Displaying 6 results from an estimated 6 matches for "buffer_put_bignum2_from_str".
2014 Apr 08
1
buffer_put_bignum2_from_string question
Hello,
I have question about buffer_put_bignum2_from_string
function used in kexc25519.c in (OpenSSH >= 6.5)
Is it 1:1 replacement for formating bignums from OpenSSL?
If yes, then buffer_put_bignum2_from_string
has different results for numbers starting with zeros.
How to reproduce:
shared_key[CURVE25519_SIZE] = "\0\0\1\1\1\1\1\1\1\1\1\1\1\1\...
2014 Mar 06
2
Without OpenSSL?
Quoth Iain:
>I'm not sure if the work being done to allow OpenSSH to be built without OpenSSL includes SHA-1 support.
Hi Iain. I haven't heard of this effort before. Can you give a few more details?
Thanks,
ScottN
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |
2014 Apr 18
2
[Bug 2232] New: curve25519-sha256@libssh.org Signature Failures When 'ssh' Used with Dropbear, libssh Servers
....
Additional Information:
Originally discovered here: https://red.libssh.org/issues/159.
My understanding of the actual bug is that OpenSSH is generating the
shared secret bignum value 'K' in a way that is not expected by other
implementations.
I believe the problem is in 'buffer_put_bignum2_from_string' (used by
'kexc25519_shared_key'), as is mentioned here on the mailing list,
with a patch to bufaux.c to fix:
http://marc.info/?l=openssh-unix-dev&m=139699836815285&w=2
Some test results between a patched OpenSSH client and a libssh-based
server are in the above...
2014 Apr 18
3
[Bug 2233] New: curve25519-sha256@libssh.org Signature Failures When 'sshd' Used with Dropbear Clients
....
Additional Information:
Originally discovered here: https://red.libssh.org/issues/159.
My understanding of the actual bug is that OpenSSH is generating the
shared secret bignum value 'K' in a way that is not expected by other
implementations.
I believe the problem is in 'buffer_put_bignum2_from_string' (used by
'kexc25519_shared_key'), as is mentioned here on the mailing list,
with a patch to bufaux.c to fix:
http://marc.info/?l=openssh-unix-dev&m=139699836815285&w=2
With the bufaux.c patch applied, I am no longer able to reproduce
the failure.
I believe t...
2014 Apr 20
2
bad bignum encoding for curve25519-sha256@libssh.org
...000 1.63
@@ -1,4 +1,4 @@
-/* $OpenBSD: bufaux.c,v 1.56 2014/02/02 03:44:31 djm Exp $ */
+/* $OpenBSD: bufaux.c,v 1.57 2014/04/16 23:22:45 djm Exp $ */
/*
* Author: Tatu Ylonen <ylo at cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo at cs.hut.fi>, Espoo, Finland
@@ -372,6 +372,9 @@ buffer_put_bignum2_from_string(Buffer *b
if (l > 8 * 1024)
fatal("%s: length %u too long", __func__, l);
+ /* Skip leading zero bytes */
+ for (; l > 0 && *s == 0; l--, s++)
+ ;
p = buf = xmalloc(l + 1);
/*
* If most significant bit is set then prepend a zero byte to
2018 Jun 08
4
vanilla build of 7.7p1 release on linux/4.17 fails with gcc8 @ "/usr/bin/ld: unrecognized option '-Wl,-z,retpolineplt'"
On 8 June 2018 at 11:21, PGNet Dev <pgnet.dev at gmail.com> wrote:
> fyi
>
> add'l -- and looks unrelated -- issue
> /usr/include/pthread.h:251:12: note: previous declaration of ?pthread_join? was here
> extern int pthread_join (pthread_t __th, void **__thread_return);
What included pthread.h? That's explicitly not supported by sshd:
$ grep THREAD