Displaying 15 results from an estimated 15 matches for "buffer_get_char".
2000 Oct 08
1
OpenSSH-2.2.0 problem with ssh.com ssh-agent2
...x == SSH_COM_AGENT_FAILURE))
-
typedef struct {
int fd;
Buffer identities;
--- 39,44 ----
*** authfd.c Sun Oct 8 17:45:28 2000
--- authfd.c.orig Tue Aug 22 20:46:24 2000
***************
*** 223,229 ****
/* Get message type, and verify that we got a proper answer. */
type = buffer_get_char(&auth->identities);
! if (agent_failed(type)) {
return NULL;
} else if (type != code2) {
fatal("Bad authentication reply message type: %d", type);
--- 223,229 ----
/* Get message type, and verify that we got a proper answer. */
type = buffer_get_char(&auth-...
2005 May 19
1
ssh-keygen private keys export - new feature
...et_int(&b);
buffer_get_bignum_bits(&b, key->dsa->p);
buffer_get_bignum_bits(&b, key->dsa->g);
buffer_get_bignum_bits(&b, key->dsa->q);
@@ -264,21 +373,7 @@
buffer_get_bignum_bits(&b, key->dsa->priv_key);
break;
case KEY_RSA:
- e = buffer_get_char(&b);
- debug("e %lx", e);
- if (e < 30) {
- e <<= 8;
- e += buffer_get_char(&b);
- debug("e %lx", e);
- e <<= 8;
- e += buffer_get_char(&b);
- debug("e %lx", e);
- }
- if (!BN_set_word(key->rsa->e, e)) {
- buffer_free(...
2001 Oct 07
0
trivial grammatical patch
...if (len < sizeof(authfile_id_string)) {
- debug3("No RSA1 key file %.200s.", filename);
+ debug3("Not RSA1 key file %.200s.", filename);
buffer_free(&buffer);
return NULL;
}
@@ -260,7 +260,7 @@
*/
for (i = 0; i < sizeof(authfile_id_string); i++)
if (buffer_get_char(&buffer) != authfile_id_string[i]) {
- debug3("No RSA1 key file %.200s.", filename);
+ debug3("Not RSA1 key file %.200s.", filename);
buffer_free(&buffer);
return NULL;
}
@@ -336,7 +336,7 @@
/* Check that it is at least big enough to contain the ID str...
2008 Jun 19
5
Portforwarding using the control master.
Hi all,
currently I am considering writing a patch for OpenSSH that will allow
portforwarding using the control_master unix domain socket. The idea is
to introduce an extra SSHMUX command, SSHMUX_COMMAND_SOCKS, which will
then pass control to the normal socks functions used for dynamic
forwarding.
The main reason for me to write this patch are:
- some more control over who gets to connect to
2009 Jun 01
0
ssh option "-C" generates an error
Hi Team,
While doing ssh with compression option "-C" does not work anymore
and produces following error
buffer_get_ret: trying to get more bytes 1 than in buffer 0
buffer_get_char_ret: buffer_get_ret failed
buffer_get_char: buffer error
Environment :-
oslevel - AIX 5300-08-04
ssh version --- OpenSSH_4.7p1, OpenSSL 0.9.8f 11 Oct 2007
Please Help me to fix this problem.
Many Thanks
Vinoth
Server Management - Distributed (Unix)
Server Systems...
2001 Jan 23
11
cc & no 64bit int patches
...64(Buffer *buffer);
+#endif
/* Stores an integer in the buffer in 4 bytes, msb first. */
void buffer_put_int(Buffer * buffer, u_int value);
+#ifdef HAVE_U_INT64_T
void buffer_put_int64(Buffer *buffer, u_int64_t value);
+#endif
/* Returns a character from the buffer (0 - 255). */
int buffer_get_char(Buffer * buffer);
--- defines.h.old Mon Jan 22 18:40:32 2001
+++ defines.h Mon Jan 22 19:45:41 2001
@@ -171,20 +171,22 @@
#ifndef HAVE_INT64_T
# if (SIZEOF_LONG_INT == 8)
typedef long int int64_t;
+# define HAVE_INT64_T 1
# else
# if (SIZEOF_LONG_LONG_INT == 8)
typedef long long int int64_...
2002 Jan 03
3
[PATCH] Improving sftp client performance
...id++;
+ req[num_req].len = COPY_SIZE;
+ req[num_req].offset = offset;
+ offset += req[num_req].len;
+ num_req++;
+ send_request(fd_out, handle, handle_len, SSH2_FXP_READ,
+ &req[num_req - 1], &msg);
+ }
buffer_clear(&msg);
-
get_msg(fd_in, &msg);
type = buffer_get_char(&msg);
id = buffer_get_int(&msg);
debug3("Received reply T:%d I:%d", type, id);
- if (id != expected_id)
- fatal("ID mismatch (%d != %d)", id, expected_id);
- if (type == SSH2_FXP_STATUS) {
+ reply = find_request(req, num_req, id);
+
+ switch (type) {
+ case...
2001 May 14
2
openssh-2.9p1
Hi,
1. I think you should apply the attached patch to openssh-2.9p1,
otherwise ssh-keyscan on linux boxes with glibc-2.1 will experience enormous
timeout delays.
2. Is there a program like ssh-keyscan for the Version2 (dsa and rsa) keys??
regards
Peter Breitenlohner <peb at mppmu.mpg.de>
-------------- next part --------------
diff -ur openssh-2.9p1.orig/ssh-keyscan.c
2010 Jan 14
1
ssh(1) multiplexing rewrite
...nv; i++)
+ if (match_pattern(name, options.send_env[i]))
+ return 1;
- /* Read command */
- buffer_init(&m);
- if (ssh_msg_recv(client_fd, &m) == -1) {
- error("%s: client msg_recv failed", __func__);
- close(client_fd);
- buffer_free(&m);
- return 0;
- }
- if ((ver = buffer_get_char(&m)) != SSHMUX_VER) {
- error("%s: wrong client version %d", __func__, ver);
- buffer_free(&m);
- close(client_fd);
- return 0;
- }
+ return 0;
+}
- allowed = 1;
- mux_command = buffer_get_int(&m);
- flags = buffer_get_int(&m);
+/* Mux master protocol message handler...
2002 Jan 06
3
sftp/scp performance testing
Folks, I've noticed poor performance using sftp. If anyone has any
advice on how to improve performance, I'd like to hear it. Test simply
involved transferring a single 143MB MP3 file using defaults for all the
program configs. The opensshd 3.0.2p1 server is used in all tests.
Software:
openssh suite 3.0.2p1
psftp (putty sftp client) latest dev snapshot
pscp (putty scp client) latest
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
...12 +274,12 @@
buffer_init(&msg);
rsa = key_new(KEY_RSA1);
}
- buffer_append(&msg, kd, len);
- buffer_consume(&msg, 8 - (len & 7)); /* padding */
+ buffer_append(&msg, c->c_data, c->c_plen);
+ buffer_consume(&msg, 8 - (c->c_plen & 7)); /* padding */
if (buffer_get_char(&msg) != (int) SSH_SMSG_PUBLIC_KEY) {
- error("%s: invalid packet type", host);
+ error("%s: invalid packet type", c->c_name);
buffer_clear(&msg);
- return;
+ return NULL;
}
buffer_consume(&msg, 8); /* cookie */
@@ -270,10 +292,70 @@
(void) buffer_...
2003 Sep 09
6
3.6p2 build errors on buffer_get with latest portable/SNAP
Tried the user discussion list to no avail, can't get 3.6.p2
portable running due to buffer_get errors. Does the
latest portable SNAP incorporate the latest patches?
Running Red Hat 8.0
AS SHIPPED
/usr/sbin/sshd
...
cool, listens on 22 with 3.4p1
WITH 3.6.1p2
./configure
make
make install
...
/usr/local/sbin/sshd -t -f /usr/local/etc/sshd_config
buffer_get: trying to get more bytes 1 than
2001 Oct 24
2
disable features
...if (packet_compression) {
buffer_clear(&compression_buffer);
buffer_uncompress(&incoming_packet, &compression_buffer);
@@ -756,6 +769,7 @@
buffer_append(&incoming_packet, buffer_ptr(&compression_buffer),
buffer_len(&compression_buffer));
}
+#endif
type = buffer_get_char(&incoming_packet);
*payload_len_ptr = buffer_len(&incoming_packet);
return type;
@@ -849,6 +863,7 @@
buffer_consume(&incoming_packet, 4 + 1);
buffer_consume_end(&incoming_packet, padlen);
+#ifdef WITH_COMPRESSION
DBG(debug("input: len before de-compress %d", bu...
2003 Oct 08
4
OS/390 openssh
...len);
+ xfree(cp);
+ }
+ else
+#endif
buffer_append(buffer, buf, len);
}
void
diff -bur openssh-3.7.1p2.orig/bufaux.h openssh-3.7.1p2/bufaux.h
--- openssh-3.7.1p2.orig/bufaux.h Sun Apr 27 20:01:37 2003
+++ openssh-3.7.1p2/bufaux.h Tue Oct 7 08:22:00 2003
@@ -35,6 +35,13 @@
int buffer_get_char(Buffer *);
void buffer_put_char(Buffer *, int);
+#ifdef CHARSET_EBCDIC
+void *buffer_get_binary(Buffer *, u_int *);
+void buffer_put_binary(Buffer *, const void *, u_int);
+#else
+#define buffer_get_binary(_buf,_len) buffer_get_string(_buf,_len)
+#define buffer_put_binary(_buf,_data,_len...
2006 Nov 15
11
OpenSSH Certkey (PKI)
...u_int datalen)
+monitor_valid_userblob(u_char *data, u_int datalen, u_char *name)
{
Buffer b;
char *p;
@@ -900,7 +911,7 @@
fail++;
} else {
p = buffer_get_string(&b, NULL);
- if (strcmp("publickey", p) != 0)
+ if (strcmp(name, p) != 0)
fail++;
xfree(p);
if (!buffer_get_char(&b))
@@ -992,8 +1003,11 @@
fatal("%s: bad public key blob", __func__);
switch (key_blobtype) {
+ case MM_CERTKEY:
+ valid_data = monitor_valid_userblob(data, datalen, "certkey");
+ break;
case MM_USERKEY:
- valid_data = monitor_valid_userblob(data, datalen);
+ v...