Displaying 12 results from an estimated 12 matches for "buffer_dump".
Did you mean:
buffer_dma
2001 Dec 16
1
Timing glitch during startup of forwarded connection?
...the problem to vanish. I then
tried debugging ssh instead, with the same results: AFAICT, ssh is
sending the first data packet on, but nothing comes back, if there is
too little delay before the packet is sent. Building with PACKET_DEBUG
enabled suppresses the problem, evidently because executing buffer_dump
a couple of times provides the necessary delay. (Commenting out the
calls to buffer_dump in packet.c allows the problem to come back, even
with -v -v -v. The debug trace shows no indication of trouble.)
The sshd connection itself is not frozen, as data will transfer just
fine over other new or e...
2003 Jun 25
1
socks5 support for -D
...ppend(&c->output, (char *)&dest_port, sizeof(dest_port));
+ return 1;
+}
+
/* dynamic port forwarding */
static void
channel_pre_dynamic(Channel *c, fd_set * readset, fd_set * writeset)
@@ -952,7 +1061,7 @@
debug2("channel %d: pre_dynamic: have %d", c->self, have);
/* buffer_dump(&c->input); */
/* check if the fixed size part of the packet is in buffer. */
- if (have < 4) {
+ if (have < 3) {
/* need more */
FD_SET(c->sock, readset);
return;
@@ -962,6 +1071,9 @@
switch (p[0]) {
case 0x04:
ret = channel_decode_socks4(c, readset, writeset);
+...
2002 Jan 29
2
Key fingerprint logging
...Log before sending the reply */
- auth_log(authctxt, authenticated, method, " ssh2");
+ auth_log(authctxt, authenticated, method, real_info);
if (authctxt->postponed)
return;
/* XXX todo: check if multiple auth methods are needed */
@@ -475,12 +479,16 @@
#ifdef DEBUG_PK
buffer_dump(&b);
#endif
/* test for correct signature */
if (user_key_allowed(authctxt->pw, key) &&
- key_verify(key, sig, slen, buffer_ptr(&b), buffer_len(&b)) == 1)
+ key_verify(key, sig, slen, buffer_ptr(&b), buffer_len(&b)) == 1) {
authenticated = 1;...
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
...fd_set *writeset)
+{
+ u_char *p;
+ u_int have;
+ int ret;
+
+ if (c->sock >= 0) {
+ /* SOCKS session was established. */
+ FD_SET(c->sock, writeset);
+ return;
+ }
+
+ have = buffer_len(&c->output);
+ debug2("channel %d: pre_rdynamic: have %d", c->self, have);
+ /* buffer_dump(&c->input); */
+ /* check if the fixed size part of the packet is in buffer. */
+ if (have < 3) {
+ /* need more */
+ return;
+ }
+ /* try to guess the protocol */
+ p = buffer_ptr(&c->output);
+ switch (p[0]) {
+ case 0x04:
+ ret = channel_decode_socks4(c, readset, writeset);
+...
2007 Sep 11
11
[Bug 1360] New: Connection aborted on large data -R transfer
http://bugzilla.mindrot.org/show_bug.cgi?id=1360
Summary: Connection aborted on large data -R transfer
Product: Portable OpenSSH
Version: 4.7p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: major
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
ReportedBy: t8m at
2002 Jan 24
1
PATCH: krb4/krb5/... names/patterns in auth_keys entries
...thmethod *authmethod_lookup(const char *);
static char *authmethods_get(void);
-static int user_key_allowed(struct passwd *, Key *);
+int user_key_allowed(struct passwd *, Key *);
static int hostbased_key_allowed(struct passwd *, const char *, char *, Key *);
/* auth */
@@ -476,7 +476,7 @@
buffer_dump(&b);
#endif
/* test for correct signature */
- if (user_key_allowed(authctxt->pw, key) &&
+ if (user_key_allowed(authctxt->pw, key) > 0 &&
key_verify(key, sig, slen, buffer_ptr(&b), buffer_len(&b)) == 1)
authenticated = 1;
buffer_clear(...
2001 Aug 15
0
[ossh patch] principal name/patterns in authorized_keys2
...y type '%s'", name);
return KEY_UNSPEC;
}
Index: 2_9_p2.1/auth2.c
--- 2_9_p2.1/auth2.c Thu, 03 May 2001 16:12:13 -0400 jd (OpenSSH/k/6_auth2.c 1.1 644)
+++ 2_9_p2_w_named_keys.2/auth2.c Tue, 03 Jul 2001 13:57:30 -0400 willian (OpenSSH/k/6_auth2.c 1.1.1.1 644)
@@ -491,7 +491,7 @@
buffer_dump(&b);
#endif
/* test for correct signature */
- if (user_key_allowed(authctxt->pw, key) &&
+ if (user_key_allowed(authctxt->pw, key) > 0 &&
key_verify(key, sig, slen, buffer_ptr(&b), buffer_len(&b)) == 1)
authenticated = 1;
buffer_clear(...
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...**********************");
+ debug("VIX userauth_pubkey called");
+ debug("**************************");
if (!authctxt->valid) {
debug2("userauth_pubkey: disabled because of invalid
user");
@@ -467,7 +499,7 @@
buffer_dump(&b);
#endif
/* test for correct signature */
- - if (user_key_allowed(authctxt->pw, key) &&
+ if (user_key_allowed(authctxt->pw, key, realname) &&
key_verify(key, sig, slen, buffer_ptr(&b),
buffer_len(&am...
2001 Oct 24
2
disable features
...;key, 0, enc->cipher->key_len);
+#ifdef WITH_COMPRESSION
if (comp->type != 0 && comp->enabled == 0) {
packet_init_compression();
if (mode == MODE_OUT)
@@ -475,6 +484,7 @@
buffer_compress_init_recv();
comp->enabled = 1;
}
+#endif
}
/*
@@ -509,6 +519,7 @@
buffer_dump(&outgoing_packet);
#endif
+#ifdef WITH_COMPRESSION
if (comp && comp->enabled) {
len = buffer_len(&outgoing_packet);
/* skip header, compress only payload */
@@ -522,6 +533,7 @@
DBG(debug("compression: raw %d compressed %d", len,
buffer_len(&outg...
2003 Oct 08
4
OS/390 openssh
...}
/* reconstruct packet */
buffer_put_char(&b, SSH2_MSG_USERAUTH_REQUEST);
@@ -115,7 +115,7 @@
buffer_put_char(&b, have_sig);
buffer_put_cstring(&b, pkalg);
}
- buffer_put_string(&b, pkblob, blen);
+ buffer_put_binary(&b, pkblob, blen);
#ifdef DEBUG_PK
buffer_dump(&b);
#endif
@@ -142,7 +142,7 @@
if (PRIVSEP(user_key_allowed(authctxt->pw, key))) {
packet_start(SSH2_MSG_USERAUTH_PK_OK);
packet_put_string(pkalg, alen);
- packet_put_string(pkblob, blen);
+ packet_put_binary(pkblob, blen);
packet_send();
packet_write_wait();
aut...
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
...pend(&b, skexinit, skexinitlen);
+
+ buffer_put_string(&b, serverhostkeyblob, sbloblen);
+ buffer_put_string(&b, client_dh_pub, CURVE25519_PUBKEY_SIZE);
+ buffer_put_string(&b, server_dh_pub, CURVE25519_PUBKEY_SIZE);
+ buffer_put_bignum2(&b, shared_secret);
+
+#ifdef DEBUG_KEX
+ buffer_dump(&b);
+#endif
+ EVP_DigestInit(&md, evp_md);
+ EVP_DigestUpdate(&md, buffer_ptr(&b), buffer_len(&b));
+ EVP_DigestFinal(&md, digest, NULL);
+
+ buffer_free(&b);
+
+#ifdef DEBUG_KEX
+ dump_digest("hash", digest, EVP_MD_size(evp_md));
+#endif
+ *hash = digest;
+ *...
2006 Nov 15
11
OpenSSH Certkey (PKI)
...key_ssh_name(id->key));
+ }
+ buffer_put_string(&b, blob, bloblen);
+
+ /* generate signature */
+ ret = identity_sign(id, &signature, &slen,
+ buffer_ptr(&b), buffer_len(&b));
+ if (ret == -1) {
+ xfree(blob);
+ buffer_free(&b);
+ return 0;
+ }
+#ifdef DEBUG_PK
+ buffer_dump(&b);
+#endif
+ if (datafellows & SSH_BUG_PKSERVICE) {
+ buffer_clear(&b);
+ buffer_append(&b, session_id2, session_id2_len);
+ skip = session_id2_len;
+ buffer_put_char(&b, SSH2_MSG_USERAUTH_REQUEST);
+ buffer_put_cstring(&b, authctxt->server_user);
+ buffer_put_cst...