search for: buffer_get_bignum

Displaying 8 results from an estimated 8 matches for "buffer_get_bignum".

2012 Jan 28
1
PATCH: Support for encrypted host keys
..._bignum(buffer, key->e); + buffer_put_bignum(buffer, key->n); + buffer_put_bignum(buffer, key->d); + buffer_put_bignum(buffer, key->iqmp); + buffer_put_bignum(buffer, key->p); + buffer_put_bignum(buffer, key->q); +} + +static void +buffer_get_key_rsa(Buffer *buffer, RSA *key) +{ + buffer_get_bignum(buffer, key->e); + buffer_get_bignum(buffer, key->n); + buffer_get_bignum(buffer, key->d); + buffer_get_bignum(buffer, key->iqmp); + buffer_get_bignum(buffer, key->p); + buffer_get_bignum(buffer, key->q); + rsa_generate_additional_parameters(key); +} + +static void +buffer_put_key...
2016 Aug 02
2
Configure option '--with-ssh1' breaks openssh-7.3p1
...ersion string SSH-2.0-OpenSSH_7.3 ssh_exchange_identification: read: Connection reset by peer /var/log/messages: Aug 2 17:35:07 host102 sshd[7449]: Server listening on 0.0.0.0 port 222. Aug 2 17:35:07 host102 sshd[7449]: Server listening on :: port 222. Aug 2 17:36:03 host102 sshd[7455]: error: buffer_get_bignum_ret: \n incomplete message Aug 2 17:36:03 host102 sshd[7455]: fatal: buffer_get_bignum: buffer \n error The code after line 1111 in sshd.c (buffer_get_bignum) seems to be not adequate any more. I suppose the error will also show up on Centos. Best regards Rainer
2002 Apr 21
3
OpenSSH Security Advisory (adv.token)
...u_int value) { Index: bufaux.h =================================================================== RCS file: /cvs/src/usr.bin/ssh/bufaux.h,v retrieving revision 1.17 diff -u -r1.17 bufaux.h --- bufaux.h 18 Mar 2002 17:25:29 -0000 1.17 +++ bufaux.h 19 Apr 2002 12:55:56 -0000 @@ -23,6 +23,9 @@ void buffer_get_bignum(Buffer *, BIGNUM *); void buffer_get_bignum2(Buffer *, BIGNUM *); +u_short buffer_get_short(Buffer *); +void buffer_put_short(Buffer *, u_short); + u_int buffer_get_int(Buffer *); void buffer_put_int(Buffer *, u_int);
2002 Apr 21
3
OpenSSH Security Advisory (adv.token)
...u_int value) { Index: bufaux.h =================================================================== RCS file: /cvs/src/usr.bin/ssh/bufaux.h,v retrieving revision 1.17 diff -u -r1.17 bufaux.h --- bufaux.h 18 Mar 2002 17:25:29 -0000 1.17 +++ bufaux.h 19 Apr 2002 12:55:56 -0000 @@ -23,6 +23,9 @@ void buffer_get_bignum(Buffer *, BIGNUM *); void buffer_get_bignum2(Buffer *, BIGNUM *); +u_short buffer_get_short(Buffer *); +void buffer_put_short(Buffer *, u_short); + u_int buffer_get_int(Buffer *); void buffer_put_int(Buffer *, u_int);
2001 May 14
2
openssh-2.9p1
Hi, 1. I think you should apply the attached patch to openssh-2.9p1, otherwise ssh-keyscan on linux boxes with glibc-2.1 will experience enormous timeout delays. 2. Is there a program like ssh-keyscan for the Version2 (dsa and rsa) keys?? regards Peter Breitenlohner <peb at mppmu.mpg.de> -------------- next part -------------- diff -ur openssh-2.9p1.orig/ssh-keyscan.c
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
...SH_SMSG_PUBLIC_KEY) { - error("%s: invalid packet type", host); + error("%s: invalid packet type", c->c_name); buffer_clear(&msg); - return; + return NULL; } buffer_consume(&msg, 8); /* cookie */ @@ -270,10 +292,70 @@ (void) buffer_get_int(&msg); buffer_get_bignum(&msg, rsa->rsa->e); buffer_get_bignum(&msg, rsa->rsa->n); + buffer_clear(&msg); + + return (rsa); +} + +static int +hostjump(Key *hostkey) +{ + longjmp(kexjmp, (int)hostkey); +} + +int +ssh2_capable(int remote_major, int remote_minor) +{ + switch (remote_major) { + case...
2016 Aug 03
2
Configure option '--with-ssh1' breaks openssh-7.3p1
...entering fd = 8 config len 285 debug3: ssh_msg_send: type 0 debug3: send_rexec_state: done debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8 -------------- next part -------------- Aug 3 03:31:56 host102 sshd[7449]: Received signal 15; terminating. Aug 3 04:03:19 host102 sshd[8897]: error: buffer_get_bignum_ret: incomplete message Aug 3 04:03:19 host102 sshd[8897]: fatal: buffer_get_bignum: buffer error -------------- next part -------------- diff ../openssh-7.3p1.nossh1/config.h config.h 1722c1722 < /* #undef WITH_SSH1 */ --- > #define WITH_SSH1 1
2016 Aug 03
2
Configure option '--with-ssh1' breaks openssh-7.3p1
...case I'm surprised it starts at > all. Exactly how are you starting sshd? > >> Aug 2 17:35:07 host102 sshd[7449]: Server listening on 0.0.0.0 port 222. >> Aug 2 17:35:07 host102 sshd[7449]: Server listening on :: port 222. >> Aug 2 17:36:03 host102 sshd[7455]: error: buffer_get_bignum_ret: \n >> incomplete message > > that might be the newline confusing the re-exec protocol although I'm not sure. > > Please including complete debug logs for both client and server. > The newlines are *not* in the real calls, but are all inserted by me into the email to...