
|
Markus Friedl
|
c2b17bb9c2
|
sshconnect1.c: PACKET_SKIP_COMPAT
|
2012-09-20 11:15:46 +02:00 |
|
Markus Friedl
|
23f31b72d2
|
sshpkt_put_u8 should touch the OUTGOING buffer
|
2012-09-20 11:15:46 +02:00 |
|
Markus Friedl
|
383e471d75
|
PACKET_SKIP_COMPAT2 for sshconnect2.c
|
2012-09-20 11:15:45 +02:00 |
|
Markus Friedl
|
02c95ed3ec
|
clientloop.c: cleanup and return error in the dispatch functions
|
2012-09-20 11:15:45 +02:00 |
|
Markus Friedl
|
0159ba24d4
|
ssh_packet_check_eom -> sshpkt_get_end
|
2012-09-20 11:15:45 +02:00 |
|
Markus Friedl
|
69fe69f28d
|
PACKET_SKIP_COMPAT for clientloop.c
|
2012-09-20 11:15:45 +02:00 |
|
Damien Miller
|
a873d2e3a2
|
convert mux.c to new buffer API
|
2012-09-20 17:38:56 +10:00 |
|
Damien Miller
|
02bdd02dca
|
fix from markus@ - remove replaced buffer_ call
|
2012-09-20 15:55:03 +10:00 |
|
Damien Miller
|
88779e59e4
|
make leakmalloc work again
sort of, it looks like PIE has broken it on other ways
|
2012-09-20 03:39:41 +10:00 |
|
Damien Miller
|
54c2c68956
|
This stated as a conversion of monitor*.[ch] to the new
buffer API, but it got away from me...
Includes a change from u_int -> size_t in the key API that
touches quite a few things
|
2012-09-20 01:22:35 +10:00 |
|
Markus Friedl
|
79d66b3de8
|
add sshpkt_get(), use it for the rsa-response
|
2012-09-19 14:55:31 +02:00 |
|
Markus Friedl
|
a3ba607c6e
|
PACKET_SKIP_COMPAT2: make ssh_packet_put/get optional
|
2012-09-19 12:45:22 +02:00 |
|
Markus Friedl
|
74788552f7
|
auth2-pubkey.c: PACKET_SKIP_COMPAT
|
2012-09-19 12:31:31 +02:00 |
|
Markus Friedl
|
fb19315b10
|
add -Wuninitialized
|
2012-09-19 12:30:29 +02:00 |
|
Markus Friedl
|
874b586408
|
auth2-passwd: PACKET_SKIP_COMPAT, no xfree, sshpkt_get*
|
2012-09-19 11:57:54 +02:00 |
|
Markus Friedl
|
7f2a70f96d
|
auth-rsa: set PACKET_SKIP_COMPAT
|
2012-09-19 11:57:54 +02:00 |
|
Markus Friedl
|
fa8ee9ffc4
|
remove DISPATCH_COMPAT
|
2012-09-19 11:57:54 +02:00 |
|
Damien Miller
|
5f13a96cef
|
convert auth2-gss.c gss-genr.c sshconnect2.c to new buffer API
|
2012-09-19 19:43:19 +10:00 |
|
Damien Miller
|
ab2d02776f
|
fix whitespace horror
|
2012-09-19 19:42:57 +10:00 |
|
Damien Miller
|
449fa4049d
|
Convert auth-options.c auth.c auth2-pubkey.c and channels code to new
buffer API
|
2012-09-19 18:40:19 +10:00 |
|
Damien Miller
|
48e840c69e
|
fix include guard and some whitespace nits
|
2012-09-19 18:39:46 +10:00 |
|
Damien Miller
|
7acfe18212
|
fix error return codes
|
2012-09-19 15:38:04 +10:00 |
|
Damien Miller
|
725fecd4cc
|
defatal rsa.[ch]
|
2012-09-19 05:03:02 +10:00 |
|
Damien Miller
|
2a99b71b39
|
Include CRC compensation attack detector in per-transport state structure
|
2012-09-17 21:41:05 +02:00 |
|
Markus Friedl
|
fbbec84071
|
sync to cvs as of 2012-09-14
|
2012-09-14 18:59:11 +02:00 |
|
Markus Friedl
|
e3403f3457
|
update to openssh-6.1
|
2012-07-30 20:41:29 +02:00 |
|
Markus Friedl
|
8ed0e3c614
|
treat all PEM_read_bio_PrivateKey() errors as SSH_ERR_KEY_WRONG_PASSPHRASE
|
2012-04-06 14:08:12 +02:00 |
|
Markus Friedl
|
19d6c6ae8b
|
do not leak existing comment
|
2012-04-02 21:13:32 +02:00 |
|
Damien Miller
|
bdc1f63423
|
fixes - bad message format in ssh_decrypt_challenge(), missing break in ssh_add_identity_constrained()
|
2012-03-27 09:43:50 +11:00 |
|