search for: bufaux

Displaying 20 results from an estimated 66 matches for "bufaux".

Did you mean: bufapi
2002 Apr 21
3
OpenSSH Security Advisory (adv.token)
...possible for OpenSSH with UsePrivsep enabled. 3. Solution: Apply the following patch and replace radix.c with http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/radix.c?rev=1.18 4. Credits: kurt at seifried.org for notifying the OpenSSH team. http://mantra.freeweb.hu/ Appendix: Index: bufaux.c =================================================================== RCS file: /cvs/src/usr.bin/ssh/bufaux.c,v retrieving revision 1.24 diff -u -r1.24 bufaux.c --- bufaux.c 26 Mar 2002 15:23:40 -0000 1.24 +++ bufaux.c 19 Apr 2002 12:55:29 -0000 @@ -137,10 +137,18 @@ BN_bin2bn(bin, len, value);...
2002 Apr 21
3
OpenSSH Security Advisory (adv.token)
...possible for OpenSSH with UsePrivsep enabled. 3. Solution: Apply the following patch and replace radix.c with http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/radix.c?rev=1.18 4. Credits: kurt at seifried.org for notifying the OpenSSH team. http://mantra.freeweb.hu/ Appendix: Index: bufaux.c =================================================================== RCS file: /cvs/src/usr.bin/ssh/bufaux.c,v retrieving revision 1.24 diff -u -r1.24 bufaux.c --- bufaux.c 26 Mar 2002 15:23:40 -0000 1.24 +++ bufaux.c 19 Apr 2002 12:55:29 -0000 @@ -137,10 +137,18 @@ BN_bin2bn(bin, len, value);...
2005 Nov 04
1
[Bug 1109] Memory leak in file: bufaux.c, function: buffer_get_bignum2_ret
http://bugzilla.mindrot.org/show_bug.cgi?id=1109 Summary: Memory leak in file: bufaux.c, function: buffer_get_bignum2_ret Product: Portable OpenSSH Version: 4.2p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: bitbucket at m...
2005 Nov 04
1
[Bug 1110] memory leak in bufaux.c, function: buffer_put_bignum_ret
http://bugzilla.mindrot.org/show_bug.cgi?id=1110 Summary: memory leak in bufaux.c, function: buffer_put_bignum_ret Product: Portable OpenSSH Version: 4.2p1 Platform: Other OS/Version: All Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: bitbucket at mindrot.org...
2004 Jul 22
3
ebcdic problem in bufaux.c
I am working on a port of Openssh 3.8p1 after already having done a port of Openssh 3.5p1. There are a couple of new lines in buffer_get_bignum2() that are causing me problems: if (len > 0 && (bin[0] & 0x80)) fatal("buffer_get_bignum2: negative numbers not supported"); The "& 0x80" check is not relevant in ebcdic. Does anyone
2014 Apr 08
1
buffer_put_bignum2_from_string question
Hello, I have question about buffer_put_bignum2_from_string function used in kexc25519.c in (OpenSSH >= 6.5) Is it 1:1 replacement for formating bignums from OpenSSL? If yes, then buffer_put_bignum2_from_string has different results for numbers starting with zeros. How to reproduce: shared_key[CURVE25519_SIZE] = "\0\0\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1";
2014 Apr 20
2
bad bignum encoding for curve25519-sha256@libssh.org
...ns.kex_algorithms != NULL) myproposal[PROPOSAL_KEX_ALGS] = options.kex_algorithms; + myproposal[PROPOSAL_KEX_ALGS] = compat_kex_proposal( + myproposal[PROPOSAL_KEX_ALGS]); if (options.rekey_limit || options.rekey_interval) packet_set_rekey_limits((u_int32_t)options.rekey_limit, Index: bufaux.c =================================================================== RCS file: /var/cvs/openssh/bufaux.c,v retrieving revision 1.62 retrieving revision 1.63 diff -u -p -r1.62 -r1.63 --- bufaux.c 4 Feb 2014 00:20:15 -0000 1.62 +++ bufaux.c 20 Apr 2014 03:24:50 -0000 1.63 @@ -1,4 +1,4 @@ -/* $OpenBS...
2001 Jan 23
11
cc & no 64bit int patches
Here are a couple of patches against the CVS (Jan 22 18:41 PST) Some C++ comments found their way into ssh.h The no64.patch puts ifdefs around buffer_get_int64() now in bufaux.[c,h] -- Tim Rice Multitalents (707) 887-1469 tim at multitalents.net -------------- next part -------------- --- ssh.h.old Mon Jan 22 18:40:58 2001 +++ ssh.h Mon Jan 22 19:02:02 2001 @@ -25,8 +25,10 @@ # include <sys/select.h> #endif -//#include "rsa.h" -//#include "...
1999 Dec 01
1
Compile bugs in openssh-1.2pre15 on Solaris (2.6)
...ply to bsd-login. * rsa.h needs __P() define to work (I think this has already been reported). Diffs are - *** Makefile.in.ORIG Thu Nov 25 12:40:22 1999 --- Makefile.in Wed Dec 1 12:09:37 1999 *************** *** 34,40 **** all: $(OBJS) $(TARGETS) ! libssh.a: authfd.o authfile.o bufaux.o buffer.o canohost.o channels.o cipher.o compat.o compress.o crc32.o deattack.o hostfile.o match.o mpaux.o nchan.o packet.o readpass.o rsa.o tildexpand.o ttymodes.o uidswap.o xmalloc.o helper.o rc4.o bsd-mktemp.o bsd-strlcpy.o bsd-strlcat.o log.o fingerprint.o $(AR) rv $@ $^ $(RANL...
2014 Apr 18
3
[Bug 2233] New: curve25519-sha256@libssh.org Signature Failures When 'sshd' Used with Dropbear Clients
...penSSH is generating the shared secret bignum value 'K' in a way that is not expected by other implementations. I believe the problem is in 'buffer_put_bignum2_from_string' (used by 'kexc25519_shared_key'), as is mentioned here on the mailing list, with a patch to bufaux.c to fix: http://marc.info/?l=openssh-unix-dev&m=139699836815285&w=2 With the bufaux.c patch applied, I am no longer able to reproduce the failure. I believe this bug affects interop of 'curve25519-sha256 at libssh.org' going forward, so I've set Severity to '...
2003 Oct 30
1
Patch to make sshd work on multihomed systems
...>krb5_ctx, localname, NULL, KRB5_NT_SRV_HST, &server); if (problem) goto out; diff -u -r src.old/gss-genr.c src/gss-genr.c --- src.old/gss-genr.c Thu Oct 30 15:02:46 2003 +++ src/gss-genr.c Thu Oct 30 15:02:44 2003 @@ -30,6 +30,7 @@ #include "xmalloc.h" #include "bufaux.h" +#include "canohost.h" #include "compat.h" #include "log.h" #include "monitor_wrap.h" @@ -226,9 +227,18 @@ OM_uint32 status; char lname[MAXHOSTNAMELEN]; gss_OID_set oidset; + char *pname; gss_create_empty_oid_set(&status, &oidset);...
2001 Jul 04
0
Sneek peak at what was commited.
...6 05:48:07 [sshd.8] remove unnecessary .Pp between .It; millert@ ok - markus at cvs.openbsd.org 2001/06/26 05:50:11 [auth2.c] new interface for secure_filename() - itojun at cvs.openbsd.org 2001/06/26 06:32:58 [atomicio.h authfd.h authfile.h auth.h auth-options.h bufaux.h buffer.h canohost.h channels.h cipher.h clientloop.h compat.h compress.h crc32.h deattack.h dh.h dispatch.h groupaccess.h hostfile.h kex.h key.h log.h mac.h match.h misc.h mpaux.h packet.h radix.h readconf.h readpass.h rsa.h] prototype pedant. not very creative......
2000 Dec 07
2
sunos 4.1.4 Makefile and regex.[ch] fix
...ile *** Makefile 2000/12/06 12:46:01 1.1 --- Makefile 2000/12/06 12:52:26 *************** *** 35,41 **** TARGETS=ssh$(EXEEXT) sshd$(EXEEXT) ssh-add$(EXEEXT) ssh-keygen$(EXEEXT) ssh-agent$(EXEEXT) scp$(EXEEXT) sftp-server$(EXEEXT) $(EXTRA_TARGETS) ! LIBSSH_OBJS=atomicio.o authfd.o authfile.o bufaux.o buffer.o canohost.o channels.o cipher.o cli.o compat.o compress.o crc32.o cygwin_util.o deattack.o dispatch.o dsa.o hmac.o hostfile.o key.o kex.o log.o match.o mpaux.o nchan.o packet.o radix.o rijndael.o entropy.o readpass.o rsa.o tildexpand.o ttymodes.o uidswap.o util.o uuencode.o xmalloc.o...
2003 Oct 08
4
OS/390 openssh
...r_key_allowed(authctxt->pw, key))) { packet_start(SSH2_MSG_USERAUTH_PK_OK); packet_put_string(pkalg, alen); - packet_put_string(pkblob, blen); + packet_put_binary(pkblob, blen); packet_send(); packet_write_wait(); authctxt->postponed = 1; diff -bur openssh-3.7.1p2.orig/bufaux.c openssh-3.7.1p2/bufaux.c --- openssh-3.7.1p2.orig/bufaux.c Wed May 14 05:40:07 2003 +++ openssh-3.7.1p2/bufaux.c Tue Oct 7 08:22:00 2003 @@ -126,7 +126,7 @@ carry = !++uc[i]; } } - buffer_put_string(buffer, buf+hasnohigh, bytes-hasnohigh); + buffer_put_binary(buffer, buf+hasnohigh, byt...
2002 Mar 12
2
sys/queue.h
...ID("$OpenBSD: sftp-client.c,v 1.24 2002/02/24 16:57:19 markus Exp $"); -#if defined(HAVE_SYS_QUEUE_H) && !defined(HAVE_BOGUS_SYS_QUEUE_H) -#include <sys/queue.h> -#else #include "openbsd-compat/fake-queue.h" -#endif #include "buffer.h" #include "bufaux.h" Index: ssh-agent.c =================================================================== RCS file: /var/cvs/openssh/ssh-agent.c,v retrieving revision 1.85 diff -u -r1.85 ssh-agent.c --- ssh-agent.c 5 Mar 2002 18:59:45 -0000 1.85 +++ ssh-agent.c 12 Mar 2002 02:12:08 -0000 @@ -34,13 +34,8 @@...
2015 Feb 28
3
SAP-2015-3-1 issues
...-f `pwd`/regress/Makefile ] || ln -s `cd . && pwd`/regress/Makefile `pwd`/regress/Makefile (cd openbsd-compat && make) /usr/bin/ar rv libssh.a ssh_api.o ssherr.o sshbuf.o sshkey.o sshbuf-getput-basic.o sshbuf-misc.o sshbuf-getput-crypto.o krl.o bitmap.o authfd.o authfile.o bufaux.o bufbn.o bufec.o buffer.o canohost.o channels.o cipher.o cipher-aes.o cipher-aesctr.o cipher-bf1.o cipher-ctr.o cipher-3des1.o cleanup.o compat.o crc32.o deattack.o fatal.o hostfile.o log.o match.o md-sha256.o moduli.o nchan.o packet.o opacket.o readpass.o rsa.o ttymodes.o xmalloc.o addrmatch...
2012 Dec 20
4
Deprecated calls to bzero() and index() found in OpenSSH 6.1p1
...} } - bzero(buf, sizeof(buf)); + memset(buf, 0, sizeof(buf)); if ((st.st_mode & (S_IFSOCK|S_IFCHR|S_IFIFO)) == 0 && st.st_size != buffer_len(blob)) { debug("%s: key file %.200s%schanged size while reading", In file 'bufaux.c', I've replaced the bzero() call with the equivalent memset() call. The patch file is below in (diff -u) format: --- bufaux.c.orig 2012-12-19 17:12:21.672509848 -0800 +++ bufaux.c 2012-12-19 17:12:44.902553992 -0800 @@ -215,7 +215,7 @@ if (cp == ret + length - 1...
2016 Jan 19
2
OpenSSH portability & buildsystem fixes
...- $(LD) -o $@ $(SSHDOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(SSHDLIBS) $(LIBS) $(GSSLIBS) $(K5LIBS) + $(CC) -o $@ $(SSHDOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(SSHDLIBS) $(LIBS) $(GSSLIBS) $(K5LIBS) scp$(EXEEXT): $(LIBCOMPAT) libssh.a scp.o progressmeter.o - $(LD) -o $@ scp.o progressmeter.o bufaux.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS) + $(CC) -o $@ scp.o progressmeter.o bufaux.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS) ssh-add$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-add.o - $(LD) -o $@ ssh-add.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS) + $(CC) -o $@ ssh-add.o $(LDFLAGS) -lssh -lopenbs...
2018 Jun 08
4
vanilla build of 7.7p1 release on linux/4.17 fails with gcc8 @ "/usr/bin/ld: unrecognized option '-Wl,-z,retpolineplt'"
On 8 June 2018 at 11:21, PGNet Dev <pgnet.dev at gmail.com> wrote: > fyi > > add'l -- and looks unrelated -- issue > /usr/include/pthread.h:251:12: note: previous declaration of ?pthread_join? was here > extern int pthread_join (pthread_t __th, void **__thread_return); What included pthread.h? That's explicitly not supported by sshd: $ grep THREAD
2000 Mar 17
1
TEST RELEASE: 1.2.3pre5
...handling for AIX to work around stupid runtime linking. Problem elucidated by gshapiro at SENDMAIL.ORG by way of Jim Knoble <jmknoble at pobox.com> - Checks for 64 bit int types. Problem report from Mats Fredholm <matsf at init.se> - OpenBSD CVS updates: - [atomicio.c auth-krb4.c bufaux.c channels.c compress.c fingerprint.c] [packet.h radix.c rsa.c scp.c ssh-agent.c ssh-keygen.c sshconnect.c] [sshd.c] pedantic: signed vs. unsigned, void*-arithm, etc - [ssh.1 sshd.8] Various cleanups and standardizations. - Runtime error fix for HPUX from Otmar Stahl <O.Stahl at...