search for: buffer_dump

Displaying 12 results from an estimated 12 matches for "buffer_dump".

Did you mean: buffer_dma
2001 Dec 16
1
Timing glitch during startup of forwarded connection?
...the problem to vanish. I then tried debugging ssh instead, with the same results: AFAICT, ssh is sending the first data packet on, but nothing comes back, if there is too little delay before the packet is sent. Building with PACKET_DEBUG enabled suppresses the problem, evidently because executing buffer_dump a couple of times provides the necessary delay. (Commenting out the calls to buffer_dump in packet.c allows the problem to come back, even with -v -v -v. The debug trace shows no indication of trouble.) The sshd connection itself is not frozen, as data will transfer just fine over other new or e...
2003 Jun 25
1
socks5 support for -D
...ppend(&c->output, (char *)&dest_port, sizeof(dest_port)); + return 1; +} + /* dynamic port forwarding */ static void channel_pre_dynamic(Channel *c, fd_set * readset, fd_set * writeset) @@ -952,7 +1061,7 @@ debug2("channel %d: pre_dynamic: have %d", c->self, have); /* buffer_dump(&c->input); */ /* check if the fixed size part of the packet is in buffer. */ - if (have < 4) { + if (have < 3) { /* need more */ FD_SET(c->sock, readset); return; @@ -962,6 +1071,9 @@ switch (p[0]) { case 0x04: ret = channel_decode_socks4(c, readset, writeset); +...
2002 Jan 29
2
Key fingerprint logging
...Log before sending the reply */ - auth_log(authctxt, authenticated, method, " ssh2"); + auth_log(authctxt, authenticated, method, real_info); if (authctxt->postponed) return; /* XXX todo: check if multiple auth methods are needed */ @@ -475,12 +479,16 @@ #ifdef DEBUG_PK buffer_dump(&b); #endif /* test for correct signature */ if (user_key_allowed(authctxt->pw, key) && - key_verify(key, sig, slen, buffer_ptr(&b), buffer_len(&b)) == 1) + key_verify(key, sig, slen, buffer_ptr(&b), buffer_len(&b)) == 1) { authenticated = 1;...
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
...fd_set *writeset) +{ + u_char *p; + u_int have; + int ret; + + if (c->sock >= 0) { + /* SOCKS session was established. */ + FD_SET(c->sock, writeset); + return; + } + + have = buffer_len(&c->output); + debug2("channel %d: pre_rdynamic: have %d", c->self, have); + /* buffer_dump(&c->input); */ + /* check if the fixed size part of the packet is in buffer. */ + if (have < 3) { + /* need more */ + return; + } + /* try to guess the protocol */ + p = buffer_ptr(&c->output); + switch (p[0]) { + case 0x04: + ret = channel_decode_socks4(c, readset, writeset); +...
2007 Sep 11
11
[Bug 1360] New: Connection aborted on large data -R transfer
http://bugzilla.mindrot.org/show_bug.cgi?id=1360 Summary: Connection aborted on large data -R transfer Product: Portable OpenSSH Version: 4.7p1 Platform: Other OS/Version: Linux Status: NEW Severity: major Priority: P2 Component: ssh AssignedTo: bitbucket at mindrot.org ReportedBy: t8m at
2002 Jan 24
1
PATCH: krb4/krb5/... names/patterns in auth_keys entries
...thmethod *authmethod_lookup(const char *); static char *authmethods_get(void); -static int user_key_allowed(struct passwd *, Key *); +int user_key_allowed(struct passwd *, Key *); static int hostbased_key_allowed(struct passwd *, const char *, char *, Key *); /* auth */ @@ -476,7 +476,7 @@ buffer_dump(&b); #endif /* test for correct signature */ - if (user_key_allowed(authctxt->pw, key) && + if (user_key_allowed(authctxt->pw, key) > 0 && key_verify(key, sig, slen, buffer_ptr(&b), buffer_len(&b)) == 1) authenticated = 1; buffer_clear(...
2001 Aug 15
0
[ossh patch] principal name/patterns in authorized_keys2
...y type '%s'", name); return KEY_UNSPEC; } Index: 2_9_p2.1/auth2.c --- 2_9_p2.1/auth2.c Thu, 03 May 2001 16:12:13 -0400 jd (OpenSSH/k/6_auth2.c 1.1 644) +++ 2_9_p2_w_named_keys.2/auth2.c Tue, 03 Jul 2001 13:57:30 -0400 willian (OpenSSH/k/6_auth2.c 1.1.1.1 644) @@ -491,7 +491,7 @@ buffer_dump(&b); #endif /* test for correct signature */ - if (user_key_allowed(authctxt->pw, key) && + if (user_key_allowed(authctxt->pw, key) > 0 && key_verify(key, sig, slen, buffer_ptr(&b), buffer_len(&b)) == 1) authenticated = 1; buffer_clear(...
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...**********************"); + debug("VIX userauth_pubkey called"); + debug("**************************"); if (!authctxt->valid) { debug2("userauth_pubkey: disabled because of invalid user"); @@ -467,7 +499,7 @@ buffer_dump(&b); #endif /* test for correct signature */ - - if (user_key_allowed(authctxt->pw, key) && + if (user_key_allowed(authctxt->pw, key, realname) && key_verify(key, sig, slen, buffer_ptr(&b), buffer_len(&am...
2001 Oct 24
2
disable features
...;key, 0, enc->cipher->key_len); +#ifdef WITH_COMPRESSION if (comp->type != 0 && comp->enabled == 0) { packet_init_compression(); if (mode == MODE_OUT) @@ -475,6 +484,7 @@ buffer_compress_init_recv(); comp->enabled = 1; } +#endif } /* @@ -509,6 +519,7 @@ buffer_dump(&outgoing_packet); #endif +#ifdef WITH_COMPRESSION if (comp && comp->enabled) { len = buffer_len(&outgoing_packet); /* skip header, compress only payload */ @@ -522,6 +533,7 @@ DBG(debug("compression: raw %d compressed %d", len, buffer_len(&outg...
2003 Oct 08
4
OS/390 openssh
...} /* reconstruct packet */ buffer_put_char(&b, SSH2_MSG_USERAUTH_REQUEST); @@ -115,7 +115,7 @@ buffer_put_char(&b, have_sig); buffer_put_cstring(&b, pkalg); } - buffer_put_string(&b, pkblob, blen); + buffer_put_binary(&b, pkblob, blen); #ifdef DEBUG_PK buffer_dump(&b); #endif @@ -142,7 +142,7 @@ if (PRIVSEP(user_key_allowed(authctxt->pw, key))) { packet_start(SSH2_MSG_USERAUTH_PK_OK); packet_put_string(pkalg, alen); - packet_put_string(pkblob, blen); + packet_put_binary(pkblob, blen); packet_send(); packet_write_wait(); aut...
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
...pend(&b, skexinit, skexinitlen); + + buffer_put_string(&b, serverhostkeyblob, sbloblen); + buffer_put_string(&b, client_dh_pub, CURVE25519_PUBKEY_SIZE); + buffer_put_string(&b, server_dh_pub, CURVE25519_PUBKEY_SIZE); + buffer_put_bignum2(&b, shared_secret); + +#ifdef DEBUG_KEX + buffer_dump(&b); +#endif + EVP_DigestInit(&md, evp_md); + EVP_DigestUpdate(&md, buffer_ptr(&b), buffer_len(&b)); + EVP_DigestFinal(&md, digest, NULL); + + buffer_free(&b); + +#ifdef DEBUG_KEX + dump_digest("hash", digest, EVP_MD_size(evp_md)); +#endif + *hash = digest; + *...
2006 Nov 15
11
OpenSSH Certkey (PKI)
...key_ssh_name(id->key)); + } + buffer_put_string(&b, blob, bloblen); + + /* generate signature */ + ret = identity_sign(id, &signature, &slen, + buffer_ptr(&b), buffer_len(&b)); + if (ret == -1) { + xfree(blob); + buffer_free(&b); + return 0; + } +#ifdef DEBUG_PK + buffer_dump(&b); +#endif + if (datafellows & SSH_BUG_PKSERVICE) { + buffer_clear(&b); + buffer_append(&b, session_id2, session_id2_len); + skip = session_id2_len; + buffer_put_char(&b, SSH2_MSG_USERAUTH_REQUEST); + buffer_put_cstring(&b, authctxt->server_user); + buffer_put_cst...