search for: buffer_put_string

Displaying 20 results from an estimated 24 matches for "buffer_put_string".

Did you mean: buffer_put_cstring
2003 Oct 08
4
OS/390 openssh
...&blen); + blob = buffer_get_binary(&auth->identities, &blen); *comment = buffer_get_string(&auth->identities, NULL); key = key_from_blob(blob, blen); xfree(blob); @@ -430,8 +430,8 @@ buffer_init(&msg); buffer_put_char(&msg, SSH2_AGENTC_SIGN_REQUEST); - buffer_put_string(&msg, blob, blen); - buffer_put_string(&msg, data, datalen); + buffer_put_binary(&msg, blob, blen); + buffer_put_binary(&msg, data, datalen); buffer_put_int(&msg, flags); xfree(blob); @@ -446,7 +446,7 @@ fatal("Bad authentication response: %d", type); } else...
2002 Jan 06
3
sftp/scp performance testing
Folks, I've noticed poor performance using sftp. If anyone has any advice on how to improve performance, I'd like to hear it. Test simply involved transferring a single 143MB MP3 file using defaults for all the program configs. The opensshd 3.0.2p1 server is used in all tests. Software: openssh suite 3.0.2p1 psftp (putty sftp client) latest dev snapshot pscp (putty scp client) latest
2006 Feb 16
2
PAM and passwd age warnings again.
..._append (&loginmsg, p, plen); + xfree (p); + buffer_free(&m); } diff -Naur openssh-4.2p1.old/monitor_wrap.c openssh-4.2p1.new/monitor_wrap.c --- openssh-4.2p1.old/monitor_wrap.c Sun Jul 17 03:53:31 2005 +++ openssh-4.2p1.new/monitor_wrap.c Tue Dec 20 09:09:16 2005 @@ -631,6 +631,9 @@ buffer_put_string(&m, buffer_ptr(&input), buffer_len(&input)); buffer_put_string(&m, buffer_ptr(&output), buffer_len(&output)); + /* Let's not forget our loginmsg, now, eh? */ + buffer_put_string(&m, buffer_ptr(&loginmsg), buffer_len(&loginmsg)); + mm_request_send(monito...
2008 Jan 25
1
OpenSSH for OS/390
I have been trying to compile OpenSSH_4.7p1 for OS/390 and got really stuck. IBM released a build of v3.8.1p1 several years ago, but I do not know whether anyone else has ever managed to compile it for OS/390 or OS/z. The first problem is that the build apparently performs ssh transport exchange using EBCDIC character encoding instead of ASCII (which breaks RFC 4253) and I am not sure how to do
2000 Sep 18
1
ssh-agent and ssh2 servers...
I'm not on the mailing list, so I'd appreciate it if you could cc: me, though I will keep an eye on the archives. I am running openssh 2.2.0p1 on Debian GNU/Linux. I was pleased to see that 2.2.0p1 had support for DSA keys in the agent, and I have successfully used the v2 protocol to another openssh server with the agent providing authentication. I am also able to successfully connect
2002 Jul 31
2
privsep+kerb5+ssh1
...arch */ + tkt.data = buffer_get_string(m, &len); + tkt.length = len; + + success = auth_krb5(authctxt, &tkt, &client_user, &reply); + + if (tkt.length) + xfree(tkt.data); + + buffer_clear(m); + buffer_put_int(m, success); + + if (success) { + buffer_put_cstring(m, client_user); + buffer_put_string(m, reply.data, reply.length); + if (client_user) + xfree(client_user); + if (reply.length) + xfree(reply.data); + } + mm_request_send(socket, MONITOR_ANS_KRB5, m); + + return success; +} +#endif + int mm_answer_term(int socket, Buffer *req) { --- openssh-3.4p1/monitor.h.krb Tue Jul 23 15:1...
2005 Nov 17
3
4.2 and the 'last' command
We've run into an interesting dilemma regarding last log information and ssh 4.2p1. In 3.8, we didn't see this problem, but now has cropped up in 4.2. When a user logs in, sshd seems to call 'last' to get the last log information. 'last' then opens the /var/log/wtmp file and processes the information. On some systems, this file can be quite large, and we're seeing
2002 Jan 03
3
[PATCH] Improving sftp client performance
...q + i + 1, (*num - i - 1) * sizeof(struct request)); + --*num; +} + +static void +send_request(int fd, const char *handle, u_int handle_len, int type, + const struct request *rq, Buffer *m) +{ + buffer_clear(m); + buffer_put_char(m, SSH2_FXP_READ); + buffer_put_int(m, rq->id); + buffer_put_string(m, handle, handle_len); + buffer_put_int64(m, rq->offset); + buffer_put_int(m, rq->len); + send_msg(fd, m); + debug3("Sent message SSH2_FXP_READ I:%d O:%llu S:%u", + rq->id, rq->offset, rq->len); +} + int do_init(int fd_in, int fd_out) { @@ -674,12 +721,15...
2006 Nov 15
11
OpenSSH Certkey (PKI)
...key_allowed(MM_CERTKEY, NULL, NULL, key)); +} + +int mm_user_key_allowed(struct passwd *pw, Key *key) { return (mm_key_allowed(MM_USERKEY, NULL, NULL, key)); @@ -351,6 +357,8 @@ buffer_put_cstring(&m, user ? user : ""); buffer_put_cstring(&m, host ? host : ""); buffer_put_string(&m, blob, len); + if (type == MM_CERTKEY && key && key->cert) + buffer_put_string(&m, key->cert, strlen(key->cert)); xfree(blob); mm_request_send(pmonitor->m_recvfd, MONITOR_REQ_KEYALLOWED, &m); Index: monitor_wrap.h ===================================...
2011 Feb 04
0
OpenSSH security advisory: legacy certificate signing in 5.6/5.7
...0000 1.95 +++ key.c 3 Feb 2011 06:52:33 -0000 @@ -1823,8 +1823,8 @@ buffer_put_cstring(&k->cert->certblob, key_ssh_name(k)); /* -v01 certs put nonce first */ + arc4random_buf(&nonce, sizeof(nonce)); if (!key_cert_is_legacy(k)) { - arc4random_buf(&nonce, sizeof(nonce)); buffer_put_string(&k->cert->certblob, nonce, sizeof(nonce)); }
2011 Feb 04
0
OpenSSH security advisory: legacy certificate signing in 5.6/5.7
...0000 1.95 +++ key.c 3 Feb 2011 06:52:33 -0000 @@ -1823,8 +1823,8 @@ buffer_put_cstring(&k->cert->certblob, key_ssh_name(k)); /* -v01 certs put nonce first */ + arc4random_buf(&nonce, sizeof(nonce)); if (!key_cert_is_legacy(k)) { - arc4random_buf(&nonce, sizeof(nonce)); buffer_put_string(&k->cert->certblob, nonce, sizeof(nonce)); }
2013 Nov 30
2
[Bug 2175] New: possible use after free
...ider(name, pin, &keys)) > 0) { buffer_put_char(&msg, SSH2_AGENT_IDENTITIES_ANSWER); buffer_put_int(&msg, nkeys); for (i = 0; i < nkeys; i++) { key_to_blob(keys[i], &blob, &blen) buffer_put_string(&msg, blob, blen); buffer_put_cstring(&msg, name); free(blob); add_key(keys[i], name); -- You are receiving this mail because: You are watching the assignee of the bug.
2005 Sep 21
23
[Bug 1087] SSH fails to show PAM password expiry message from LDAP on login
http://bugzilla.mindrot.org/show_bug.cgi?id=1087 djm at mindrot.org changed: What |Removed |Added ---------------------------------------------------------------------------- Group|Portable OpenSSH | ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2002 Jan 31
7
x509 for hostkeys.
...-r1.15 ssh-rsa.c --- ssh-rsa.c 25 Jan 2002 21:42:11 -0000 1.15 +++ ssh-rsa.c 31 Jan 2002 09:23:53 -0000 @@ -91,7 +91,11 @@ } /* encode signature */ buffer_init(&b); +#if 0 buffer_put_cstring(&b, "ssh-rsa"); +#else + buffer_put_cstring(&b, key_ssh_name(key)); +#endif buffer_put_string(&b, sig, slen); len = buffer_len(&b); ret = xmalloc(len);
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
...er: len+SSH2_MSG_KEXINIT */ + buffer_put_int(&b, ckexinitlen+1); + buffer_put_char(&b, SSH2_MSG_KEXINIT); + buffer_append(&b, ckexinit, ckexinitlen); + buffer_put_int(&b, skexinitlen+1); + buffer_put_char(&b, SSH2_MSG_KEXINIT); + buffer_append(&b, skexinit, skexinitlen); + + buffer_put_string(&b, serverhostkeyblob, sbloblen); + buffer_put_string(&b, client_dh_pub, CURVE25519_PUBKEY_SIZE); + buffer_put_string(&b, server_dh_pub, CURVE25519_PUBKEY_SIZE); + buffer_put_bignum2(&b, shared_secret); + +#ifdef DEBUG_KEX + buffer_dump(&b); +#endif + EVP_DigestInit(&md, evp...
2010 Jan 14
1
ssh(1) multiplexing rewrite
...->self, buffer_len(&c->input), buffer_len(&c->output), + state->conn_state); */ + + switch (state->conn_state) { + case MUX_HELLO_SEND: + buffer_init(&out); + buffer_put_int(&out, MUX_MSG_HELLO); + buffer_put_int(&out, SSHMUX_VER); + /* no extensions */ + buffer_put_string(&c->output, buffer_ptr(&out), + buffer_len(&out)); + buffer_free(&out); + state->conn_state = MUX_HELLO_WAIT; + debug3("%s: channel %d: hello sent", __func__, c->self); + ret = 0; + break; + case MUX_HELLO_WAIT: + case MUX_UP: + case MUX_SESSION: + buff...
2000 Jun 21
1
SSH 2.2.0
Yo All! I have been playing with SSH 2.2.0 from www.ssh.com. I can not connect to openssh 2.2.1p1 using Ver 2 protocol from ssh Ver 2.2.0. Ver 1 works fine. See below for the debug output from both ends If I force hmac-md5 (-m hmac-md5) from the sender it works! The other 3 choices fail: hmac-sha1; hmac-md5-96; and none. I have no problem connecting to this openssh host (hobbes) from
2002 Aug 11
4
OSF/1 or Tru64 patch for Privsep
Either this never made it to the list or no one cares about Tru64. This is the last time I'll send this patch to the list. If no one steps up and finishes it or provides me with enough information to fix any remaining bugs (one being complaint that 'ssh site cmd' does not work right). If there is no activity on this for a week. I'll post it to bugzilla and will ignore any
2009 Feb 12
2
[patch 1/3] add protocol extension to ATTR message
...ime); buffer_put_int(b, a->mtime); } + + if (flags & SSH2_FILEXFER_ATTR_EXTENDED) { + u_int ext_count = 1; + Buffer ext; + + buffer_put_int(b, ext_count); + buffer_put_cstring(b, "extattr at openssh.com"); + + buffer_init(&ext); + encode_extra_attrib(&ext, a); + buffer_put_string(b, buffer_ptr(&ext), buffer_len(&ext)); + buffer_free(&ext); + } } /* Convert from SSH2_FX_ status to text error message */ Index: ssh/sftp-common.h =================================================================== --- ssh.orig/sftp-common.h 2009-02-12 14:11:15.000000000 +0100 ++...
2015 Jul 29
2
[PATCH] ssh: Add option to present certificates on command line
...6,6 +1016,7 @@ sign_and_send_pubkey(Authctxt *authctxt, Identity *id) u_int skip = 0; int ret = -1; int have_sig = 1; + int i; char *fp; if ((fp = sshkey_fingerprint(id->key, options.fingerprint_hash, @@ -1053,6 +1054,33 @@ sign_and_send_pubkey(Authctxt *authctxt, Identity *id) } buffer_put_string(&b, blob, bloblen); + /* If the key is an input certificate, sign its private key instead. + * If no such private key exists, return failure and continue with + * other methods of authentication. + * Else, just continue with the normal signing process. */ + if (key_is_cert(id->key)) {...