7b2e07ecbc
session: Fix a possible memory leak.
2014-01-06 16:18:06 +01:00
0404d45c29
poll: fix poll_handles ownerships
2014-01-06 16:18:06 +01:00
f2215d14de
socket: don't attempt reading a non-connected socket
2014-01-06 16:18:06 +01:00
ebbf7988b9
tests: use LC_LIBSSH instead of LANG for env tests.
...
LANG is stripped and replaced on many distros and LC_* is accepted
by default on debian
2014-01-06 16:17:38 +01:00
ec307d9862
examples: Fix building samplesshd-tty on FreeBSD.
2013-12-26 16:38:38 +01:00
2068973ff3
poll: Correctly free ssh_event_fd_wrapper.
...
This is allocated by ssh_event_add_fd.
2013-12-22 22:26:51 +01:00
6eea08a9ef
config: Support expansion in the Host variable too.
...
BUG: https://red.libssh.org/issues/127
2013-12-21 14:37:55 +01:00
3ba2e7ace7
tests: Fix non-blocking auth tests.
...
The ssh_userauth_none() call should already be non-blocking. However
this this function is broken in non-blocking mode. It should reveal the
existing bug.
2013-12-15 21:04:46 +01:00
15c64b2981
tests: Use new auth API in the torture_session test.
2013-12-15 20:30:48 +01:00
ce5d421753
tests: Use new auth API in the torture_auth test.
2013-12-15 20:26:59 +01:00
fd77439a12
tests: Fix pki test with gcrypt.
2013-12-11 21:12:12 +01:00
a633deb985
channel: fix setting of channel->flags
...
Fix the setting of 'channel->flags' to use '|='. Before this
change, one bug symptom can be that channels are never fully
free'd via ssh_channel_free, resulting in memory leaks.
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-12-11 21:03:45 +01:00
50b9a182f5
client: use ssh_channel_do_free in ssh_disconnect
...
Ensure to use 'ssh_channel_do_free' in 'ssh_disconnect', when removing and
free'ing up a session's channels. This matches the behavior in 'ssh_free',
and is necessary to fully free any channel which may not have been closed
completely (see usage of flags SSH_CHANNEL_FLAG_CLOSED_REMOTE,
SSH_CHANNEL_FLAG_FREED_LOCAL).
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-12-11 21:03:43 +01:00
bb88b637a9
bind: Correctly free all memory in ssh_bind_free().
...
Thanks to Jacob Baines.
2013-12-09 19:50:52 +01:00
60d5824760
session: Add ssh_get_clientbanner().
2013-12-07 16:24:53 +01:00
397be918cd
channels: Add a ssh_channel_read_timeout function.
2013-12-04 20:34:52 +01:00
880fdb4b52
tests: Try to fix torture_forward.
2013-12-04 16:27:19 +01:00
6a74677cef
tests: Fix memory leaks.
2013-12-04 16:27:18 +01:00
2c66eeaf75
pki: Fix a memory leak.
...
CID #1132819
2013-11-28 11:44:34 +01:00
91edc0ee21
tests: Add torture_pki_write_privkey_ecdsa test.
2013-11-27 22:54:40 +01:00
46bda45d95
tests: Add torture_pki_write_privkey_dsa test.
2013-11-27 22:54:40 +01:00
9773c0852a
tests: Add torture_pki_write_privkey_rsa test.
2013-11-27 22:54:40 +01:00
f1c56e4309
pki: Add ssh_pki_import_privkey_file().
2013-11-27 22:54:40 +01:00
1fdc1025a8
pki_crypto: Add pki_private_key_to_pem().
2013-11-27 22:54:40 +01:00
a375b6c996
pki_gcrypt: Add pki_private_key_to_pem() stub.
2013-11-27 22:54:40 +01:00
ecb01e05a2
curve25519: Fix memory leaks in ssh_server_curve25519_init().
...
CID #1125255
2013-11-27 22:53:53 +01:00
b3911d0fa2
curve25519: Do not leak q_s_string.
...
CID #1125256
2013-11-27 22:53:53 +01:00
1ee687ea6f
curve25519: Fix a memory leak.
...
CID #1125257
2013-11-27 22:53:53 +01:00
73e1f2691f
examples: Fix else branch.
...
CID #1127816
2013-11-27 22:53:53 +01:00
84e29f9c06
packet: Remove logically dead code.
...
CID #1128796
2013-11-27 22:53:53 +01:00
23837b2080
tests: Try to fix valgrind warnings.
2013-11-27 22:53:53 +01:00
4884f1d6fc
tests: Fix a valgrind warning.
2013-11-27 22:53:53 +01:00
ead1c4b168
ecdh: Check if we have ECC support.
2013-11-27 22:53:53 +01:00
3e11cb8071
ecdh: Use bignum_bin2bn.
2013-11-27 22:53:48 +01:00
78e78642e7
server: Add a ssh_send_keepalive() function.
...
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-11-24 23:21:39 +01:00
7ab0e3fe62
channel: fix infinite loop in channel_write_common
...
BUG: https://red.libssh.org/issues/130
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-11-22 10:34:49 +01:00
5da02d6de2
Update ChangeLog.
2013-11-19 10:29:59 +01:00
94db978218
flush channel after EOF and CLOSE
2013-11-18 17:23:52 +01:00
78ea8608b0
logging: fix server-side logging
2013-11-18 15:28:59 +01:00
7d9940d6eb
gssapi: fix logging
2013-11-18 15:10:56 +01:00
9f4fa22250
sockets: null pointer check
2013-11-18 14:42:06 +01:00
330f6c73f6
gssapi: Fix support of delegated credentials
...
In a previous refactoring patch, the code underpinning the
ssh_gssapi_set_creds() API was inadvertently removed. This patch
fixes the problem.
Also clarify what variable holds which credentials and insure that
credentials created within the library are propelry freed.
Signed-off-by: Simo Sorce <simo@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-11-17 11:43:52 +01:00
4a3934da48
gssapi: Add support for GSSAPIDelegateCredentials config option.
...
Signed-off-by: Simo Sorce <simo@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-11-17 11:43:52 +01:00
68b996bdbf
options: Add SSH_OPTIONS_GSSAPI_DELEGATE_CREDENTIALS option.
...
Signed-off-by: Simo Sorce <simo@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-11-17 11:43:50 +01:00
d364374422
gssapi: Add error checks and cleanup the code in ssh_gssapi_auth_mic().
2013-11-15 16:29:49 +01:00
00af5bd582
gssapi: Use GSSAPIClientIdentity to acquire creds
...
Signed-off-by: Simo Sorce <simo@redhat.com >
Reviewed-by: Andreas Schneider <asn@cryptomilk.org >
2013-11-15 16:29:49 +01:00
1ab5abf0e6
gssapi: Add support for GSSAPIClientIdentity config option.
2013-11-15 16:29:49 +01:00
f5d1d813fb
options: Add SSH_OPTIONS_GSSAPI_CLIENT_IDENTITY option.
2013-11-15 16:29:49 +01:00
92928a7d8d
gssapi: Add support for GSSAPIServerIdentity config option.
2013-11-15 16:29:49 +01:00
651c173e72
gssapi: Add suppport to set GSSAPI server identity.
2013-11-15 16:29:49 +01:00