Home - Waterfall Grid T-Grid Console Builders Recent Builds Buildslaves Changesources - JSON API - About

Console View

Legend:   Passed Failed Warnings Failed Again Running Exception Offline No data

f553dcc95ddd...
Will Cosgrove
kex.c: group16-sha512 and group18-sha512 support #457 (#468)

Files: kex.c

Notes:
Added key exchange group16-sha512 and group18-sha512. As a result did the following:

Abstracted diffie_hellman_sha256() to diffie_hellman_sha_algo() which is now algorithm agnostic and takes the algorithm as a parameter since we needed sha512 support. Unfortunately it required some helper functions but they are simple.
Deleted diffie_hellman_sha1()
Deleted diffie_hellman_sha1 specific macro
Cleaned up some formatting
Defined sha384 in os400 and wincng backends
Defined LIBSSH2_DH_MAX_MODULUS_BITS to abort the connection if we receive too large of p from the server doing sha1 key exchange.
Reorder the default key exchange list to match OpenSSH and improve security

Credit:
Will Cosgrove
ecd6a74e4456...
Daniel Stenberg
Makefile.am: include all test files in the dist #379

File:
Makefile.am

Notes:
No longer conditionally include OpenSSL specific test files, they aren't run if we're not building against OpenSSL 1.1.x anyway.

Credit:
Daniel Stenberg
dc36c5525bef...
Daniel Stenberg
libssh2_session_callback_set.3: explain the recv/send callbacks

Describe how to actually use these callbacks.
cerevra
GitHub Pull Request #516 (1 commit)
yodaldevoid
GitHub Pull Request #517 (1 commit)
willco007
GitHub Pull Request #169 (1 commit)
a1975c5b594a...
Will Cosgrove
CMakeLists.txt: respect install lib dir #405 (#515)

Files:
CMakeLists.txt

Notes:
Use CMAKE_INSTALL_LIBDIR directory

Credit: Arfrever
9ae9ff30cbef...
Igor Klevanets
agent.c: Recv and send all bytes via network in agent_transact_unix() (#510)

Files: agent.c

Notes:
Handle sending/receiving partial packet replies in agent.c API.

Credit: Klevanets Igor <cerevra@yandex-team.ru>
93dc0933f8e0...
Marc Hoersken
wincng: fix random big number generation to match openssl

The old function would set the least significant bits in
the most significant byte instead of the most significant bits.

The old function would also zero pad too much bits in the
most significant byte. This lead to a reduction of key space
in the most significant byte according to the following listing:
- 8 bits reduced to 0 bits => eg. 2048 bits to 2040 bits DH key
- 7 bits reduced to 1 bits => eg. 2047 bits to 2041 bits DH key
- 6 bits reduced to 2 bits => eg. 2046 bits to 2042 bits DH key
- 5 bits reduced to 3 bits => eg. 2045 bits to 2043 bits DH key

No change would occur for the case of 4 significant bits.
For 1 to 3 significant bits in the most significant byte
the DH key would actually be expanded instead of reduced:
- 3 bits expanded to 5 bits => eg. 2043 bits to 2045 bits DH key
- 2 bits expanded to 6 bits => eg. 2042 bits to 2046 bits DH key
- 1 bits expanded to 7 bits => eg. 2041 bits to 2047 bits DH key

There is no case of 0 significant bits in the most significant byte
since this would be a case of 8 significant bits in the next byte.
cerevra
GitHub Pull Request #510 (1 commit)
7a4b051ba4cc...
Max Dymond
Add support for an OSS Fuzzer fuzzing target (#392)

Files:
.travis.yml, configure.ac, ossfuzz

Notes:
This adds support for an OSS-Fuzz fuzzing target in ssh2_client_fuzzer,
which is a cut down example of ssh2.c. Future enhancements can improve
coverage.

Credit:
Max Dymond
cerevra
GitHub Pull Request #510 (1 commit)
cerevra
GitHub Pull Request #510 (1 commit)
cerevra
GitHub Pull Request #516 (1 commit)
6c7769dcc422...
Marc Hoersken
wincng: fix random big number generation to match openssl

The old function would set the least significant bits in
the most significant byte instead of the most significant bits.

The old function would also zero pad too much bits in the
most significant byte. This lead to a reduction of key space
in the most significant byte according to the following listing:
- 8 bits reduced to 0 bits => eg. 2048 bits to 2040 bits DH key
- 7 bits reduced to 1 bits => eg. 2047 bits to 2041 bits DH key
- 6 bits reduced to 2 bits => eg. 2046 bits to 2042 bits DH key
- 5 bits reduced to 3 bits => eg. 2045 bits to 2043 bits DH key

No change would occur for the case of 4 significant bits.
For 1 to 3 significant bits in the most significant byte
the DH key would actually be expanded instead of reduced:
- 3 bits expanded to 5 bits => eg. 2043 bits to 2045 bits DH key
- 2 bits expanded to 6 bits => eg. 2042 bits to 2046 bits DH key
- 1 bits expanded to 7 bits => eg. 2041 bits to 2047 bits DH key

There is no case of 0 significant bits in the most significant byte
since this would be a case of 8 significant bits in the next byte.

At the moment only the following case applies due to a fixed
DH key size value currently being used in libssh2:

The DH group_order is fixed to 256 (bytes) which leads to a
2047 bits DH key size by calculating (256 * 8) - 1.

This means the DH keyspace was previously reduced from 2047 bits
to 2041 bits (while the top and bottom bits are always set), so the
keyspace is actually always reduced from 2045 bits to 2039 bits.

All of this is only relevant for Windows versions supporting the
WinCNG backend (Vista or newer) before Windows 10 version 1903.

Closes #521
PaulCapron
GitHub Pull Request #520 (2 commits)
5528f3da02eb...
Sebastián Katzer
mbedtls.c: ECDSA support for mbed TLS (#385)

Files:
mbedtls.c, mbedtls.h, .travis.yml

Notes:
This PR adds support for ECDSA for both key exchange and host key algorithms.

The following elliptic curves are supported:

256-bit curve defined by FIPS 186-4 and SEC1
384-bit curve defined by FIPS 186-4 and SEC1
521-bit curve defined by FIPS 186-4 and SEC1

Credit:
Sebastián Katzer
4afcb8cd9bc8...
Daniel Stenberg
libssh2_session_callback_set.3: explain the recv/send callbacks

Describe how to actually use these callbacks.

Closes #518
willco007
GitHub Pull Request #437 (7 commits)
36a5bbdd3718...
Will Cosgrove
CMakeLists.txt: respect install lib dir #405

Files:
CMakeLists.txt

Notes:
Use CMAKE_INSTALL_LIBDIR directory

Credit: Arfrever
cerevra
GitHub Pull Request #510 (1 commit)
cerevra
GitHub Pull Request #510 (1 commit)
gjalves
GitHub Pull Request #216 (4 commits)
PaulCapron
GitHub Pull Request #520 (2 commits)
tiennou
GitHub Pull Request #372 (3 commits)
00d5b0c385c4...
Will Cosgrove
agent.c: formatting

Improved formatting of RECV_SEND_ALL macro.