search for: buffer_get_char

Displaying 15 results from an estimated 15 matches for "buffer_get_char".

2000 Oct 08
1
OpenSSH-2.2.0 problem with ssh.com ssh-agent2
...x == SSH_COM_AGENT_FAILURE)) - typedef struct { int fd; Buffer identities; --- 39,44 ---- *** authfd.c Sun Oct 8 17:45:28 2000 --- authfd.c.orig Tue Aug 22 20:46:24 2000 *************** *** 223,229 **** /* Get message type, and verify that we got a proper answer. */ type = buffer_get_char(&auth->identities); ! if (agent_failed(type)) { return NULL; } else if (type != code2) { fatal("Bad authentication reply message type: %d", type); --- 223,229 ---- /* Get message type, and verify that we got a proper answer. */ type = buffer_get_char(&auth-...
2005 May 19
1
ssh-keygen private keys export - new feature
...et_int(&b); buffer_get_bignum_bits(&b, key->dsa->p); buffer_get_bignum_bits(&b, key->dsa->g); buffer_get_bignum_bits(&b, key->dsa->q); @@ -264,21 +373,7 @@ buffer_get_bignum_bits(&b, key->dsa->priv_key); break; case KEY_RSA: - e = buffer_get_char(&b); - debug("e %lx", e); - if (e < 30) { - e <<= 8; - e += buffer_get_char(&b); - debug("e %lx", e); - e <<= 8; - e += buffer_get_char(&b); - debug("e %lx", e); - } - if (!BN_set_word(key->rsa->e, e)) { - buffer_free(...
2001 Oct 07
0
trivial grammatical patch
...if (len < sizeof(authfile_id_string)) { - debug3("No RSA1 key file %.200s.", filename); + debug3("Not RSA1 key file %.200s.", filename); buffer_free(&buffer); return NULL; } @@ -260,7 +260,7 @@ */ for (i = 0; i < sizeof(authfile_id_string); i++) if (buffer_get_char(&buffer) != authfile_id_string[i]) { - debug3("No RSA1 key file %.200s.", filename); + debug3("Not RSA1 key file %.200s.", filename); buffer_free(&buffer); return NULL; } @@ -336,7 +336,7 @@ /* Check that it is at least big enough to contain the ID str...
2008 Jun 19
5
Portforwarding using the control master.
Hi all, currently I am considering writing a patch for OpenSSH that will allow portforwarding using the control_master unix domain socket. The idea is to introduce an extra SSHMUX command, SSHMUX_COMMAND_SOCKS, which will then pass control to the normal socks functions used for dynamic forwarding. The main reason for me to write this patch are: - some more control over who gets to connect to
2009 Jun 01
0
ssh option "-C" generates an error
Hi Team, While doing ssh with compression option "-C" does not work anymore and produces following error buffer_get_ret: trying to get more bytes 1 than in buffer 0 buffer_get_char_ret: buffer_get_ret failed buffer_get_char: buffer error Environment :- oslevel - AIX 5300-08-04 ssh version --- OpenSSH_4.7p1, OpenSSL 0.9.8f 11 Oct 2007 Please Help me to fix this problem. Many Thanks Vinoth Server Management - Distributed (Unix) Server Systems...
2001 Jan 23
11
cc & no 64bit int patches
...64(Buffer *buffer); +#endif /* Stores an integer in the buffer in 4 bytes, msb first. */ void buffer_put_int(Buffer * buffer, u_int value); +#ifdef HAVE_U_INT64_T void buffer_put_int64(Buffer *buffer, u_int64_t value); +#endif /* Returns a character from the buffer (0 - 255). */ int buffer_get_char(Buffer * buffer); --- defines.h.old Mon Jan 22 18:40:32 2001 +++ defines.h Mon Jan 22 19:45:41 2001 @@ -171,20 +171,22 @@ #ifndef HAVE_INT64_T # if (SIZEOF_LONG_INT == 8) typedef long int int64_t; +# define HAVE_INT64_T 1 # else # if (SIZEOF_LONG_LONG_INT == 8) typedef long long int int64_...
2002 Jan 03
3
[PATCH] Improving sftp client performance
...id++; + req[num_req].len = COPY_SIZE; + req[num_req].offset = offset; + offset += req[num_req].len; + num_req++; + send_request(fd_out, handle, handle_len, SSH2_FXP_READ, + &req[num_req - 1], &msg); + } buffer_clear(&msg); - get_msg(fd_in, &msg); type = buffer_get_char(&msg); id = buffer_get_int(&msg); debug3("Received reply T:%d I:%d", type, id); - if (id != expected_id) - fatal("ID mismatch (%d != %d)", id, expected_id); - if (type == SSH2_FXP_STATUS) { + reply = find_request(req, num_req, id); + + switch (type) { + case...
2001 May 14
2
openssh-2.9p1
Hi, 1. I think you should apply the attached patch to openssh-2.9p1, otherwise ssh-keyscan on linux boxes with glibc-2.1 will experience enormous timeout delays. 2. Is there a program like ssh-keyscan for the Version2 (dsa and rsa) keys?? regards Peter Breitenlohner <peb at mppmu.mpg.de> -------------- next part -------------- diff -ur openssh-2.9p1.orig/ssh-keyscan.c
2010 Jan 14
1
ssh(1) multiplexing rewrite
...nv; i++) + if (match_pattern(name, options.send_env[i])) + return 1; - /* Read command */ - buffer_init(&m); - if (ssh_msg_recv(client_fd, &m) == -1) { - error("%s: client msg_recv failed", __func__); - close(client_fd); - buffer_free(&m); - return 0; - } - if ((ver = buffer_get_char(&m)) != SSHMUX_VER) { - error("%s: wrong client version %d", __func__, ver); - buffer_free(&m); - close(client_fd); - return 0; - } + return 0; +} - allowed = 1; - mux_command = buffer_get_int(&m); - flags = buffer_get_int(&m); +/* Mux master protocol message handler...
2002 Jan 06
3
sftp/scp performance testing
Folks, I've noticed poor performance using sftp. If anyone has any advice on how to improve performance, I'd like to hear it. Test simply involved transferring a single 143MB MP3 file using defaults for all the program configs. The opensshd 3.0.2p1 server is used in all tests. Software: openssh suite 3.0.2p1 psftp (putty sftp client) latest dev snapshot pscp (putty scp client) latest
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
...12 +274,12 @@ buffer_init(&msg); rsa = key_new(KEY_RSA1); } - buffer_append(&msg, kd, len); - buffer_consume(&msg, 8 - (len & 7)); /* padding */ + buffer_append(&msg, c->c_data, c->c_plen); + buffer_consume(&msg, 8 - (c->c_plen & 7)); /* padding */ if (buffer_get_char(&msg) != (int) SSH_SMSG_PUBLIC_KEY) { - error("%s: invalid packet type", host); + error("%s: invalid packet type", c->c_name); buffer_clear(&msg); - return; + return NULL; } buffer_consume(&msg, 8); /* cookie */ @@ -270,10 +292,70 @@ (void) buffer_...
2003 Sep 09
6
3.6p2 build errors on buffer_get with latest portable/SNAP
Tried the user discussion list to no avail, can't get 3.6.p2 portable running due to buffer_get errors. Does the latest portable SNAP incorporate the latest patches? Running Red Hat 8.0 AS SHIPPED /usr/sbin/sshd ... cool, listens on 22 with 3.4p1 WITH 3.6.1p2 ./configure make make install ... /usr/local/sbin/sshd -t -f /usr/local/etc/sshd_config buffer_get: trying to get more bytes 1 than
2001 Oct 24
2
disable features
...if (packet_compression) { buffer_clear(&compression_buffer); buffer_uncompress(&incoming_packet, &compression_buffer); @@ -756,6 +769,7 @@ buffer_append(&incoming_packet, buffer_ptr(&compression_buffer), buffer_len(&compression_buffer)); } +#endif type = buffer_get_char(&incoming_packet); *payload_len_ptr = buffer_len(&incoming_packet); return type; @@ -849,6 +863,7 @@ buffer_consume(&incoming_packet, 4 + 1); buffer_consume_end(&incoming_packet, padlen); +#ifdef WITH_COMPRESSION DBG(debug("input: len before de-compress %d", bu...
2003 Oct 08
4
OS/390 openssh
...len); + xfree(cp); + } + else +#endif buffer_append(buffer, buf, len); } void diff -bur openssh-3.7.1p2.orig/bufaux.h openssh-3.7.1p2/bufaux.h --- openssh-3.7.1p2.orig/bufaux.h Sun Apr 27 20:01:37 2003 +++ openssh-3.7.1p2/bufaux.h Tue Oct 7 08:22:00 2003 @@ -35,6 +35,13 @@ int buffer_get_char(Buffer *); void buffer_put_char(Buffer *, int); +#ifdef CHARSET_EBCDIC +void *buffer_get_binary(Buffer *, u_int *); +void buffer_put_binary(Buffer *, const void *, u_int); +#else +#define buffer_get_binary(_buf,_len) buffer_get_string(_buf,_len) +#define buffer_put_binary(_buf,_data,_len...
2006 Nov 15
11
OpenSSH Certkey (PKI)
...u_int datalen) +monitor_valid_userblob(u_char *data, u_int datalen, u_char *name) { Buffer b; char *p; @@ -900,7 +911,7 @@ fail++; } else { p = buffer_get_string(&b, NULL); - if (strcmp("publickey", p) != 0) + if (strcmp(name, p) != 0) fail++; xfree(p); if (!buffer_get_char(&b)) @@ -992,8 +1003,11 @@ fatal("%s: bad public key blob", __func__); switch (key_blobtype) { + case MM_CERTKEY: + valid_data = monitor_valid_userblob(data, datalen, "certkey"); + break; case MM_USERKEY: - valid_data = monitor_valid_userblob(data, datalen); + v...