summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/buffer.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* New buffer API; the first installment of the conversion/replacementdjm2014-04-301-189/+54
| | | | | | | | | | | | of OpenSSH's internals to make them usable as a standalone library. This includes a set of wrappers to make it compatible with the existing buffer API so replacement can occur incrementally. With and ok markus@ Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew Dempsky and Ron Bowes for a detailed review.
* convert memset of potentially-private data to explicit_bzero()djm2014-02-021-2/+2
|
* Include stdlib.h for free() as per the man page.dtucker2013-11-081-1/+2
|
* bye, bye xfree(); ok markus@djm2013-05-171-2/+2
|
* constify the arguments to buffer_len, buffer_ptr and buffer_dumpdjm2010-02-091-4/+4
|
* almost entirely get rid of the culture of ".h files that include .h files"deraadt2006-08-031-3/+2
| | | | | ok djm, sort of ok stevesk makes the pain stop in one easy step
* move #include <stdio.h> out of includes.hstevesk2006-08-011-1/+2
|
* move #include <sys/param.h> out of includes.hstevesk2006-07-261-1/+3
|
* move #include <string.h> out of includes.hstevesk2006-07-221-1/+3
|
* Fix condition where we could exit with a fatal error when an inputdjm2006-04-161-13/+48
| | | | | | | | | buffer became too large and the remote end had advertised a big window. The problem was a mismatch in the backoff math between the channels code and the buffer code, so make a buffer_check_alloc() function that the channels code can use to propsectivly check whether an incremental allocation will succeed. bz #1131, debugged with the assistance of cove AT wildpackets.com; ok dtucker@ deraadt@
* Put $OpenBSD$ tags back (as comments) to replace the RCSID()s thatdjm2006-03-251-0/+1
| | | | Theo nuked - our scripts to sync -portable need them in the files
* change OpenSSH's xrealloc() function from being xrealloc(p, new_size) todjm2006-03-251-1/+1
| | | | | | | | xrealloc(p, new_nmemb, new_itemsize). realloc is particularly prone to integer overflows because it is almost always allocating "n * size" bytes, so this is a far safer API; ok deraadt@
* RCSID() can diederaadt2006-03-191-1/+0
|
* limit input buffer size for channels; bugzilla #896; with and ok dtucker@markus2005-03-141-4/+4
|
* introduce a new buffer API that returns an error rather than fatal()ing whendjm2004-10-291-10/+38
| | | | presented with bad data; ok markus@
* unexpand and delete whitespace at EOL; ok markus@djm2003-11-211-2/+2
|
* sign fix in buffer_dump; Jedi/Sector One; pr 3473markus2003-09-191-2/+2
|
* protect against double free; #660; zardoz at users.sf.netmarkus2003-09-181-1/+2
|
* more malloc/fatal fixes; ok millert/deraadt; ghudson at MIT.EDUmarkus2003-09-161-5/+10
|
* do not expand buffer before attempting to reallocate it; markus okderaadt2003-09-161-5/+8
|
* limit append to 1MB and buffers to 10MBmarkus2002-06-261-1/+7
|
* unneeded cast cleanup; ok markus@stevesk2002-01-181-2/+2
|
* change the buffer/packet interface to use void* vs. char*; ok markus@stevesk2001-12-191-11/+14
|
* implement HostbasedAuthentication (= RhostRSAAuthentication for ssh v2)markus2001-04-121-3/+8
| | | | | similar to RhostRSAAuthentication unless you enable (the experimental) HostbasedUsesNameFromPacketOnly option. please test. :)
* allow the ssh client act as a SOCKS4 proxy (dynamic local portforwarding).markus2001-04-071-2/+2
| | | | | | work by Dan Kaminsky <dankamin@cisco.com> and me. thanks to Dan for this great patch: use 'ssh -D 1080 host' and make netscape use localhost:1080 as a socks proxy.
* better error messagemarkus2001-04-051-2/+3
|
* split ssh.h and try to cleanup the #include mess. remove unnecessary #includes.markus2001-01-211-2/+2
| | | | rename util.[ch] -> misc.[ch]
* replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'markus2000-12-191-8/+8
| | | | with u_char.
* cleanup copyright notices on all files. I have attempted to be accurate withderaadt2000-09-071-8/+6
| | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
* OpenBSD tagmarkus2000-06-201-1/+1
|
* whitespace cleanupmarkus2000-04-141-17/+17
|
* typosmarkus2000-04-121-4/+4
|
* KNF, final part 3markus1999-11-241-8/+14
|
* much more KNFderaadt1999-11-241-14/+14
|
* KNF part 1markus1999-11-231-74/+79
|
* i bet a lot of people didn't know what ssh 1.2.16 had a nice license.deraadt1999-09-261-0/+150
well, except for the patent issues. someone in sweden (forget their name at the moment) cleaned out most of the patented code, and now this code removes rsa code. when this is done, it will link against libssl, but the work isn't completely done yet. then we need to bring this up to modern days, featurewise.