Andreas Schneider
4e7736444f
server: Don't leak memory on calling ssh_string_from_char().
...
Also check the return values.
Found by Coverity.
2012-10-12 08:07:01 +02:00
Andreas Schneider
7254390ac2
pki: Don't leak the signature on error paths.
...
Found by Coverity.
2012-10-12 08:07:01 +02:00
Andreas Schneider
188c596803
sftp: Don't leak owner and group in sftp_parse_attr_4.
2012-10-12 08:07:01 +02:00
Andreas Schneider
0295301928
known_hosts: Don't leak memory in ssh_write_knownhost error paths.
...
Found by Coverity.
2012-10-12 08:07:01 +02:00
Andreas Schneider
a6e7d1f255
agent: Fix some memory leaks in error paths.
...
Found by Coverity.
2012-10-12 08:07:01 +02:00
Andreas Schneider
5e8e21d106
options: Check return code of ssh_iterator_value.
...
Found by Coverity.
2012-10-12 08:07:01 +02:00
Andreas Schneider
bcc00eec9b
kex: Don't compare an array to null.
...
Found by Coverity.
2012-10-12 08:07:01 +02:00
Andreas Schneider
53008fb5d4
string: Don't compare an array to null.
...
Found by Coverity.
2012-10-12 08:07:01 +02:00
Andreas Schneider
9338fb8e5e
message: Set correct request type.
...
Found by Coverity.
2012-10-12 08:07:01 +02:00
Andreas Schneider
ec5b4d377f
sftpserver: Add missing break statement.
...
Found by Coverity.
2012-10-12 08:07:01 +02:00
Andreas Schneider
6352b3d93a
server: Fix for loop to free server methods.
...
Found by Coverity.
2012-10-12 08:06:55 +02:00
Andreas Schneider
b8de9e75d0
client: If session is NULL we can't set an error.
...
Found by Coverity.
2012-10-09 11:09:34 +02:00
Andreas Schneider
ec56d1d453
match: Don't dereference 's' directly.
...
Found by Coverity.
2012-10-09 11:09:34 +02:00
Andreas Schneider
131a0de32e
auth: Make error handling code reachable again.
...
Found by Coverity.
2012-10-09 11:09:34 +02:00
Andreas Schneider
3e93836e8b
pki: Make error handling code reachable again.
...
Found by Coverity.
2012-10-09 11:09:34 +02:00
Andreas Schneider
21db70888a
socket: Check return value of buffer function.
...
Found by Coverity.
2012-10-09 11:09:34 +02:00
Andreas Schneider
bb2848de5a
channels: Check return values of buffer functions.
...
Found by Coverity.
2012-10-09 11:09:34 +02:00
Andreas Schneider
6acce40a28
scp: Check return value of ssh_channel_poll.
...
Found by Coverity.
2012-10-09 11:09:34 +02:00
Andreas Schneider
41269874f5
packet: Check return values of buffer functions.
...
Found by Coverity.
2012-10-09 11:09:34 +02:00
Andreas Schneider
9abe591843
client: Check return value of ssh_handle_packets_termination.
...
Found by Coverity.
2012-10-09 11:09:34 +02:00
Andreas Schneider
114cc51a10
pcap: Check return codes of buffer_add_* functions.
...
Found by Coverity.
2012-10-09 11:09:34 +02:00
Andreas Schneider
5f0f334d1c
pki: Don't leak memory in pubkey to blob.
2012-10-07 22:36:06 +02:00
Andreas Schneider
996b7cae26
pki: Make sure we don't double free pointers.
2012-10-07 22:35:33 +02:00
Andreas Schneider
bfa568e448
pki: Check for no memory available calling ssh_key_new().
2012-10-07 22:04:58 +02:00
Andreas Schneider
ff53664f54
sftp: Fix a possible null pointer dereference in sftp_async_read.
2012-10-07 22:03:35 +02:00
Andreas Schneider
b811b89f57
channels1: Fix severa possible null pointer dereferences.
2012-10-07 22:01:48 +02:00
Andreas Schneider
3db2ac41eb
pki: Handle error of pki_import_pubkey_buffer() correctly.
2012-10-07 21:53:37 +02:00
Andreas Schneider
956cf94f70
server: Removed unused variable keytype in the ecdsa case.
2012-10-07 21:31:49 +02:00
Andreas Schneider
191faea325
misc: Use size_t for len.
2012-10-07 18:06:33 +02:00
Andreas Schneider
ecd2ee95e7
kex: Fix supported methods index.
2012-10-07 12:03:54 +02:00
Andreas Schneider
c5782b7486
session: Make sure we don't segfault on freeing id.
2012-10-07 10:52:54 +02:00
Dmitriy Kuznetsov
1e836a03d2
gcrypt: Fix simple DES support.
2012-10-05 11:22:15 +02:00
Andreas Schneider
ceb8072b34
channel: Fix a possible null pointer dereference.
2012-10-05 11:17:06 +02:00
Andreas Schneider
656fd60110
channels: Fix a possible null pointer dereference.
2012-10-05 11:16:03 +02:00
Andreas Schneider
6092596199
getpass: Fix a memory leak in ssh_gets() on error.
2012-10-05 11:12:14 +02:00
Andreas Schneider
22f607649d
sftp: Harden sftp_extension_supported() against null pointers.
2012-10-05 11:12:14 +02:00
Andreas Schneider
b5c4b090da
sftp: Fix a memory on error in sftp_opendir().
2012-10-05 11:12:13 +02:00
Andreas Schneider
fd2064d0b4
messages: Fix error path of ssh_packet_userauth_info_response.
...
This fixes a memory leak on error.
2012-10-05 11:12:13 +02:00
Andreas Schneider
8567fc8d8c
messages: Fix a possible null pointer dereference.
2012-10-05 11:12:13 +02:00
Andreas Schneider
61d032fc03
misc: Don't leak memory on ssh_path_expand_escape() on error.
2012-10-05 11:12:13 +02:00
Andreas Schneider
dc8103925c
packet: Fix a possible segfault.
2012-10-05 11:12:13 +02:00
Andreas Schneider
280ce3fe93
session: Fix a memory leak in ssh_new() on error.
2012-10-05 11:12:13 +02:00
Andreas Schneider
332f1a2a51
channels: Fix a memory leak in ssh_channel_select().
2012-10-05 11:12:13 +02:00
Andreas Schneider
213321d706
options: Fix a memory in ssh_options_copy() on error.
2012-10-05 11:12:13 +02:00
Andreas Schneider
cddfe602cc
options: Fix a memory leak if we can't add an idenity.
2012-10-05 11:08:51 +02:00
Andreas Schneider
d0889dd9ea
kex: Fix simpledes with gcrypt.
2012-09-25 15:29:38 +02:00
Andreas Schneider
3c5235fdc0
dh: Fix dh_generate_e() with gcrypt.
2012-09-25 15:25:52 +02:00
Andreas Schneider
ed94e7f8a8
messages: Fix a possible null pointer dereference.
2012-09-24 20:57:40 +02:00
Christophe Baribaud
9460c5906f
MSVC Windows and winsock2.h
...
With Microsoft Visual Studio, winsock2.h shall be included before
ws2tcpip.h
Signed-off-by: Christophe Baribaud <christophe.baribaud@gmail.com>
Signed-off-by: Andreas Schneider <asn@cryptomilk.org>
2012-09-21 09:45:03 +02:00
Dmitriy Kuznetsov
a18106d3af
channels: Fix channel_request_pty_size1 always returning an error.
...
Fixes bug #88 .
2012-09-07 12:23:55 +02:00