Displaying 12 results from an estimated 12 matches for "buffer_dump".
Did you mean:
  buffer_dma
  
2001 Dec 16
1
Timing glitch during startup of forwarded connection?
...the problem to vanish.  I then
tried debugging ssh instead, with the same results: AFAICT, ssh is
sending the first data packet on, but nothing comes back, if there is
too little delay before the packet is sent.  Building with PACKET_DEBUG
enabled suppresses the problem, evidently because executing buffer_dump
a couple of times provides the necessary delay.  (Commenting out the
calls to buffer_dump in packet.c allows the problem to come back, even
with -v -v -v.  The debug trace shows no indication of trouble.)
The sshd connection itself is not frozen, as data will transfer just
fine over other new or e...
2003 Jun 25
1
socks5 support for -D
...ppend(&c->output, (char *)&dest_port, sizeof(dest_port));
+	return 1;
+}
+
 /* dynamic port forwarding */
 static void
 channel_pre_dynamic(Channel *c, fd_set * readset, fd_set * writeset)
@@ -952,7 +1061,7 @@
 	debug2("channel %d: pre_dynamic: have %d", c->self, have);
 	/* buffer_dump(&c->input); */
 	/* check if the fixed size part of the packet is in buffer. */
-	if (have < 4) {
+	if (have < 3) {
 		/* need more */
 		FD_SET(c->sock, readset);
 		return;
@@ -962,6 +1071,9 @@
 	switch (p[0]) {
 	case 0x04:
 		ret = channel_decode_socks4(c, readset, writeset);
+...
2002 Jan 29
2
Key fingerprint logging
...Log before sending the reply */
-	auth_log(authctxt, authenticated, method, " ssh2");
+	auth_log(authctxt, authenticated, method, real_info);
 
 	if (authctxt->postponed)
 		return;
 
 	/* XXX todo: check if multiple auth methods are needed */
@@ -475,12 +479,16 @@
 #ifdef DEBUG_PK
 			buffer_dump(&b);
 #endif
 			/* test for correct signature */
 			if (user_key_allowed(authctxt->pw, key) &&
-			    key_verify(key, sig, slen, buffer_ptr(&b), buffer_len(&b)) == 1)
+			    key_verify(key, sig, slen, buffer_ptr(&b), buffer_len(&b)) == 1) {
 				authenticated = 1;...
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
...fd_set *writeset)
+{
+	u_char *p;
+	u_int have;
+	int ret;
+
+	if (c->sock >= 0) {
+		/* SOCKS session was established. */
+		FD_SET(c->sock, writeset);
+		return;
+	}
+
+	have = buffer_len(&c->output);
+	debug2("channel %d: pre_rdynamic: have %d", c->self, have);
+	/* buffer_dump(&c->input); */
+	/* check if the fixed size part of the packet is in buffer. */
+	if (have < 3) {
+		/* need more */
+		return;
+	}
+	/* try to guess the protocol */
+	p = buffer_ptr(&c->output);
+	switch (p[0]) {
+	case 0x04:
+		ret = channel_decode_socks4(c, readset, writeset);
+...
2007 Sep 11
11
[Bug 1360] New: Connection aborted on large data -R transfer
http://bugzilla.mindrot.org/show_bug.cgi?id=1360
           Summary: Connection aborted on large data -R transfer
           Product: Portable OpenSSH
           Version: 4.7p1
          Platform: Other
        OS/Version: Linux
            Status: NEW
          Severity: major
          Priority: P2
         Component: ssh
        AssignedTo: bitbucket at mindrot.org
        ReportedBy: t8m at
2002 Jan 24
1
PATCH: krb4/krb5/... names/patterns in auth_keys entries
...thmethod *authmethod_lookup(const char *);
 static char *authmethods_get(void);
-static int user_key_allowed(struct passwd *, Key *);
+int user_key_allowed(struct passwd *, Key *);
 static int hostbased_key_allowed(struct passwd *, const char *, char *, Key *);
 
 /* auth */
@@ -476,7 +476,7 @@
 			buffer_dump(&b);
 #endif
 			/* test for correct signature */
-			if (user_key_allowed(authctxt->pw, key) &&
+			if (user_key_allowed(authctxt->pw, key) > 0 &&
 			    key_verify(key, sig, slen, buffer_ptr(&b), buffer_len(&b)) == 1)
 				authenticated = 1;
 			buffer_clear(...
2001 Aug 15
0
[ossh patch] principal name/patterns in authorized_keys2
...y type '%s'", name);
 	return KEY_UNSPEC;
 }
Index: 2_9_p2.1/auth2.c
--- 2_9_p2.1/auth2.c Thu, 03 May 2001 16:12:13 -0400 jd (OpenSSH/k/6_auth2.c 1.1 644)
+++ 2_9_p2_w_named_keys.2/auth2.c Tue, 03 Jul 2001 13:57:30 -0400 willian (OpenSSH/k/6_auth2.c 1.1.1.1 644)
@@ -491,7 +491,7 @@
 			buffer_dump(&b);
 #endif
 			/* test for correct signature */
-			if (user_key_allowed(authctxt->pw, key) &&
+			if (user_key_allowed(authctxt->pw, key) > 0 &&
 			    key_verify(key, sig, slen, buffer_ptr(&b), buffer_len(&b)) == 1)
 				authenticated = 1;
 			buffer_clear(...
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...**********************");
+       debug("VIX userauth_pubkey called");
+       debug("**************************");
        if (!authctxt->valid) {
                debug2("userauth_pubkey: disabled because of invalid
user");
@@ -467,7 +499,7 @@
                buffer_dump(&b);
 #endif
                /* test for correct signature */
- -               if (user_key_allowed(authctxt->pw, key) &&
+               if (user_key_allowed(authctxt->pw, key, realname) &&
                    key_verify(key, sig, slen, buffer_ptr(&b),
buffer_len(&am...
2001 Oct 24
2
disable features
...;key, 0, enc->cipher->key_len);
+#ifdef WITH_COMPRESSION
 	if (comp->type != 0 && comp->enabled == 0) {
 		packet_init_compression();
 		if (mode == MODE_OUT)
@@ -475,6 +484,7 @@
 			buffer_compress_init_recv();
 		comp->enabled = 1;
 	}
+#endif
 }
 
 /*
@@ -509,6 +519,7 @@
 	buffer_dump(&outgoing_packet);
 #endif
 
+#ifdef WITH_COMPRESSION
 	if (comp && comp->enabled) {
 		len = buffer_len(&outgoing_packet);
 		/* skip header, compress only payload */
@@ -522,6 +533,7 @@
 		DBG(debug("compression: raw %d compressed %d", len,
 		    buffer_len(&outg...
2003 Oct 08
4
OS/390 openssh
...}
 		/* reconstruct packet */
 		buffer_put_char(&b, SSH2_MSG_USERAUTH_REQUEST);
@@ -115,7 +115,7 @@
 			buffer_put_char(&b, have_sig);
 			buffer_put_cstring(&b, pkalg);
 		}
-		buffer_put_string(&b, pkblob, blen);
+		buffer_put_binary(&b, pkblob, blen);
 #ifdef DEBUG_PK
 		buffer_dump(&b);
 #endif
@@ -142,7 +142,7 @@
 		if (PRIVSEP(user_key_allowed(authctxt->pw, key))) {
 			packet_start(SSH2_MSG_USERAUTH_PK_OK);
 			packet_put_string(pkalg, alen);
-			packet_put_string(pkblob, blen);
+			packet_put_binary(pkblob, blen);
 			packet_send();
 			packet_write_wait();
 			aut...
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
...pend(&b, skexinit, skexinitlen);
+
+	buffer_put_string(&b, serverhostkeyblob, sbloblen);
+	buffer_put_string(&b, client_dh_pub, CURVE25519_PUBKEY_SIZE);
+	buffer_put_string(&b, server_dh_pub, CURVE25519_PUBKEY_SIZE);
+	buffer_put_bignum2(&b, shared_secret);
+
+#ifdef DEBUG_KEX
+	buffer_dump(&b);
+#endif
+	EVP_DigestInit(&md, evp_md);
+	EVP_DigestUpdate(&md, buffer_ptr(&b), buffer_len(&b));
+	EVP_DigestFinal(&md, digest, NULL);
+
+	buffer_free(&b);
+
+#ifdef DEBUG_KEX
+	dump_digest("hash", digest, EVP_MD_size(evp_md));
+#endif
+	*hash = digest;
+	*...
2006 Nov 15
11
OpenSSH Certkey (PKI)
...key_ssh_name(id->key));
+	}
+	buffer_put_string(&b, blob, bloblen);
+
+	/* generate signature */
+	ret = identity_sign(id, &signature, &slen,
+	    buffer_ptr(&b), buffer_len(&b));
+	if (ret == -1) {
+		xfree(blob);
+		buffer_free(&b);
+		return 0;
+	}
+#ifdef DEBUG_PK
+	buffer_dump(&b);
+#endif
+	if (datafellows & SSH_BUG_PKSERVICE) {
+		buffer_clear(&b);
+		buffer_append(&b, session_id2, session_id2_len);
+		skip = session_id2_len;
+		buffer_put_char(&b, SSH2_MSG_USERAUTH_REQUEST);
+		buffer_put_cstring(&b, authctxt->server_user);
+		buffer_put_cst...