Markus Friedl
f72f4b214f
replace sshbuf_new/sshbuf_put with sshbuf_from.
2012-10-10 23:49:31 +02:00
Markus Friedl
185e7749a3
mux.c: replace sshbuf_get_stringb with sshbuf_froms
2012-10-10 23:16:31 +02:00
Markus Friedl
472fc6a429
packet.c: convert to sshbuf_froms()
2012-10-10 23:04:56 +02:00
Markus Friedl
eab15ba6bf
ssh-keygen: missing s/sshbuf_get_stringb/sshbuf_froms/
2012-10-10 23:01:40 +02:00
Markus Friedl
c0624b12c7
check sshbuf_mutable_ptr return value, or convert to sshbuf_ptr
2012-10-10 01:25:20 +02:00
Markus Friedl
b33c381086
s/get_cstring/get_string/ since ssh1 pads passwords with zero
2012-10-10 01:16:00 +02:00
Markus Friedl
9d8cfbd2cb
umac128_update() now takes a const input
2012-10-10 00:08:40 +02:00
Damien Miller
8f73555808
protect sshbuf_from[bs] children by refusing modification of the parent buffers
...
This adds a reference mechanism to struct sshbuf, making parent buffers to
those created with buffer_froms() and buffer_fromb() read-only until the
child buffer is freed. It also delays freeing of the parent buffer until
all child buffers have freed.
2012-10-09 23:22:54 +02:00
Damien Miller
fa6c75e284
remove sshbuf_reset() made redundant by RO buffer code
2012-10-09 23:22:54 +02:00
Damien Miller
b305993cea
deprecate the buffer_init() sshbuf entrypoint.
...
Allows making struct sshbuf opaque
2012-10-09 23:22:53 +02:00
Damien Miller
60cb7a627f
new functions for read-only buffers with external storage
...
This adds some new functions: sshbuf_from(), sshbuf_fromb() and sshbuf_froms()
that create new buffers from a read-only blob, the contents of a buffer and
the contents of a string in a buffer respectively. In all cases the memory
contents are not copied - the new buffer, which is read-only, just refers to
the original location in memory.
2012-10-09 23:22:53 +02:00
Markus Friedl
a59dfd6051
monitor.c: missing p -> username conversion (use-after-free)
2012-10-07 21:15:20 +02:00
Markus Friedl
96b8844e9e
sync cvs as of 2012-10-05
2012-10-05 14:40:20 +02:00
Markus Friedl
48278e629e
remove remaining calls to packet_*
2012-09-21 12:07:07 +02:00
Markus Friedl
dcdd40541b
replace some active_state with ssh
2012-09-21 12:04:08 +02:00
Markus Friedl
78acd9ffb3
convert ssh_put_passwd to ssh_err
2012-09-21 12:04:08 +02:00
Damien Miller
d01ff4fdfa
remove legacy packet_ calls from ttymodes.c
2012-09-21 19:59:25 +10:00
Markus Friedl
09db263ce7
unbreak auth w/o privsep
2012-09-21 11:58:29 +02:00
Markus Friedl
d37e40e233
fix roaming, feedback djm@
2012-09-21 01:06:40 +02:00
Markus Friedl
7ce2b783cb
roaming: PACKET_SKIP_COMPAT
2012-09-21 00:58:36 +02:00
Markus Friedl
fcd631d4b0
channel.c: PACKET_SKIP_COMPAT
2012-09-21 00:58:36 +02:00
Markus Friedl
48ca6d1326
remove old packet code from session.c, and pass 'ssh' around....
2012-09-21 00:58:36 +02:00
Markus Friedl
0a153a1e28
ssh.c: PACKET_SKIP_COMPAT
2012-09-21 00:58:36 +02:00
Damien Miller
d3255259ea
... and remove packet_send()
2012-09-21 08:52:07 +10:00
Damien Miller
065694672e
actually remove packet_get_int()
2012-09-21 08:49:35 +10:00
Damien Miller
6526ead4fe
remove last compat packet_ function from mux.c
...
add ssh argument to global confirm callbacks. We'll need to put
the head of this list under struct ssh at some time in the future.
2012-09-21 08:15:59 +10:00
Damien Miller
ff7f9875b2
Delete remnants of old buffer code
...
(I thought I did this already)
2012-09-21 08:05:53 +10:00
Damien Miller
5020b06a6b
remove the last traces of the old buffer API
...
yay :)
2012-09-21 05:35:30 +10:00
Damien Miller
4036138982
convert ssh-add.c to new buffer API
...
that was refreshingly easy...
2012-09-21 04:47:42 +10:00
Damien Miller
34df60f64c
convert auth2-chall.c to new buffer API
2012-09-21 04:46:16 +10:00
Damien Miller
c5fd2d828b
convert ssh-keyscan.c to new buffer API
2012-09-21 04:42:52 +10:00
Damien Miller
32c4e89225
allow NULL arguments to get_(bignum[12]|ecpoint) functions to allow skipping
2012-09-21 04:40:57 +10:00
Damien Miller
9ee9bf1541
convert ssh-keysign.c to new buffer API
2012-09-21 04:26:38 +10:00
Damien Miller
e7643ba14f
convert auth2-hostbased.c schnorr.c ssh-pkcs11-client.c to new buffer API
2012-09-21 04:26:38 +10:00
Damien Miller
ece6575b3c
convert serverloop.c ssh-keygen.c ssh-pkcs11-helper.c to new buffer API
2012-09-21 04:26:38 +10:00
Damien Miller
75875617b2
convert clientloop.c to new buffer API
2012-09-21 04:26:38 +10:00
Markus Friedl
359c0b5398
remove redundant kex->ssh assignment
2012-09-20 17:47:09 +02:00
Markus Friedl
d45e8a05ab
sshd.c: PACKET_SKIP_COMPAT and move creation of 'ssh' to main().
2012-09-20 17:47:09 +02:00
Damien Miller
c726a5f036
fix a crash when loading RSA1 keys
...
tidy and refactor a little more
2012-09-20 17:39:24 +02:00
Damien Miller
055804bec5
move ssh-agent to new buffer API
...
factor out key parsing to make it more readable and separable in
the future.
2012-09-20 17:39:24 +02:00
Damien Miller
025f752c90
convert sftp* to new buffer API
2012-09-20 16:34:54 +02:00
Damien Miller
12d60b5fa2
be more careful with initialisation/free
2012-09-20 16:34:54 +02:00
Markus Friedl
976287cf8d
auth1.c: PACKET_SKIP_COMPAT
2012-09-20 13:00:33 +02:00
Markus Friedl
657870f5a3
auth2.c: PACKET_SKIP_COMPAT
2012-09-20 12:40:32 +02:00
Markus Friedl
f49fa0e0b2
auth2-jpake.c: PACKET_SKIP_COMPAT
2012-09-20 12:27:59 +02:00
Markus Friedl
45b1a33a8e
monitor*.c: make JPAKE compile
2012-09-20 12:27:34 +02:00
Markus Friedl
253e997d49
sshconnect2.c: fix JPAKE
2012-09-20 12:16:43 +02:00
Markus Friedl
148890964a
auth2-kbdint.c: PACKET_SKIP_COMPAT
2012-09-20 11:34:42 +02:00
Markus Friedl
1a44de2fcb
auth2-hostbased.c: PACKET_SKIP_COMPAT
2012-09-20 11:31:49 +02:00
Markus Friedl
fbd7e0b979
feedback djm@: no need to protect free(); fix typo
2012-09-20 11:15:46 +02:00