Age | Commit message (Collapse) | Author |
|
|
|
|
|
|
|
buf_incrwritepos() and mp_to_unsigned_bin() functions use k_size as signed
integer argument.
k_size is also used in an assertion that compared it to curve_size which is
a signed long.
Only buf_getwriteptr() is using k_size as unsigned.
So it safe to use it as signed.
|
|
|
|
and /**/ comments
|
|
of the pointer to the data instead of the whole size of struct openssh_key
is cleared. Correct the size calculation as detected by Coverity CID 1191543.
|
|
(fixup of pull request #7)
|
|
|
|
- Fix assertion that key size is exactly curve size
|
|
|
|
--HG--
branch : keyondemand
|
|
Needs UI in server command line options
--HG--
branch : keyondemand
|
|
|
|
--HG--
branch : ecc
|
|
--HG--
branch : ecc
|
|
fix crash from the mp_alloc_init_multi change in RSA
--HG--
branch : ecc
|
|
--HG--
branch : ecc
|
|
--HG--
branch : ecc
|
|
--HG--
extra : convert_revision : 63f95bd7b4b15b61cd13cdcc86cdeef2681ce6e7
|
|
cli-authpubkey.c:
fix leak of keybuf
cli-kex.c:
fix leak of fingerprint fp
cli-service.c:
remove commented out code
dropbearkey.c:
don't attepmt to free NULL key on failure
common-kex.c:
only free key if it is initialised
keyimport.c:
remove dead encrypted-key code
don't leak a FILE* loading OpenSSH keys
rsa.c, dss.c:
check return values for some libtommath functions
svr-kex.c:
check return value retrieving DH kex mpint
svr-tcpfwd.c:
fix null-dereference if remote tcp forward request fails
tcp-accept.c:
don't incorrectly free the tcpinfo var
--HG--
extra : convert_revision : 640a55bc710cbaa6d212453c750026c770e19193
|
|
--HG--
extra : convert_revision : 54840316c94733a793222ad54331ab207b4097e5
|
|
--HG--
extra : convert_revision : 3dc365619f0840ab5781660b1257a9f22c05d3fe
|
|
--HG--
extra : convert_revision : 83d9a25ee973ab65fa64dcf8595838b160c21663
|
|
--HG--
extra : convert_revision : 2d897b12ba8710efe0b042b36b1fd31b2469eb15
|
|
--HG--
extra : convert_revision : cc8a8c49dc70e632c352853a39801089b08149be
|