Commit Graph

217 Commits

Author SHA1 Message Date
Damien Miller
e7643ba14f convert auth2-hostbased.c schnorr.c ssh-pkcs11-client.c to new buffer API 2012-09-21 04:26:38 +10:00
Damien Miller
ece6575b3c convert serverloop.c ssh-keygen.c ssh-pkcs11-helper.c to new buffer API 2012-09-21 04:26:38 +10:00
Damien Miller
75875617b2 convert clientloop.c to new buffer API 2012-09-21 04:26:38 +10:00
Markus Friedl
359c0b5398 remove redundant kex->ssh assignment 2012-09-20 17:47:09 +02:00
Markus Friedl
d45e8a05ab sshd.c: PACKET_SKIP_COMPAT and move creation of 'ssh' to main(). 2012-09-20 17:47:09 +02:00
Damien Miller
c726a5f036 fix a crash when loading RSA1 keys
tidy and refactor a little more
2012-09-20 17:39:24 +02:00
Damien Miller
055804bec5 move ssh-agent to new buffer API
factor out key parsing to make it more readable and separable in
the future.
2012-09-20 17:39:24 +02:00
Damien Miller
025f752c90 convert sftp* to new buffer API 2012-09-20 16:34:54 +02:00
Damien Miller
12d60b5fa2 be more careful with initialisation/free 2012-09-20 16:34:54 +02:00
Markus Friedl
976287cf8d auth1.c: PACKET_SKIP_COMPAT 2012-09-20 13:00:33 +02:00
Markus Friedl
657870f5a3 auth2.c: PACKET_SKIP_COMPAT 2012-09-20 12:40:32 +02:00
Markus Friedl
f49fa0e0b2 auth2-jpake.c: PACKET_SKIP_COMPAT 2012-09-20 12:27:59 +02:00
Markus Friedl
45b1a33a8e monitor*.c: make JPAKE compile 2012-09-20 12:27:34 +02:00
Markus Friedl
253e997d49 sshconnect2.c: fix JPAKE 2012-09-20 12:16:43 +02:00
Markus Friedl
148890964a auth2-kbdint.c: PACKET_SKIP_COMPAT 2012-09-20 11:34:42 +02:00
Markus Friedl
1a44de2fcb auth2-hostbased.c: PACKET_SKIP_COMPAT 2012-09-20 11:31:49 +02:00
Markus Friedl
fbd7e0b979 feedback djm@: no need to protect free(); fix typo 2012-09-20 11:15:46 +02:00
Markus Friedl
df2113d4ba pass struct ssh to serverloop.c:wait_until_can_do_something() 2012-09-20 11:15:46 +02:00
Markus Friedl
f72bcc6f56 serverloop.c: PACKET_SKIP_COMPAT 2012-09-20 11:15:46 +02:00
Markus Friedl
00783f762b auth2-gss.c: PACKET_SKIP_COMPAT 2012-09-20 11:15:46 +02:00
Markus Friedl
866615b686 auth2-chall.c: PACKET_SKIP_COMPAT 2012-09-20 11:15:46 +02:00
Markus Friedl
c2b17bb9c2 sshconnect1.c: PACKET_SKIP_COMPAT 2012-09-20 11:15:46 +02:00
Markus Friedl
23f31b72d2 sshpkt_put_u8 should touch the OUTGOING buffer 2012-09-20 11:15:46 +02:00
Markus Friedl
383e471d75 PACKET_SKIP_COMPAT2 for sshconnect2.c 2012-09-20 11:15:45 +02:00
Markus Friedl
02c95ed3ec clientloop.c: cleanup and return error in the dispatch functions 2012-09-20 11:15:45 +02:00
Markus Friedl
0159ba24d4 ssh_packet_check_eom -> sshpkt_get_end 2012-09-20 11:15:45 +02:00
Markus Friedl
69fe69f28d PACKET_SKIP_COMPAT for clientloop.c 2012-09-20 11:15:45 +02:00
Damien Miller
a873d2e3a2 convert mux.c to new buffer API 2012-09-20 17:38:56 +10:00
Damien Miller
02bdd02dca fix from markus@ - remove replaced buffer_ call 2012-09-20 15:55:03 +10:00
Damien Miller
88779e59e4 make leakmalloc work again
sort of, it looks like PIE has broken it on other ways
2012-09-20 03:39:41 +10:00
Damien Miller
54c2c68956 This stated as a conversion of monitor*.[ch] to the new
buffer API, but it got away from me...

Includes a change from u_int -> size_t in the key API that
touches quite a few things
2012-09-20 01:22:35 +10:00
Markus Friedl
79d66b3de8 add sshpkt_get(), use it for the rsa-response 2012-09-19 14:55:31 +02:00
Markus Friedl
a3ba607c6e PACKET_SKIP_COMPAT2: make ssh_packet_put/get optional 2012-09-19 12:45:22 +02:00
Markus Friedl
74788552f7 auth2-pubkey.c: PACKET_SKIP_COMPAT 2012-09-19 12:31:31 +02:00
Markus Friedl
fb19315b10 add -Wuninitialized 2012-09-19 12:30:29 +02:00
Markus Friedl
874b586408 auth2-passwd: PACKET_SKIP_COMPAT, no xfree, sshpkt_get* 2012-09-19 11:57:54 +02:00
Markus Friedl
7f2a70f96d auth-rsa: set PACKET_SKIP_COMPAT 2012-09-19 11:57:54 +02:00
Markus Friedl
fa8ee9ffc4 remove DISPATCH_COMPAT 2012-09-19 11:57:54 +02:00
Damien Miller
5f13a96cef convert auth2-gss.c gss-genr.c sshconnect2.c to new buffer API 2012-09-19 19:43:19 +10:00
Damien Miller
ab2d02776f fix whitespace horror 2012-09-19 19:42:57 +10:00
Damien Miller
449fa4049d Convert auth-options.c auth.c auth2-pubkey.c and channels code to new
buffer API
2012-09-19 18:40:19 +10:00
Damien Miller
48e840c69e fix include guard and some whitespace nits 2012-09-19 18:39:46 +10:00
Damien Miller
7acfe18212 fix error return codes 2012-09-19 15:38:04 +10:00
Damien Miller
725fecd4cc defatal rsa.[ch] 2012-09-19 05:03:02 +10:00
Damien Miller
2a99b71b39 Include CRC compensation attack detector in per-transport state structure 2012-09-17 21:41:05 +02:00
Markus Friedl
fbbec84071 sync to cvs as of 2012-09-14 2012-09-14 18:59:11 +02:00
Markus Friedl
e3403f3457 update to openssh-6.1 2012-07-30 20:41:29 +02:00
Markus Friedl
8ed0e3c614 treat all PEM_read_bio_PrivateKey() errors as SSH_ERR_KEY_WRONG_PASSPHRASE 2012-04-06 14:08:12 +02:00
Markus Friedl
19d6c6ae8b do not leak existing comment 2012-04-02 21:13:32 +02:00
Damien Miller
bdc1f63423 fixes - bad message format in ssh_decrypt_challenge(), missing break in ssh_add_identity_constrained() 2012-03-27 09:43:50 +11:00