search for: blen

Displaying 20 results from an estimated 135 matches for "blen".

Did you mean: been
2003 Oct 08
4
OS/390 openssh
...2.orig/authfd.c openssh-3.7.1p2/authfd.c --- openssh-3.7.1p2.orig/authfd.c Thu Jul 3 05:46:56 2003 +++ openssh-3.7.1p2/authfd.c Tue Oct 7 08:21:59 2003 @@ -336,7 +336,7 @@ BN_num_bits(key->rsa->n), bits); break; case 2: - blob = buffer_get_string(&auth->identities, &blen); + blob = buffer_get_binary(&auth->identities, &blen); *comment = buffer_get_string(&auth->identities, NULL); key = key_from_blob(blob, blen); xfree(blob); @@ -430,8 +430,8 @@ buffer_init(&msg); buffer_put_char(&msg, SSH2_AGENTC_SIGN_REQUEST); - buffer_put...
2020 Apr 03
0
Patch to support Powercool PCRACK-1200VA
...            buflen_fix = -1;  static int    (*subdriver_command)(const char *cmd, char *buf, size_t buflen) = NULL; @@ -702,8 +703,15 @@ static int    krauler_command(const char *cmd, char *buf, size_t buflen)          { NULL }      }; -    int    i; +    /* check for buflen fix */ +    int blen = buflen; +    if (buflen_fix != -1) { +        /* set reported buflen explicitly */ +        blen = buflen_fix; +    } +    int    i; +dif      upsdebugx(3, "send: %.*s", (int)strcspn(cmd, "\r"), cmd);      for (i = 0; command[i].str; i++) { @@ -720,9 +728,9 @@ static int  ...
2011 Mar 02
1
[PATCH] Fix CNG when effEBands is less than nbEBands.
...seed = st->rng; - for (i=0;i<C*N;i++) + for (c=0;c<C;c++) { - seed = lcg_rand(seed); - X[i] = (celt_int32)(seed)>>20; + for (i=0;i<st->mode->effEBands;i++) + { + int j; + int boffs; + int blen; + boffs = N*c+(st->mode->eBands[i]<<LM); + blen = (st->mode->eBands[i+1]-st->mode->eBands[i])<<LM; + for (j=0;j<blen;j++) + { + seed = lcg_rand(seed); + X[boffs+j] = (celt_int32)(seed)>>2...
2013 Jun 23
3
[PATCH] Add read support for "big data" blocks to hivex
...nknown1; +} __attribute__((__packed__)); + +struct ntreg_db_block { + int32_t seg_len; + char data[1]; +} __attribute__((__packed__)); + static uint32_t header_checksum (const hive_h *h) { @@ -1418,22 +1431,60 @@ hivex_value_value (hive_h *h, hive_value_h value, * instead. */ size_t blen = block_len (h, data_offset, NULL); - if (len > blen - 4 /* subtract 4 for block header */) { - if (h->msglvl >= 2) - fprintf (stderr, "hivex_value_value: warning: declared data length " - "is longer than the block it is in " - &quot...
2013 Jun 25
2
Re: [PATCH] Add read support for "big data" blocks to hivex
* Richard W.M. Jones: > diff --git a/lib/hivex.c b/lib/hivex.c > index e3c1e05..9351ac5 100644 > --- a/lib/hivex.c > +++ b/lib/hivex.c > @@ -1471,7 +1471,7 @@ hivex_value_value (hive_h *h, hive_value_h value, > if (h->msglvl >= 2) > fprintf (stderr, "hivex_value_value: warning: big data block is not " > "valid
2000 Sep 18
1
ssh-agent and ssh2 servers...
I'm not on the mailing list, so I'd appreciate it if you could cc: me, though I will keep an eye on the archives. I am running openssh 2.2.0p1 on Debian GNU/Linux. I was pleased to see that 2.2.0p1 had support for DSA keys in the agent, and I have successfully used the v2 protocol to another openssh server with the agent providing authentication. I am also able to successfully connect
2013 Jun 25
0
Re: [PATCH] Add read support for "big data" blocks to hivex
...g_db_block { > + int32_t seg_len; > + char data[1]; > +} __attribute__((__packed__)); > + > static uint32_t > header_checksum (const hive_h *h) > { > @@ -1418,22 +1431,60 @@ hivex_value_value (hive_h *h, hive_value_h value, > * instead. > */ > size_t blen = block_len (h, data_offset, NULL); > - if (len > blen - 4 /* subtract 4 for block header */) { > - if (h->msglvl >= 2) > - fprintf (stderr, "hivex_value_value: warning: declared data length " > - "is longer than the block it is in " &...
2013 Jun 25
0
[PATCH] Add read support for "big data" blocks to hivex
...nknown1; +} __attribute__((__packed__)); + +struct ntreg_db_block { + int32_t seg_len; + char data[1]; +} __attribute__((__packed__)); + static uint32_t header_checksum (const hive_h *h) { @@ -1418,22 +1431,70 @@ hivex_value_value (hive_h *h, hive_value_h value, * instead. */ size_t blen = block_len (h, data_offset, NULL); - if (len > blen - 4 /* subtract 4 for block header */) { - if (h->msglvl >= 2) - fprintf (stderr, "hivex_value_value: warning: declared data length " - "is longer than the block it is in " - &quot...
2020 Apr 03
0
Powercool PCRACK-1200VA patch update
...+/* + * This is a wrapper for the usb_get_string() and usb_get_string_simple() functions + * Its purpose is to encapsulate the handling of langid_fix and buflen_fix. + */ +int nut_usb_get_string(usb_dev_handle *dev, int index, char *buf, size_t buflen) { + +    /* check for buflen fix */ +    int blen = buflen; +    if(buflen_fix != -1) { +        blen = buflen_fix; +    } + +    /* check for langid fix */ +    if (langid_fix != -1) { + +        /* in this case we use the langid_fix value for langid */ +        int ret = usb_get_string(dev, index, langid_fix, buf, blen); + +        /* Limit this...
2002 Jun 26
2
Latest rZync release: 0.06
For the small number of people who are checking this out, I released version 0.05 a couple days ago (and only mentioned it on my new-protocol web page) followed today by 0.06. Some highlights of the two releases: - We handle symlinks now in our recursive synchronization mode. - Directory scanning is no longer limited to one active directory at a time (which was sorely needed when all the
2017 Jan 26
4
Server accepts key: pkalg rsa-sha2-512 vs ssh-rsa
Hi, I'm doing some test with a pkcs11 token that can only sign short messages. When connecting to one server, that reports pkalg rsa-sha2-512 blen 151, it fails to sign the pubkey because it is 83 bytes long. (sshd: OpenSSH_7.3p1) A older server that reports pkalg ssh-rsa blen 151, works perfectly as the pubkey signature required is only 35 bytes long. (sshd: OpenSSH_6.7p1) I am not sure where does this pkalg fit in the process, and all my...
2018 Sep 06
4
Some wishes regarding revoked keys
Hello. I am trying to play through the following test scenario about certificate revocation on Ubuntu 18.04, which has OpenSSH of this version: OpenSSH_7.6p1 Ubuntu-4, OpenSSL 1.0.2n? 7 Dec 2017 1. A CA key is created ssh-keygen -t ed25519 -f ca 2. The CA public key is added to ~/.ssh/authorized_keys on some server: cert-authority ssh-ed25519 AAAA...e ca at yoga 3. A user key is created on a
2017 Jul 14
0
[PATCH 05/27] daemon: Reimplement several devsparts APIs in OCaml.
...ringslen (char **argv, size_t len) } /** - * Compare device names (including partition numbers if present). - * - * L<https://rwmj.wordpress.com/2011/01/09/how-are-linux-drives-named-beyond-drive-26-devsdz/> - */ -int -compare_device_names (const char *a, const char *b) -{ - size_t alen, blen; - int r; - int a_partnum, b_partnum; - - /* Skip /dev/ prefix if present. */ - if (STRPREFIX (a, "/dev/")) - a += 5; - if (STRPREFIX (b, "/dev/")) - b += 5; - - /* Skip sd/hd/ubd/vd. */ - alen = strcspn (a, "d"); - blen = strcspn (b, "d"); - a...
2008 Sep 11
3
ZFS Crypto [Prelim] Codereview
...ch = ch - ''a'' + 10; A 256-byte lookup table of char, with a some value > 16 for invalid digits should be more efficient than a cascading if, but maybe this function isn''t used often or isn''t used for long data streams. DEA-5 Setting blen to 0 has no effect, as it''s a local variable immediately before return: 107 blen = 0; ------------------------------------------------------------------ usr/src/lib/libzfs/common/libzfs_crypto.c.html get_passphrase() DEA-6: typos for Retrieve and restrictions: 1105...
2001 Feb 20
3
ssh-agent and id_dsa
Hi! I am distributing 2.5.1p1 for production use on my system by now and prepare switching to protocol 2 as default protocol. I just noted, that ssh-agent can be used for protocol 1 and 2, but the keys kept in ssh-agent are not compared against keys in .ssh. Example: I have a DSA key in id_dsa which I load into ssh-agent on login. When connecting to an account accepting the key everything is
2016 Mar 10
10
[Bug 2550] New: ssh can't use an in-memory-only certificate
...e cert on the user's agent process worked as expected. After that commit, the user needs both the private and the cert (also with the private key) loaded together to work. if I try to use just the cert after this commit, I see: debug1: Server accepts key: pkalg ssh-rsa-cert-v01 at openssh.com blen 2769 debug2: input_userauth_pk_ok: fp SHA256:XiFOO+XzZ0m/aWzkQLgxVFI2HJV3abWpNyuIhcEYKuc debug3: sign_and_send_pubkey: RSA-CERT SHA256:XiFOO+XzZ0m/aWzkQLgxVFI2HJV3abWpNyuIhcEYKuc debug1: sign_and_send_pubkey: no private key for certificate "[Valid until Fri 11 Mar 2016 18:10 UTC, Version 2]&qu...
2017 Mar 02
61
[Bug 2687] New: Coverity scan fixes
https://bugzilla.mindrot.org/show_bug.cgi?id=2687 Bug ID: 2687 Summary: Coverity scan fixes Product: Portable OpenSSH Version: 7.4p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: Miscellaneous Assignee: unassigned-bugs at mindrot.org
2015 Dec 29
2
Bug in KRL signature verification
...all versions of OpenSSH, although the majority of my effort has been devoted to (and all of my code snippets come from) openssl-portable. The bug is that an offset is incorrectly treated as a length [2]: /* Check signature over entire KRL up to this point */ > if ((r = sshkey_verify(key, blob, blen, > sshbuf_ptr(buf), sshbuf_len(buf) - sig_off, 0)) != 0) > goto out; "sshbuf_len(buf) - sig_off" should read "sig_off". The result of this bug is that the number of unparsed bytes after our current parse cursor, rather than the number of parsed bytes before t...
2018 Sep 14
2
sftp fails when run from cron
...2: we sent a publickey packet, wait for reply debug1: Authentications that can continue: publickey debug1: Offering public key: RSA SHA256:B1iu57Rkn5emB//MUP4YEipr4oRRmqZeBHMQWf0U+Mk /home/xxx/.ssh/jumpline debug2: we sent a publickey packet, wait for reply debug1: Server accepts key: pkalg ssh-rsa blen 279 debug2: input_userauth_pk_ok: fp SHA256:B1iu57Rkn5emB//MUP4YEipr4oRRmqZeBHMQWf0U+Mk debug1: Authentication succeeded (publickey). Authenticated to sohnen-moe.com ([216.222.193.110]:1022). ** blah blah blah *** ---[ end ]--- ---[ failed login ]--- debug2: set_newkeys: mode 0 debug1: rekey aft...
2012 Nov 01
2
sftp authentication failure only as cronjob
...G_NEWKEYS received debug1: SSH2_MSG_SERVICE_REQUEST sent debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey,password debug1: Next authentication method: publickey debug1: Offering public key: /home/lars/.ssh/id_rsa debug1: Server accepts key: pkalg ssh-rsa blen 277 debug1: Authentication succeeded (publickey). ... When the same script is run from the crontab the trace is identical except that the authentication fails: OpenSSH_5.3p1, OpenSSL 1.0.0-fips 29 Mar 2010 debug1: Reading configuration data /etc/ssh/ssh_config debug1: Applying options for * debug...