Displaying 20 results from an estimated 66 matches for "bufaux".
Did you mean:
bufapi
2002 Apr 21
3
OpenSSH Security Advisory (adv.token)
...possible for OpenSSH with
UsePrivsep enabled.
3. Solution:
Apply the following patch and replace radix.c with
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/radix.c?rev=1.18
4. Credits:
kurt at seifried.org for notifying the OpenSSH team.
http://mantra.freeweb.hu/
Appendix:
Index: bufaux.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/bufaux.c,v
retrieving revision 1.24
diff -u -r1.24 bufaux.c
--- bufaux.c 26 Mar 2002 15:23:40 -0000 1.24
+++ bufaux.c 19 Apr 2002 12:55:29 -0000
@@ -137,10 +137,18 @@
BN_bin2bn(bin, len, value);...
2002 Apr 21
3
OpenSSH Security Advisory (adv.token)
...possible for OpenSSH with
UsePrivsep enabled.
3. Solution:
Apply the following patch and replace radix.c with
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/radix.c?rev=1.18
4. Credits:
kurt at seifried.org for notifying the OpenSSH team.
http://mantra.freeweb.hu/
Appendix:
Index: bufaux.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/bufaux.c,v
retrieving revision 1.24
diff -u -r1.24 bufaux.c
--- bufaux.c 26 Mar 2002 15:23:40 -0000 1.24
+++ bufaux.c 19 Apr 2002 12:55:29 -0000
@@ -137,10 +137,18 @@
BN_bin2bn(bin, len, value);...
2005 Nov 04
1
[Bug 1109] Memory leak in file: bufaux.c, function: buffer_get_bignum2_ret
http://bugzilla.mindrot.org/show_bug.cgi?id=1109
Summary: Memory leak in file: bufaux.c, function:
buffer_get_bignum2_ret
Product: Portable OpenSSH
Version: 4.2p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at m...
2005 Nov 04
1
[Bug 1110] memory leak in bufaux.c, function: buffer_put_bignum_ret
http://bugzilla.mindrot.org/show_bug.cgi?id=1110
Summary: memory leak in bufaux.c, function: buffer_put_bignum_ret
Product: Portable OpenSSH
Version: 4.2p1
Platform: Other
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org...
2004 Jul 22
3
ebcdic problem in bufaux.c
I am working on a port of Openssh 3.8p1 after already
having done a port of Openssh 3.5p1. There are a
couple of new lines in buffer_get_bignum2() that are
causing me problems:
if (len > 0 && (bin[0] & 0x80))
fatal("buffer_get_bignum2: negative
numbers not supported");
The "& 0x80" check is not relevant in ebcdic.
Does anyone
2014 Apr 08
1
buffer_put_bignum2_from_string question
Hello,
I have question about buffer_put_bignum2_from_string
function used in kexc25519.c in (OpenSSH >= 6.5)
Is it 1:1 replacement for formating bignums from OpenSSL?
If yes, then buffer_put_bignum2_from_string
has different results for numbers starting with zeros.
How to reproduce:
shared_key[CURVE25519_SIZE] = "\0\0\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1\1";
2014 Apr 20
2
bad bignum encoding for curve25519-sha256@libssh.org
...ns.kex_algorithms != NULL)
myproposal[PROPOSAL_KEX_ALGS] = options.kex_algorithms;
+ myproposal[PROPOSAL_KEX_ALGS] = compat_kex_proposal(
+ myproposal[PROPOSAL_KEX_ALGS]);
if (options.rekey_limit || options.rekey_interval)
packet_set_rekey_limits((u_int32_t)options.rekey_limit,
Index: bufaux.c
===================================================================
RCS file: /var/cvs/openssh/bufaux.c,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -p -r1.62 -r1.63
--- bufaux.c 4 Feb 2014 00:20:15 -0000 1.62
+++ bufaux.c 20 Apr 2014 03:24:50 -0000 1.63
@@ -1,4 +1,4 @@
-/* $OpenBS...
2001 Jan 23
11
cc & no 64bit int patches
Here are a couple of patches against the CVS (Jan 22 18:41 PST)
Some C++ comments found their way into ssh.h
The no64.patch puts ifdefs around buffer_get_int64()
now in bufaux.[c,h]
--
Tim Rice Multitalents (707) 887-1469
tim at multitalents.net
-------------- next part --------------
--- ssh.h.old Mon Jan 22 18:40:58 2001
+++ ssh.h Mon Jan 22 19:02:02 2001
@@ -25,8 +25,10 @@
# include <sys/select.h>
#endif
-//#include "rsa.h"
-//#include "...
1999 Dec 01
1
Compile bugs in openssh-1.2pre15 on Solaris (2.6)
...ply to bsd-login.
* rsa.h needs __P() define to work (I think this has already been
reported).
Diffs are -
*** Makefile.in.ORIG Thu Nov 25 12:40:22 1999
--- Makefile.in Wed Dec 1 12:09:37 1999
***************
*** 34,40 ****
all: $(OBJS) $(TARGETS)
! libssh.a: authfd.o authfile.o bufaux.o buffer.o canohost.o channels.o
cipher.o compat.o compress.o crc32.o deattack.o hostfile.o match.o
mpaux.o nchan.o packet.o readpass.o rsa.o tildexpand.o ttymodes.o
uidswap.o xmalloc.o helper.o rc4.o bsd-mktemp.o bsd-strlcpy.o
bsd-strlcat.o log.o fingerprint.o
$(AR) rv $@ $^
$(RANL...
2014 Apr 18
3
[Bug 2233] New: curve25519-sha256@libssh.org Signature Failures When 'sshd' Used with Dropbear Clients
...penSSH is generating the
shared secret bignum value 'K' in a way that is not expected by other
implementations.
I believe the problem is in 'buffer_put_bignum2_from_string' (used by
'kexc25519_shared_key'), as is mentioned here on the mailing list,
with a patch to bufaux.c to fix:
http://marc.info/?l=openssh-unix-dev&m=139699836815285&w=2
With the bufaux.c patch applied, I am no longer able to reproduce
the failure.
I believe this bug affects interop of 'curve25519-sha256 at libssh.org'
going forward, so I've set Severity to '...
2003 Oct 30
1
Patch to make sshd work on multihomed systems
...>krb5_ctx, localname, NULL,
KRB5_NT_SRV_HST, &server);
if (problem)
goto out;
diff -u -r src.old/gss-genr.c src/gss-genr.c
--- src.old/gss-genr.c Thu Oct 30 15:02:46 2003
+++ src/gss-genr.c Thu Oct 30 15:02:44 2003
@@ -30,6 +30,7 @@
#include "xmalloc.h"
#include "bufaux.h"
+#include "canohost.h"
#include "compat.h"
#include "log.h"
#include "monitor_wrap.h"
@@ -226,9 +227,18 @@
OM_uint32 status;
char lname[MAXHOSTNAMELEN];
gss_OID_set oidset;
+ char *pname;
gss_create_empty_oid_set(&status, &oidset);...
2001 Jul 04
0
Sneek peak at what was commited.
...6 05:48:07
[sshd.8]
remove unnecessary .Pp between .It;
millert@ ok
- markus at cvs.openbsd.org 2001/06/26 05:50:11
[auth2.c]
new interface for secure_filename()
- itojun at cvs.openbsd.org 2001/06/26 06:32:58
[atomicio.h authfd.h authfile.h auth.h auth-options.h bufaux.h
buffer.h canohost.h channels.h cipher.h clientloop.h compat.h
compress.h crc32.h deattack.h dh.h dispatch.h groupaccess.h
hostfile.h kex.h key.h log.h mac.h match.h misc.h mpaux.h packet.h
radix.h readconf.h readpass.h rsa.h]
prototype pedant. not very creative......
2000 Dec 07
2
sunos 4.1.4 Makefile and regex.[ch] fix
...ile
*** Makefile 2000/12/06 12:46:01 1.1
--- Makefile 2000/12/06 12:52:26
***************
*** 35,41 ****
TARGETS=ssh$(EXEEXT) sshd$(EXEEXT) ssh-add$(EXEEXT) ssh-keygen$(EXEEXT) ssh-agent$(EXEEXT) scp$(EXEEXT) sftp-server$(EXEEXT) $(EXTRA_TARGETS)
! LIBSSH_OBJS=atomicio.o authfd.o authfile.o bufaux.o buffer.o canohost.o channels.o cipher.o cli.o compat.o compress.o crc32.o cygwin_util.o deattack.o dispatch.o dsa.o hmac.o hostfile.o key.o kex.o log.o match.o mpaux.o nchan.o packet.o radix.o rijndael.o entropy.o readpass.o rsa.o tildexpand.o ttymodes.o uidswap.o util.o uuencode.o xmalloc.o...
2003 Oct 08
4
OS/390 openssh
...r_key_allowed(authctxt->pw, key))) {
packet_start(SSH2_MSG_USERAUTH_PK_OK);
packet_put_string(pkalg, alen);
- packet_put_string(pkblob, blen);
+ packet_put_binary(pkblob, blen);
packet_send();
packet_write_wait();
authctxt->postponed = 1;
diff -bur openssh-3.7.1p2.orig/bufaux.c openssh-3.7.1p2/bufaux.c
--- openssh-3.7.1p2.orig/bufaux.c Wed May 14 05:40:07 2003
+++ openssh-3.7.1p2/bufaux.c Tue Oct 7 08:22:00 2003
@@ -126,7 +126,7 @@
carry = !++uc[i];
}
}
- buffer_put_string(buffer, buf+hasnohigh, bytes-hasnohigh);
+ buffer_put_binary(buffer, buf+hasnohigh, byt...
2002 Mar 12
2
sys/queue.h
...ID("$OpenBSD: sftp-client.c,v 1.24 2002/02/24 16:57:19 markus Exp $");
-#if defined(HAVE_SYS_QUEUE_H) && !defined(HAVE_BOGUS_SYS_QUEUE_H)
-#include <sys/queue.h>
-#else
#include "openbsd-compat/fake-queue.h"
-#endif
#include "buffer.h"
#include "bufaux.h"
Index: ssh-agent.c
===================================================================
RCS file: /var/cvs/openssh/ssh-agent.c,v
retrieving revision 1.85
diff -u -r1.85 ssh-agent.c
--- ssh-agent.c 5 Mar 2002 18:59:45 -0000 1.85
+++ ssh-agent.c 12 Mar 2002 02:12:08 -0000
@@ -34,13 +34,8 @@...
2015 Feb 28
3
SAP-2015-3-1 issues
...-f `pwd`/regress/Makefile ] || ln -s `cd . && pwd`/regress/Makefile `pwd`/regress/Makefile
(cd openbsd-compat && make)
/usr/bin/ar rv libssh.a ssh_api.o ssherr.o sshbuf.o sshkey.o sshbuf-getput-basic.o sshbuf-misc.o sshbuf-getput-crypto.o krl.o bitmap.o authfd.o authfile.o bufaux.o bufbn.o bufec.o buffer.o canohost.o channels.o cipher.o cipher-aes.o cipher-aesctr.o cipher-bf1.o cipher-ctr.o cipher-3des1.o cleanup.o compat.o crc32.o deattack.o fatal.o hostfile.o log.o match.o md-sha256.o moduli.o nchan.o packet.o opacket.o readpass.o rsa.o ttymodes.o xmalloc.o addrmatch...
2012 Dec 20
4
Deprecated calls to bzero() and index() found in OpenSSH 6.1p1
...}
}
- bzero(buf, sizeof(buf));
+ memset(buf, 0, sizeof(buf));
if ((st.st_mode & (S_IFSOCK|S_IFCHR|S_IFIFO)) == 0 &&
st.st_size != buffer_len(blob)) {
debug("%s: key file %.200s%schanged size while reading",
In file 'bufaux.c', I've replaced the bzero() call with
the equivalent memset() call. The patch file is below in
(diff -u) format:
--- bufaux.c.orig 2012-12-19 17:12:21.672509848 -0800
+++ bufaux.c 2012-12-19 17:12:44.902553992 -0800
@@ -215,7 +215,7 @@
if (cp == ret + length - 1...
2016 Jan 19
2
OpenSSH portability & buildsystem fixes
...- $(LD) -o $@ $(SSHDOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(SSHDLIBS) $(LIBS) $(GSSLIBS) $(K5LIBS)
+ $(CC) -o $@ $(SSHDOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(SSHDLIBS) $(LIBS) $(GSSLIBS) $(K5LIBS)
scp$(EXEEXT): $(LIBCOMPAT) libssh.a scp.o progressmeter.o
- $(LD) -o $@ scp.o progressmeter.o bufaux.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
+ $(CC) -o $@ scp.o progressmeter.o bufaux.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
ssh-add$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-add.o
- $(LD) -o $@ ssh-add.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
+ $(CC) -o $@ ssh-add.o $(LDFLAGS) -lssh -lopenbs...
2018 Jun 08
4
vanilla build of 7.7p1 release on linux/4.17 fails with gcc8 @ "/usr/bin/ld: unrecognized option '-Wl,-z,retpolineplt'"
On 8 June 2018 at 11:21, PGNet Dev <pgnet.dev at gmail.com> wrote:
> fyi
>
> add'l -- and looks unrelated -- issue
> /usr/include/pthread.h:251:12: note: previous declaration of ?pthread_join? was here
> extern int pthread_join (pthread_t __th, void **__thread_return);
What included pthread.h? That's explicitly not supported by sshd:
$ grep THREAD
2000 Mar 17
1
TEST RELEASE: 1.2.3pre5
...handling for AIX to work around stupid runtime linking.
Problem elucidated by gshapiro at SENDMAIL.ORG by way of Jim Knoble
<jmknoble at pobox.com>
- Checks for 64 bit int types. Problem report from Mats Fredholm
<matsf at init.se>
- OpenBSD CVS updates:
- [atomicio.c auth-krb4.c bufaux.c channels.c compress.c fingerprint.c]
[packet.h radix.c rsa.c scp.c ssh-agent.c ssh-keygen.c sshconnect.c]
[sshd.c]
pedantic: signed vs. unsigned, void*-arithm, etc
- [ssh.1 sshd.8]
Various cleanups and standardizations.
- Runtime error fix for HPUX from Otmar Stahl
<O.Stahl at...