search for: bn_rand

Displaying 5 results from an estimated 5 matches for "bn_rand".

2001 Mar 14
1
poor default seeding of RNG
Correct me if I'm wrong, but init_rng() in entropy.c doesn't call seed_rng(), and in fact seed_rng() isn't called from _anywhere_ (in openssh-2.5.1p2). So calls to BN_rand() only pick up the tiny/non-existent amount of entropy added by BN_rand() itself from the system clock (time in seconds). Shouldn't seed_rng() be called from init_rng()? It should be called from _somewhere_, or deleted. Thanks, Dr. Tom Holroyd "I am, as I said, inspired by the biologic...
2001 Feb 19
2
Dubious use of BN_num_bits in sshconnect1.c (resend)
...e an N-bit public key where the most significant bit is zero. You are confused. In an N-bit RSA modulus the Nth bit is the most significant bit. This is very different from an random integer taken from an N-bit range. OpenSSH uses BN_num_bits correctly. >(this brings up a related flaw in the BN_rand/BN_pseudo_rand (which is the >reason this bug doesn't show up with OpenSSH servers) in that when called to >generate an N-bit (pseudo)random number, these functions actually return N-1 >bits of random data, with the msb set to 1, instead of the N random bits >promised, but that&...
2001 Feb 19
1
Dubious use of BN_num_bits in sshconnect1.c
...s occur) for the remote end to generate an N-bit public key where the most significant bit is zero. When this occurs, BN_num_bits returns a smaller number than the actual key size, but this number is erroneously used to check against key size requirements. (this brings up a related flaw in the BN_rand/BN_pseudo_rand (which is the reason this bug doesn't show up with OpenSSH servers) in that when called to generate an N-bit (pseudo)random number, these functions actually return N-1 bits of random data, with the msb set to 1, instead of the N random bits promised, but that's a side iss...
2015 May 27
3
Weak DH primes and openssh
On Wed 2015-05-27 05:23:41 -0400, Hubert Kario wrote: > On Tuesday 26 May 2015 15:10:01 Daniel Kahn Gillmor wrote: >> On Tue 2015-05-26 14:02:07 -0400, Hubert Kario wrote: >> > OEIS A014233 >> >> Hm, this is a sequence, but not an algorithm. It looks to me like it is >> not exhaustive, just a list of those integers which are known to have >> the stated
2003 Oct 08
4
OS/390 openssh
...se +# define __func__ "openssh" +# endif #endif #if defined(KRB5) && !defined(HEIMDAL) diff -bur openssh-3.7.1p2.orig/dh.c openssh-3.7.1p2/dh.c --- openssh-3.7.1p2.orig/dh.c Wed May 14 05:40:07 2003 +++ openssh-3.7.1p2/dh.c Tue Oct 7 08:22:00 2003 @@ -210,7 +210,7 @@ if (!BN_rand(dh->priv_key, 2*need, 0, 0)) fatal("dh_gen_key: BN_rand failed"); if (DH_generate_key(dh) == 0) - fatal("DH_generate_key"); + fatal("dh_gen_key: DH_generate_key failed"); for (i = 0; i <= BN_num_bits(dh->priv_key); i++) if (BN_is_bit_set(dh-&...