1
0
mirror of https://git.libssh.org/projects/libssh.git synced 2025-07-29 13:01:13 +03:00

Commit Graph

  • ebcd6eee3c misc: Add function to check username syntax Norbert Pocs 2023-12-27 20:32:18 +01:00
  • d7f7c952f2 sftp_aio.dox: Change the sftp aio tutorial to incorporate capping Eshan Kelkar 2023-12-30 14:02:11 +05:30
  • 9857a5ef59 bench_sftp.c: Change sftp aio upload benchmark Eshan Kelkar 2023-12-14 10:35:20 +05:30
  • 47d8bcf9a5 bench_sftp.c: Change sftp aio download benchmark Eshan Kelkar 2023-12-13 10:33:07 +05:30
  • d73a0acef7 torture_sftp_aio.c: Change the tests according to aio api changes Eshan Kelkar 2023-12-11 12:44:30 +05:30
  • 188a9cf68f sftp_aio.c, sftp.h: Add capping to sftp aio write API Eshan Kelkar 2023-12-07 10:44:58 +05:30
  • 91990f9dfa sftp_aio.c, sftp.h: Add capping to the sftp aio read API Eshan Kelkar 2023-12-07 10:16:48 +05:30
  • d2d5e717f3 torture_sftp_limits.c: Change the test Eshan Kelkar 2023-12-10 09:22:27 +05:30
  • 4f24fbd3a0 sftp.c, sftp.h: Store the limits in the sftp_session Eshan Kelkar 2023-12-07 11:39:36 +05:30
  • 5ea247df8e sftp.c: Reformat sftp limits API accoding to the current coding style Eshan Kelkar 2023-12-08 11:39:12 +05:30
  • 63ee84862b sftp.c: Reformat sftp_init() according to the current coding style Eshan Kelkar 2023-12-06 11:39:35 +05:30
  • 99e8f34142 Fix docstring for ssh_message_auth_password() JamesWrigley 2024-01-04 22:13:57 +01:00
  • 9cf3d79abc Fix docstring for ssh_userauth_kbdint_getanswer() JamesWrigley 2024-01-05 12:53:11 +01:00
  • 3fa6c1639e Remove logging functions from the threads Doxygen group JamesWrigley 2024-01-06 01:27:23 +01:00
  • 22c41e6784 Happy new year 2024! Andreas Schneider 2024-01-09 08:11:28 +01:00
  • 804e283c8b Document that options set on a bind will be free'd by ssh_bind_free JamesWrigley 2023-12-05 17:55:25 +01:00
  • 8fbb12eddf Document that ssh_channel_read_nonblocking() will trigger callbacks JamesWrigley 2023-12-11 18:42:37 +01:00
  • a5cc515f02 Document that ssh_channel_read_nonblocking() may return SSH_EOF JamesWrigley 2023-12-11 18:21:17 +01:00
  • 24dfc59264 pki: Rewrite default key format handling to improve readability Jakub Jelen 2023-12-20 09:58:21 +01:00
  • 283d75802d session: Avoid memory leaks Jakub Jelen 2023-12-20 09:43:18 +01:00
  • 71c47b464a Generate a tagfile with Doxygen JamesWrigley 2023-12-24 01:10:06 +01:00
  • d53236d69f Fix typos detected with new codespell Jakub Jelen 2024-01-02 16:13:36 +01:00
  • 5dc10ff63c tests: Increase test coverage for IPv6 address parsing as hostnames stable-0.9 Jakub Jelen 2023-12-22 09:52:18 +01:00
  • 72f59157e6 Fix regression in IPv6 addresses in hostname parsing Jakub Jelen 2023-12-22 10:32:40 +01:00
  • 6f1b1e76bb tests: Increase test coverage for IPv6 address parsing as hostnames stable-0.10 Jakub Jelen 2023-12-22 09:52:18 +01:00
  • 1a02364b51 Fix regression in IPv6 addresses in hostname parsing Jakub Jelen 2023-12-22 10:32:40 +01:00
  • 6f6e453d7b tests: Increase test coverage for IPv6 address parsing as hostnames Jakub Jelen 2023-12-22 09:52:18 +01:00
  • 4f997aee7c Fix regression in IPv6 addresses in hostname parsing Jakub Jelen 2023-12-22 10:32:40 +01:00
  • d18bd23358 Bump version to 0.9.8 libssh-0.9.8 Jakub Jelen 2023-12-15 16:28:10 +01:00
  • 5dfe742737 Generate new 2k certificate key working in FIPS Jakub Jelen 2022-05-10 20:47:45 +02:00
  • aef4a47000 CVE-2023-6918: tests: Code coverage for ssh_get_pubkey_hash() Jakub Jelen 2023-12-15 15:39:12 +01:00
  • 9276027c68 CVE-2023-6918: kdf: Detect context init failures Jakub Jelen 2023-12-15 13:35:14 +01:00
  • a45a3c940d CVE-2023-6918: Systematically check return values when calculating digests Jakub Jelen 2023-12-15 12:55:54 +01:00
  • 882d9cb5c8 CVE-2023-6918: Remove unused evp functions and types Jakub Jelen 2023-12-15 12:55:27 +01:00
  • 93c1dbd69f CVE-2023-6918: kdf: Reformat Jakub Jelen 2023-12-15 10:30:09 +01:00
  • 768d1ed30c CVE-2023-48795: tests: Adjust calculation to strict kex Jakub Jelen 2023-12-14 12:47:48 +01:00
  • 03bbbc9e4c CVE-2023-48795: Strip extensions from both kex lists for matching Jakub Jelen 2023-12-14 12:22:01 +01:00
  • fd49482555 CVE-2023-48795: Server side mitigations Aris Adamantiadis 2023-12-12 23:30:26 +01:00
  • 87b93be5a2 CVE-2023-48795: client side mitigation Aris Adamantiadis 2023-12-12 23:09:57 +01:00
  • 6a8a18c73e CVE-2023-6004: torture_misc: Add tests for ipv6 link-local Norbert Pocs 2023-11-28 15:27:31 +01:00
  • cdaec0d627 CVE-2023-6004: misc: Add ipv6 link-local check for an ip address Norbert Pocs 2023-11-28 15:26:45 +01:00
  • a0dbe0d556 CVE-2023-6004: torture_misc: Add test for ssh_is_ipaddr Norbert Pocs 2023-11-06 20:11:38 +01:00
  • 8cf4f4bfda CVE-2023-6004: torture_proxycommand: Add test for proxycommand injection Norbert Pocs 2023-10-10 10:28:47 +02:00
  • 4d7ae19e9c CVE-2023-6004: config_parser: Check for valid syntax of a hostname if it is a domain name Norbert Pocs 2023-10-10 18:33:56 +02:00
  • 234ecdf4d9 CVE-2023-6004: torture_misc: Add test for ssh_check_hostname_syntax Norbert Pocs 2023-10-10 12:45:28 +02:00
  • efb24b6472 CVE-2023-6004: misc: Add function to check allowed characters of a hostname Norbert Pocs 2023-10-10 12:44:16 +02:00
  • a5b8bd0d88 CVE-2023-6004: options: Simplify the hostname parsing in ssh_options_set Norbert Pocs 2023-10-31 09:48:52 +01:00
  • c3234e5f94 CVE-2023-6004: config_parser: Allow multiple '@' in usernames Norbert Pocs 2023-11-01 11:24:43 +01:00
  • 11bd6e6ad9 CVE-2023-6004: torture_config: Allow multiple '@' in usernames Norbert Pocs 2023-11-05 13:12:47 +01:00
  • 8b8584ce5f channels: Avoid out-of-bounds writes Jakub Jelen 2023-06-28 12:14:43 +02:00
  • 2dffb97007 session: Avoid potential null dereference on low-memory conditions Jakub Jelen 2023-06-28 10:43:51 +02:00
  • 10e09e273f Bump version to 0.10.6 libssh-0.10.6 Jakub Jelen 2023-12-15 16:28:10 +01:00
  • 622421018b CVE-2023-6918: tests: Code coverage for ssh_get_pubkey_hash() Jakub Jelen 2023-12-15 15:39:12 +01:00
  • 8977e246b6 CVE-2023-6918: kdf: Detect context init failures Jakub Jelen 2023-12-15 13:35:14 +01:00
  • 8b66d037d5 CVE-2023-6918: Systematically check return values when calculating digests Jakub Jelen 2023-12-15 12:55:54 +01:00
  • 63ff242131 CVE-2023-6918: Remove unused evp functions and types Jakub Jelen 2023-12-15 12:55:27 +01:00
  • 610d7a09f9 CVE-2023-6918: kdf: Reformat Jakub Jelen 2023-12-15 10:30:09 +01:00
  • 89df759200 CVE-2023-48795: tests: Adjust calculation to strict kex Jakub Jelen 2023-12-14 12:47:48 +01:00
  • 5846e57538 CVE-2023-48795: Strip extensions from both kex lists for matching Jakub Jelen 2023-12-14 12:22:01 +01:00
  • 0870c8db28 CVE-2023-48795: Server side mitigations Aris Adamantiadis 2023-12-12 23:30:26 +01:00
  • 4cef5e965a CVE-2023-48795: client side mitigation Aris Adamantiadis 2023-12-12 23:09:57 +01:00
  • 2c492ee179 CVE-2023-6004: torture_misc: Add tests for ipv6 link-local Norbert Pocs 2023-11-28 15:27:31 +01:00
  • cea841d71c CVE-2023-6004 misc: Add ipv6 link-local check for an ip address Norbert Pocs 2023-11-28 15:26:45 +01:00
  • 62d3101c1f CVE-2023-6004: torture_misc: Add test for ssh_is_ipaddr Norbert Pocs 2023-11-06 20:11:38 +01:00
  • d7467498fd CVE-2023-6004: torture_proxycommand: Add test for proxycommand injection Norbert Pocs 2023-10-10 10:28:47 +02:00
  • 22492b69bb CVE-2023-6004: config_parser: Check for valid syntax of a hostname if it is a domain name Norbert Pocs 2023-10-10 18:33:56 +02:00
  • 9bbb817c0c CVE-2023-6004: torture_misc: Add test for ssh_check_hostname_syntax Norbert Pocs 2023-10-10 12:45:28 +02:00
  • c618040967 CVE-2023-6004: misc: Add function to check allowed characters of a hostname Norbert Pocs 2023-10-10 12:44:16 +02:00
  • 8615c24647 CVE-2023-6004: options: Simplify the hostname parsing in ssh_options_set Norbert Pocs 2023-10-31 09:48:52 +01:00
  • a66b4a6eae CVE-2023-6004: config_parser: Allow multiple '@' in usernames Norbert Pocs 2023-11-01 11:24:43 +01:00
  • c2c56bacab CVE-2023-6004: torture_config: Allow multiple '@' in usernames Norbert Pocs 2023-11-05 13:12:47 +01:00
  • 52ebecf81c poll: Avoid passing other events to callbacks when called recursively Jakub Jelen 2023-08-04 21:39:46 +02:00
  • 4b935d0785 poll: Drop all events except POLLOUT when called recursively Jakub Jelen 2023-07-04 17:06:11 +02:00
  • 57b92b18d6 ci: Output errors for 'fedora/ninja' too. Simon Josefsson 2023-08-07 10:55:51 +02:00
  • 48f217176f doc: Update IETF links. Simon Josefsson 2023-08-20 22:05:48 +02:00
  • e8474e1ba3 channels: Avoid out-of-bounds writes Jakub Jelen 2023-06-28 12:14:43 +02:00
  • 85ce922bc4 session: Avoid potential null dereference on low-memory conditions Jakub Jelen 2023-06-28 10:43:51 +02:00
  • 49ead8f08e Fix ssh_send_issue_banner() for CMD(PowerShell) Seung Min Park 2022-10-27 06:36:54 +00:00
  • b3de3a3335 CVE-2023-6918: tests: Code coverage for ssh_get_pubkey_hash() Jakub Jelen 2023-12-15 15:39:12 +01:00
  • 59c00c66c4 CVE-2023-6918: kdf: Detect context init failures Jakub Jelen 2023-12-15 13:35:14 +01:00
  • 5c407d2f16 CVE-2023-6918: Systematically check return values when calculating digests Jakub Jelen 2023-12-15 12:55:54 +01:00
  • 10c200037a CVE-2023-6918: Remove unused evp functions and types Jakub Jelen 2023-12-15 12:55:27 +01:00
  • a16f34c57a CVE-2023-6918: kdf: Reformat Jakub Jelen 2023-12-15 10:30:09 +01:00
  • a8b9d13687 CVE-2023-48795: tests: Adjust calculation to strict kex Jakub Jelen 2023-12-14 12:47:48 +01:00
  • bdcdf92096 CVE-2023-48795: Strip extensions from both kex lists for matching Jakub Jelen 2023-12-14 12:22:01 +01:00
  • 3876976ced CVE-2023-48795: Server side mitigations Aris Adamantiadis 2023-12-12 23:30:26 +01:00
  • 7ecc6a704b CVE-2023-48795: client side mitigation Aris Adamantiadis 2023-12-12 23:09:57 +01:00
  • f353b39ff2 CVE-2023-6004: torture_misc: Add tests for ipv6 link-local Norbert Pocs 2023-11-28 15:27:31 +01:00
  • 2c92e8ce93 CVE-2023-6004: misc: Add ipv6 link-local check for an ip address Norbert Pocs 2023-11-28 15:26:45 +01:00
  • 92e35c291c CVE-2023-6004: torture_misc: Add test for ssh_is_ipaddr Norbert Pocs 2023-11-06 20:11:38 +01:00
  • 7b697d711e CVE-2023-6004: torture_proxycommand: Add test for proxycommand injection Norbert Pocs 2023-10-10 10:28:47 +02:00
  • 95c6f880ef CVE-2023-6004: config_parser: Check for valid syntax of a hostname if it is a domain name Norbert Pocs 2023-10-10 18:33:56 +02:00
  • 2cd971e10e CVE-2023-6004: torture_misc: Add test for ssh_check_hostname_syntax Norbert Pocs 2023-10-10 12:45:28 +02:00
  • 0ff85b034a CVE-2023-6004: misc: Add function to check allowed characters of a hostname Norbert Pocs 2023-10-10 12:44:16 +02:00
  • b83368b2ed CVE-2023-6004: options: Simplify the hostname parsing in ssh_options_set Norbert Pocs 2023-10-31 09:48:52 +01:00
  • 1dfde16f49 CVE-2023-6004: config_parser: Allow multiple '@' in usernames Norbert Pocs 2023-11-01 11:24:43 +01:00
  • 57ec9a35c6 CVE-2023-6004: torture_config: Allow multiple '@' in usernames Norbert Pocs 2023-11-05 13:12:47 +01:00
  • 75a177f8d6 Test coverage for file export and for PEM and OpenSSH formats Jakub Jelen 2023-08-15 18:59:20 +02:00
  • 417a0f01f8 examples: Demonstrate export of different key formats Jakub Jelen 2023-08-11 16:53:40 +02:00
  • 3fa28aaf49 pki: New API functions exporting (also ed25519 keys in different formats) Jakub Jelen 2023-08-11 16:22:01 +02:00