summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/buffer.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
* remove legacy buffer API emulation layer; ok djm@markus2018-07-091-90/+0
|
* remove SSHv1 support from packet and buffer APIsdjm2017-04-301-5/+1
| | | | ok markus@
* New buffer API; the first installment of the conversion/replacementdjm2014-04-301-36/+30
| | | | | | | | | | | | of OpenSSH's internals to make them usable as a standalone library. This includes a set of wrappers to make it compatible with the existing buffer API so replacement can occur incrementally. With and ok markus@ Thanks also to Ben Hawkes, David Tomaschik, Ivan Fratric, Matthew Dempsky and Ron Bowes for a detailed review.
* buffer_get_string_ptr's return should be const to reminddjm2014-04-281-3/+3
| | | | | callers that futzing with it will futz with the actual buffer contents
* avoid use of OpenSSL BIGNUM type and functions for KEX withdjm2014-01-121-1/+5
| | | | | | | Curve25519 by adding a buffer_put_bignum2_from_string() that stores a string using the bignum encoding rules. Will make it easier to build a reduced-feature OpenSSH without OpenSSL in the future; ok markus@
* fix pointer-signedness warnings from clang/llvm-3.3; "seems nice" deraadt@djm2013-07-121-2/+2
|
* Implement Elliptic Curve Cryptography modes for key exchange (ECDH) anddjm2010-08-311-1/+8
| | | | | | | | | | | | | | | | | host/user keys (ECDSA) as specified by RFC5656. ECDH and ECDSA offer better performance than plain DH and DSA at the same equivalent symmetric key length, as well as much shorter keys. Only the mandatory sections of RFC5656 are implemented, specifically the three REQUIRED curves nistp256, nistp384 and nistp521 and only ECDH and ECDSA. Point compression (optional in RFC5656 is NOT implemented). Certificate host and user keys using the new ECDSA key types are supported. Note that this code has not been tested for interoperability and may be subject to change. feedback and ok markus@
* Add buffer_get_cstring() and related functions that verify that thedjm2010-08-311-1/+3
| | | | | | | | | | | | | string extracted from the buffer contains no embedded \0 characters* This prevents random (possibly malicious) crap from being appended to strings where it would not be noticed if the string is used with a string(3) function. Use the new API in a few sensitive places. * actually, we allow a single one at the end of the string for now because we don't know how many deployed implementations get this wrong, but don't count on this to remain indefinitely.
* constify the arguments to buffer_len, buffer_ptr and buffer_dumpdjm2010-02-091-4/+4
|
* add a buffer_get_string_ptr_ret() that does the same asdjm2010-01-121-1/+2
| | | | buffer_get_string_ptr() but does not fatal() on error; ok dtucker@
* avoid extra malloc/copy/free when receiving data over the net;markus2008-05-081-1/+2
| | | | ~10% speedup for localhost-scp; ok djm@
* almost entirely get rid of the culture of ".h files that include .h files"deraadt2006-08-031-1/+37
| | | | | ok djm, sort of ok stevesk makes the pain stop in one easy step
* Fix condition where we could exit with a fatal error when an inputdjm2006-04-161-4/+3
| | | | | | | | | buffer became too large and the remote end had advertised a big window. The problem was a mismatch in the backoff math between the channels code and the buffer code, so make a buffer_check_alloc() function that the channels code can use to propsectivly check whether an incremental allocation will succeed. bz #1131, debugged with the assistance of cove AT wildpackets.com; ok dtucker@ deraadt@
* standardise spacing in $OpenBSD$ tags; requested by deraadt@djm2006-03-251-1/+1
|
* limit input buffer size for channels; bugzilla #896; with and ok dtucker@markus2005-03-141-1/+4
|
* introduce a new buffer API that returns an error rather than fatal()ing whendjm2004-10-291-1/+5
| | | | presented with bad data; ok markus@
* $OpenBSD$ and RCSID() cleanup: don't use RCSID() in .h files; addstevesk2002-03-041-2/+2
| | | | | missing RCSID() to .c files and remove dup /*$OpenBSD$*/ from .c files. ok markus@
* change the buffer/packet interface to use void* vs. char*; ok markus@stevesk2001-12-191-6/+6
|
* remove comments from .h, since they are cut&paste from the .c filesmarkus2001-06-261-39/+16
| | | | and out of sync
* prototype pedant. not very creative...itojun2001-06-261-12/+12
| | | | | - () -> (void) - no variable names
* replace 'unsigned bla' with 'u_bla' everywhere. also, replace 'char unsigned'markus2000-12-191-10/+10
| | | | with u_char.
* cleanup copyright notices on all files. I have attempted to be accurate withderaadt2000-09-071-8/+6
| | | | | | | the details. everything is now under Tatu's licence (which I copied from his readme), and/or the core-sdi bsd-ish thing for deattack, or various openbsd developers under a 2-term bsd licence. We're not changing any rules, just being accurate.
* OpenBSD tagmarkus2000-06-201-1/+1
|
* whitespace cleanupmarkus2000-04-141-7/+7
|
* KNF, final part 3markus1999-11-241-6/+10
|
* much more KNFderaadt1999-11-241-35/+33
|
* i bet a lot of people didn't know what ssh 1.2.16 had a nice license.deraadt1999-09-261-0/+66
well, except for the patent issues. someone in sweden (forget their name at the moment) cleaned out most of the patented code, and now this code removes rsa code. when this is done, it will link against libssl, but the work isn't completely done yet. then we need to bring this up to modern days, featurewise.