Page MenuHomePhabricator
Feed Advanced Search

Thu, Aug 8

Jakuje committed rLIBSSH93113ccfb989: misc: Allow %% to escape a single % in paths. (authored by Richard W.M. Jones <rjones@redhat.com>).
misc: Allow %% to escape a single % in paths.
Thu, Aug 8, 10:37 AM
Jakuje committed rLIBSSH9ffaa12012b0: dh: Add ssh_dh_debug_crypto() (authored by asn).
dh: Add ssh_dh_debug_crypto()
Thu, Aug 8, 9:57 AM
Jakuje committed rLIBSSHae5146f7ba6b: bignum: Pass const to ssh_print_bignum() (authored by asn).
bignum: Pass const to ssh_print_bignum()
Thu, Aug 8, 9:57 AM
Jakuje committed rLIBSSHdd554ebb3226: pki_mbedcrypto: Add missing misc.h header file (authored by asn).
pki_mbedcrypto: Add missing misc.h header file
Thu, Aug 8, 9:57 AM
Jakuje committed rLIBSSHfae61f1d0960: tests: Skip testing 1024 bits key generation in FIPS mode (authored by ansasaki).
tests: Skip testing 1024 bits key generation in FIPS mode
Thu, Aug 8, 9:57 AM
Jakuje committed rLIBSSH9e8e5f5cb22a: knownhosts: Use ssh_mkdirs() instead of ssh_mkdir() (authored by ansasaki).
knownhosts: Use ssh_mkdirs() instead of ssh_mkdir()
Thu, Aug 8, 9:57 AM
Jakuje committed rLIBSSH80c1dbdb6188: misc: Introduce internal function ssh_mkdirs() (authored by ansasaki).
misc: Introduce internal function ssh_mkdirs()
Thu, Aug 8, 9:57 AM
Jakuje committed rLIBSSH4505c076b333: misc: Introduce internal function ssh_dir_writeable() (authored by ansasaki).
misc: Introduce internal function ssh_dir_writeable()
Thu, Aug 8, 9:57 AM
Jakuje committed rLIBSSH99dc2002b92c: libcrypto: Avoid incompatible pointers (authored by Jakuje).
libcrypto: Avoid incompatible pointers
Thu, Aug 8, 9:57 AM
Jakuje committed rLIBSSH878d8320c1b4: pki_container_openssh: Avoid bogus newline in debug message (authored by Jakuje).
pki_container_openssh: Avoid bogus newline in debug message
Thu, Aug 8, 9:57 AM
Jakuje committed rLIBSSH47945671afe1: examples: Load ED25519 key when loading all keys (authored by Jakuje).
examples: Load ED25519 key when loading all keys
Thu, Aug 8, 9:57 AM
Jakuje committed rLIBSSH80e729fe33d9: pki_container_openssh: Reformat whitespace (authored by Jakuje).
pki_container_openssh: Reformat whitespace
Thu, Aug 8, 9:57 AM
Jakuje committed rLIBSSHb2e7ef6836be: Replace ssh_print_hexa() with ssh_log_hexdump() (authored by ansasaki).
Replace ssh_print_hexa() with ssh_log_hexdump()
Thu, Aug 8, 9:57 AM
Jakuje committed rLIBSSH651fea9f1408: misc: Introduce ssh_log_hexdump() (authored by ansasaki).
misc: Introduce ssh_log_hexdump()
Thu, Aug 8, 9:57 AM
Jakuje committed rLIBSSHf10db964b5d5: tests: Try PEM files with leading white spaces (authored by ansasaki).
tests: Try PEM files with leading white spaces
Thu, Aug 8, 9:56 AM
Jakuje committed rLIBSSH703f0a0f36f6: pki: Search OpenSSH header not only at the beginning (authored by ansasaki).
pki: Search OpenSSH header not only at the beginning
Thu, Aug 8, 9:56 AM
Jakuje committed rLIBSSH4799915a3659: gitlab-ci: Turn DEBUG_CRYPTO on for standard crypto lib builds (authored by asn).
gitlab-ci: Turn DEBUG_CRYPTO on for standard crypto lib builds
Thu, Aug 8, 9:34 AM
Jakuje committed rLIBSSH92d3efec8184: dh: Add ssh_dh_debug_crypto() (authored by asn).
dh: Add ssh_dh_debug_crypto()
Thu, Aug 8, 9:34 AM

Wed, Aug 7

Jakuje added a comment to T168: Add support for curve448-sha512.

Just for the record, the OpenSSH position to implementing this key exchange algorithm:

Wed, Aug 7, 9:53 AM · Unknown Object (Project)

Thu, Aug 1

Jakuje closed T157: libssh 0.9.0 issue for mingw build as Resolved.

Fixed in 2884f97bc5d3ea23e609ebd789b9c1d3e79764b3

Thu, Aug 1, 3:07 PM · Unknown Object (Project)
Jakuje closed T164: 0.9.0 gcc compiler warnings incompatible-pointer-types as Resolved.
Thu, Aug 1, 3:04 PM · Unknown Object (Project)

Tue, Jul 30

Jakuje committed rLIBSSH3737e5f0e75f: misc: Allow %% to escape a single % in paths. (authored by Richard W.M. Jones <rjones@redhat.com>).
misc: Allow %% to escape a single % in paths.
Tue, Jul 30, 5:27 PM
Jakuje committed rLIBSSHe42d44e48a91: libcrypto: Avoid incompatible pointers (authored by Jakuje).
libcrypto: Avoid incompatible pointers
Tue, Jul 30, 5:27 PM
Jakuje committed rLIBSSH683096ae7eb1: pki_container_openssh: Avoid bogus newline in debug message (authored by Jakuje).
pki_container_openssh: Avoid bogus newline in debug message
Tue, Jul 30, 5:27 PM
Jakuje committed rLIBSSH3811c73f8f41: pki_container_openssh: Reformat whitespace (authored by Jakuje).
pki_container_openssh: Reformat whitespace
Tue, Jul 30, 5:27 PM
Jakuje committed rLIBSSHcc92e743094b: examples: Load ED25519 key when loading all keys (authored by Jakuje).
examples: Load ED25519 key when loading all keys
Tue, Jul 30, 5:27 PM

Thu, Jul 25

Jakuje added a comment to T164: 0.9.0 gcc compiler warnings incompatible-pointer-types.

You are probably right, Can you try with the following patch:

Thu, Jul 25, 12:08 PM · Unknown Object (Project)

Jun 27 2019

Jakuje updated the task description for T156: The HostKeyAlgorithms configuration option should not override the order of the key types gathered from the know hosts file .
Jun 27 2019, 5:00 PM · Unknown Object (Project)
Jakuje created T156: The HostKeyAlgorithms configuration option should not override the order of the key types gathered from the know hosts file .
Jun 27 2019, 4:59 PM · Unknown Object (Project)

Jun 26 2019

Jakuje added a comment to T89: SFTP transfers handled by kio_sftp are much slower than those handled by scp.

The current version should have improved memory handling. Can you retest whether the speed is better now?

Jun 26 2019, 11:06 AM · Unknown Object (Project)

Jun 24 2019

Jakuje added a comment to T151: curve25519-sha256 problems under Valgrind on i386.

Thank you for the clarification and updated reproducer. I can reproduce it with the latest version installed by the package manager in Debian (0.8.7), but I can not reproduce it when I build the example against current master. I can not reproduce it even if I manually checkout the version 0.8.7 from git.

Jun 24 2019, 4:16 PM · Unknown Object (Project)
Jakuje added a comment to T155: ssh_options_parse_config() does not parse the Match 'final' keyword.

This is already available in master (e989c4afffa154d92fe8c4ae1716ecc6bb4c2fd5) and will be in 0.9. Unfortunately, this did not got updated in Fedora as we updated the default configuration file so I would propose to wait few days for the updated libssh or fill a fedora bug.

Jun 24 2019, 11:31 AM

Jun 21 2019

Jakuje committed rLIBSSH17a531d2af35: tests: Skip 1k RSA key generation in FIPS (authored by Jakuje).
tests: Skip 1k RSA key generation in FIPS
Jun 21 2019, 3:42 PM
Jakuje committed rLIBSSHa80547bdf998: pki_crypto: Correct error checking after RSA key generation (authored by Jakuje).
pki_crypto: Correct error checking after RSA key generation
Jun 21 2019, 3:42 PM
Jakuje committed rLIBSSHa4fa51454910: tests: Filter out bogus output from openssh in FIPS Mode (authored by Jakuje).
tests: Filter out bogus output from openssh in FIPS Mode
Jun 21 2019, 3:42 PM

Jun 19 2019

Jakuje committed rLIBSSHd5095a55b991: tests: Add reproducer for T76 (authored by Jakuje).
tests: Add reproducer for T76
Jun 19 2019, 6:19 PM
Jakuje committed rLIBSSHd627cba47610: pki: Search for the PEM headers not only on the start of the key file (authored by Jakuje).
pki: Search for the PEM headers not only on the start of the key file
Jun 19 2019, 6:19 PM
Jakuje committed rLIBSSH23c837f4d00a: pki: Reformat pki_privatekey_type_from_string() (authored by Jakuje).
pki: Reformat pki_privatekey_type_from_string()
Jun 19 2019, 6:19 PM
Jakuje committed rLIBSSHbd69ac63ca45: tests: Reproducer for proxy command with stderr output (T130) (authored by Jakuje).
tests: Reproducer for proxy command with stderr output (T130)
Jun 19 2019, 6:19 PM
Jakuje committed rLIBSSH6c49c41c1915: socket: Do not process stderr of proxy commands (Fixes T130) (authored by Jakuje).
socket: Do not process stderr of proxy commands (Fixes T130)
Jun 19 2019, 6:19 PM
Jakuje committed rLIBSSHbd65568749a1: socket: Reformat the rest of the file (authored by Jakuje).
socket: Reformat the rest of the file
Jun 19 2019, 6:19 PM
Jakuje closed T130: BUG?: sftp via socks5 with PROXYCOMMAND bails with read_packet(): Packet len too high (1818845806 6c69626e) as Resolved by committing rLIBSSH6c49c41c1915: socket: Do not process stderr of proxy commands (Fixes T130).
Jun 19 2019, 6:19 PM · Unknown Object (Project)
Jakuje added a comment to T130: BUG?: sftp via socks5 with PROXYCOMMAND bails with read_packet(): Packet len too high (1818845806 6c69626e).

FYI, as a workaround, you can use ProxyCommand='ncat -vvv --proxy <proxy server:port> --proxy-type socks5 %h %p' -o'User <user> 2>/dev/null', which drops the stderr. But indeed, this is something to fix in libssh.

Jun 19 2019, 3:23 PM · Unknown Object (Project)
Jakuje closed T88: Unable to connect etm mac's only servers as Resolved.

This was resolved recently by 4a67c191188601c8d98ec73b9d53ce8a2b6c6cf8 which implemented EtM modes of the MACs in libssh and which is available in latest libssh release.

Jun 19 2019, 3:18 PM · Unknown Object (Project)
Jakuje added a comment to T123: Unable to import key files with leading whitespace.

Can you provide example of such key? Do you mean private keys in PEM format or in OpenSSH format? Or public keys?

Jun 19 2019, 3:13 PM · Unknown Object (Project)
Jakuje added a comment to T76: Support keys with line comments.

I think this got resolved over the time and the PEM files are readable including the inline comments (probably because of the removal of the SSH1 protocol, which had special conditions for the old RSA1 keys).

Jun 19 2019, 3:09 PM · Unknown Object (Project)
Jakuje added a comment to T130: BUG?: sftp via socks5 with PROXYCOMMAND bails with read_packet(): Packet len too high (1818845806 6c69626e).

Please, check the following commits in the master-fix branch:

Jun 19 2019, 2:31 PM · Unknown Object (Project)
Jakuje added a comment to T130: BUG?: sftp via socks5 with PROXYCOMMAND bails with read_packet(): Packet len too high (1818845806 6c69626e).

Do you have a minimal reproducer that demonstrates this issue? The following parts do not look correct:

[2019/02/21 16:35:31.187831, 3] callback_receive_banner: ssh_protocol_version_exchange: Ncat: Version 7.70 ( https://nmap.org/ncat )

a bit later is what should be coming -- the SSH identification banner:

[2019/02/21 16:40:54.932576, 3] callback_receive_banner: ssh_protocol_version_exchange: libnsock nsock_trace_handler_callback(): Callback: READ SUCCESS for EID 10 [peer unspecified] (33 bytes): SSH-2.0-1.36_sshlib GlobalSCAPE..`

I am afraid that the ncat dumps some additional data to stderr, which is unintentionally picked up by the libssh. This is caused by the code in the src/socket.c:815, where both stdout and stderr is redirected to libssh

dup2(out,1);
dup2(out,2);

You ca try to drop the second line above, which should let the stderr to be mixed up with the libssh stderr or dropped (not sure from top of my head), but it should let you move on.

Jun 19 2019, 2:00 PM · Unknown Object (Project)
Jakuje added a comment to T151: curve25519-sha256 problems under Valgrind on i386.

The same thing works for me with the current openssh-portable master that I just built in my Fedora VM. Could this be somehow related to the Ubuntu toolchains or packages, rather than to the 32 bits itsef?

Jun 19 2019, 1:42 PM · Unknown Object (Project)
Jakuje added a comment to T151: curve25519-sha256 problems under Valgrind on i386.

I tried also the 0.8.7 branch as reported in the previous comment, but with the same result. Could it be an issue in valgrind or some other part of the toolchain?

Jun 19 2019, 1:23 PM · Unknown Object (Project)
Jakuje added a comment to T151: curve25519-sha256 problems under Valgrind on i386.

I just installed Fedora 27 i386 image (I was not successful with installing anything newer since it is secondary architecture for several releases and receives close to none testing) and current libssh master and I can not reproduce your issue.

Jun 19 2019, 1:17 PM · Unknown Object (Project)

Jun 13 2019

Jakuje added a comment to T152: Match exec with arguments breaks .ssh/config parse.

If I read correctly the manual page for ssh_config, your example is invalid:

Jun 13 2019, 4:52 PM · Unknown Object (Project)

May 20 2019

Jakuje closed T109: ProxyCommand for jump host configuration broken as Resolved.

Fixed in 990794c58045d5afe69d2fa861fe32b7f547b1fd

May 20 2019, 5:50 PM · Unknown Object (Project)

May 9 2019

Jakuje updated subscribers of T110: Knownhost notation with port wildcard ( [hostname]:* ) doesn't accept port 22.

@asn On the second though, I reworked the branch to optimize the pass and pass the given test cases. Can you check if the following would be acceptable?

May 9 2019, 1:22 PM · Unknown Object (Project)

May 6 2019

Jakuje triaged T147: libssh supports non-standard DSA key of sizes different than 1k as Low priority.
May 6 2019, 4:38 PM · Unknown Object (Project)

Apr 29 2019

Jakuje added a comment to T144: Add ssh_message_channel_request_open_reply_accept_channel function.

I do not know a lot about the channels code. Sadly these functions do not have any documentation to clarify that to me.

Apr 29 2019, 10:24 AM · Unknown Object (Project)
Jakuje added a comment to T143: sftp_server_free().

The sftp server is using normal sftp_session. Why the sftp_free() function can not be used, since it is almost the same as your proposal?

Apr 29 2019, 10:24 AM · Unknown Object (Project)

Mar 11 2019

Jakuje added a comment to T133: OpenSSL 1.1.1b compile errors.

I just tested with Fedora 29 with the latest OpenSSL 1.1.1b (openssl-1.1.1b-2.fc29.x86_64) and I am able to build the libssh without any problem. Can you clarify on what OS are you trying to compile and you see these errors?

Mar 11 2019, 10:22 AM · Unknown Object (Project)

Feb 28 2019

Jakuje added a comment to T133: OpenSSL 1.1.1b compile errors.

Building with openssl-1.1.1a-1.fc29.x86_64 works fine so the support window is not a problem.

Feb 28 2019, 11:57 AM · Unknown Object (Project)

Feb 7 2019

Jakuje added a comment to T110: Knownhost notation with port wildcard ( [hostname]:* ) doesn't accept port 22.

Actually, man page for sshd from OpenSSH says the following:

Feb 7 2019, 6:03 PM · Unknown Object (Project)
Jakuje closed T121: The server should not send the SSH_MSG_EXT_INFO message after rekeying as Resolved.

This was fixed by the previously mentioned commits that made their way into master and 0.8 branch.

Feb 7 2019, 3:08 PM · Unknown Object (Project)

Dec 4 2018

Jakuje added a comment to T109: ProxyCommand for jump host configuration broken.

@maiphi can you provide some debug log from libssh or at least the error you see? From what is covered in the test cases now, it should work with current libssh, but I do not think we will be able to establish two separate networks with the socket wrapper to reproduce the issue in the full size in the testsuite.

Dec 4 2018, 2:20 PM · Unknown Object (Project)

Nov 28 2018

Jakuje closed T105: HostKeyAlgorithms: Check if there is an entry in known_hosts and prefer that as Resolved.
Nov 28 2018, 2:02 PM · Unknown Object (Project)
Jakuje closed T107: ssh_session_has_known_hosts_entry doesn't seem to check in opts.global_knownhosts as Resolved.

This should be resolved by f622c4309b0ffe4679bd1b124638fc1bcddb5758

Nov 28 2018, 2:01 PM · Unknown Object (Project)

Nov 27 2018

Jakuje added a comment to T122: Running the sftp_read test for the second time fails.

After getting in a bit deeper, it really looks like the sshd is really closing the socket while doing something with PAM. The last logs from sshd are these in most of the cases:

debug2: input_userauth_request: try method none [preauth]
debug3: user_specific_delay: user specific delay 0.000ms [preauth]
debug3: ensure_minimum_time_since: elapsed 0.532ms, delaying 4.863ms (requested 5.395ms) [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: checking request 100
debug1: PAM: initializing for "alice"

After that the socket is closed, test fails and the test kills the sshd.

Nov 27 2018, 4:37 PM · Unknown Object (Project)

Nov 25 2018

Jakuje closed T108: setting knownhost option to NULL crashes, at least before connecting as Resolved.

Should be resolved by the attached commits in both master and stable 0.8 branches.

Nov 25 2018, 12:22 PM · Unknown Object (Project)

Nov 19 2018

Jakuje added a comment to T122: Running the sftp_read test for the second time fails.

After more hours of digging in the code, I isolated this to the two SFTP calls that cause this issue to be reproducible reliably. These are calls to ssh_channel_send_eof() and ssh_channel_free() from sftp_free() called from the cleanup of the first sftp. If I remove these two calls, the testsuite passes reproducibly.

Nov 19 2018, 3:50 PM · Unknown Object (Project)

Nov 16 2018

Jakuje created T122: Running the sftp_read test for the second time fails.
Nov 16 2018, 4:37 PM · Unknown Object (Project)

Nov 13 2018

Jakuje created T121: The server should not send the SSH_MSG_EXT_INFO message after rekeying.
Nov 13 2018, 3:39 PM · Unknown Object (Project)

Nov 6 2018

Jakuje added a comment to T108: setting knownhost option to NULL crashes, at least before connecting.

No, this issue is still present it I am right.

Nov 6 2018, 2:29 PM · Unknown Object (Project)
Jakuje added a comment to T109: ProxyCommand for jump host configuration broken.

Probably not. I assume this is not only about configuration parser (which was fixed in several aspects recently), but instead about the way how the proxycommand is implemented in libssh (I am actually not sure how does it work there). The important are errors with ProxyCommand, but for further investigation, some debugging log will be needed:

Nov 6 2018, 2:23 PM · Unknown Object (Project)

Nov 2 2018

Jakuje committed rLIBSSH7e44ce155639: tests: Improve error reporting in auth test (authored by Jakuje).
tests: Improve error reporting in auth test
Nov 2 2018, 12:00 PM
Jakuje committed rLIBSSH5fc4d5b22af3: tests: Typo -- the flags should be checked according to the comment (authored by Jakuje).
tests: Typo -- the flags should be checked according to the comment
Nov 2 2018, 12:00 PM
Jakuje committed rLIBSSH5159cd96e8b6: knownhosts: Make sure we have both knownhosts files ready (authored by Jakuje).
knownhosts: Make sure we have both knownhosts files ready
Nov 2 2018, 12:00 PM
Jakuje committed rLIBSSH35c417312c0b: client: Reformat comment (authored by Jakuje).
client: Reformat comment
Nov 2 2018, 12:00 PM
Jakuje committed rLIBSSHe1a8b359c181: tests/pkd: Properly clean up memory (authored by Jakuje).
tests/pkd: Properly clean up memory
Nov 2 2018, 12:00 PM
Jakuje committed rLIBSSHd85bc347d327: misc: Properly check for errors returned from getpwuid_r() (authored by Jakuje).
misc: Properly check for errors returned from getpwuid_r()
Nov 2 2018, 12:00 PM
Jakuje committed rLIBSSHc8519c435ec1: session: Drop unused structure member (SSHv1) (authored by Jakuje).
session: Drop unused structure member (SSHv1)
Nov 2 2018, 12:00 PM
Jakuje committed rLIBSSH9c4baa7fd58b: misc: Reformat ssh_get_user_home_dir and ssh_file_readaccess_ok (authored by Jakuje).
misc: Reformat ssh_get_user_home_dir and ssh_file_readaccess_ok
Nov 2 2018, 12:00 PM

Oct 19 2018

Jakuje created T116: Memory leak from evp_init under OpenSSL.
Oct 19 2018, 4:49 PM · Unknown Object (Project)
Jakuje added a comment to T107: ssh_session_has_known_hosts_entry doesn't seem to check in opts.global_knownhosts.

The changes required to support also global known hosts landed in the following branch:

Oct 19 2018, 3:44 PM · Unknown Object (Project)

Oct 18 2018

Jakuje added a comment to T107: ssh_session_has_known_hosts_entry doesn't seem to check in opts.global_knownhosts.

This issue is mostly related to the parallel work on the config parsing by me and rewrite of the knownhosts api by Andreas. The global knownhosts file was a new thing at this time and therefore I am not very surprised this slipped through.

Oct 18 2018, 5:27 PM · Unknown Object (Project)
Jakuje added a comment to T105: HostKeyAlgorithms: Check if there is an entry in known_hosts and prefer that.

The following changes should settle the behavior to more sane that follows openssh and does not cause problems if there are more host keys stored in the known_hosts files:

Oct 18 2018, 4:33 PM · Unknown Object (Project)
Jakuje added a comment to T105: HostKeyAlgorithms: Check if there is an entry in known_hosts and prefer that.

This is actually implemented by the function ssh_known_hosts_get_algorithms(), but behaves a bit differently than a similar function in OpenSSH client:

Oct 18 2018, 11:57 AM · Unknown Object (Project)

Oct 9 2018

Jakuje added a comment to T98: [sftp] Add support for posix-rename@openssh.com.

This landed in 6c56c1e0d72670da274f3e77c51a7b4e078d59c6

Oct 9 2018, 2:51 PM · Unknown Object (Project)
Jakuje added a comment to T99: [sftp] Add support for hardlink@openssh.com.

This landed in 6c56c1e0d72670da274f3e77c51a7b4e078d59c6

Oct 9 2018, 2:49 PM · Unknown Object (Project)
Jakuje added a comment to T60: Server hostkey: allow ed25519 only.

If I am right, this should be fixed with c8429113faddce47db2f5cabd6f544564c2c3770

Oct 9 2018, 2:41 PM · Unknown Object (Project)

Oct 5 2018

Jakuje committed rLIBSSH1eeeace97505: cmake: Configure nss_wrapper and uid_wrapper (authored by asn).
cmake: Configure nss_wrapper and uid_wrapper
Oct 5 2018, 12:13 PM
Jakuje committed rLIBSSHbd7b509278a9: torture: Enable old host key algos for testing (authored by asn).
torture: Enable old host key algos for testing
Oct 5 2018, 12:13 PM
Jakuje committed rLIBSSH73ebcb3ab885: torture: Start sshd as root (authored by asn).
torture: Start sshd as root
Oct 5 2018, 12:13 PM
Jakuje committed rLIBSSH652acbeb2118: torture: Enable old cipher and kex algos in sshd (authored by asn).
torture: Enable old cipher and kex algos in sshd
Oct 5 2018, 12:12 PM
Jakuje committed rLIBSSH96e04d469126: torture: Create a torture_terminate_process() function (authored by asn).
torture: Create a torture_terminate_process() function
Oct 5 2018, 12:12 PM
Jakuje committed rLIBSSH2db325eb74db: torture: Restrict files to we write to our user. (authored by asn).
torture: Restrict files to we write to our user.
Oct 5 2018, 12:12 PM
Jakuje committed rLIBSSH7113074ae4cf: torture: Add torture_teardown_sshd_server(). (authored by asn).
torture: Add torture_teardown_sshd_server().
Oct 5 2018, 12:12 PM
Jakuje committed rLIBSSH9937d0b55212: torture: Add function to setup sshd server (authored by asn).
torture: Add function to setup sshd server
Oct 5 2018, 12:12 PM
Jakuje committed rLIBSSHae3e2a19c8eb: torture: Add torture_teardown_socket_dir(). (authored by asn).
torture: Add torture_teardown_socket_dir().
Oct 5 2018, 12:12 PM
Jakuje committed rLIBSSH4814c188ebf9: tests: Add ssh host keys for test environment. (authored by asn).
tests: Add ssh host keys for test environment.
Oct 5 2018, 12:12 PM
Jakuje committed rLIBSSHa317188cb7e7: cmake: Search for cwrap and sshd. (authored by asn).
cmake: Search for cwrap and sshd.
Oct 5 2018, 12:12 PM
Jakuje committed rLIBSSH3567524fb2ff: torture: Add torture_setup_socket_dir(). (authored by asn).
torture: Add torture_setup_socket_dir().
Oct 5 2018, 12:12 PM

Sep 17 2018

Jakuje added a comment to T97: libssh sftp client is using unreasonable amount of memory.

The above valgrind report was for direct comparison with the data from original report in description. In that case, we got to 50 % of memory usage since we started, which is a good progress and what was my point. The patches looked good to me as already discussed.

Sep 17 2018, 6:43 PM · Unknown Object (Project)