Displaying 10 results from an estimated 10 matches for "dispatch_block".
Did you mean:
dispatch_back
2016 Aug 24
3
kex protocol error: type 7 seq xxx error message
...uth2(const char *local_user, const char *server_user, char *host,
Sensitive *sensitive)
{
...
ssh_dispatch_set(ssh, SSH2_MSG_EXT_INFO, &input_userauth_ext_info);
ssh_dispatch_set(ssh, SSH2_MSG_SERVICE_ACCEPT,
&input_userauth_service_accept);
ssh_dispatch_run(ssh, DISPATCH_BLOCK, &authctxt.success,
&authctxt); /* loop until success */
pubkey_cleanup(&authctxt);
ssh_dispatch_range(ssh, SSH2_MSG_USERAUTH_MIN,
SSH2_MSG_USERAUTH_MAX, NULL);
debug("Authentication succeeded (%s).", authctxt.method->name);
}
Is the only place...
2001 May 14
2
openssh-2.9p1
Hi,
1. I think you should apply the attached patch to openssh-2.9p1,
otherwise ssh-keyscan on linux boxes with glibc-2.1 will experience enormous
timeout delays.
2. Is there a program like ssh-keyscan for the Version2 (dsa and rsa) keys??
regards
Peter Breitenlohner <peb at mppmu.mpg.de>
-------------- next part --------------
diff -ur openssh-2.9p1.orig/ssh-keyscan.c
2016 Sep 21
3
Where to look next?
Thanks for your suggestion! It seems to have gone a little further this time, but isn't accepting the key and is failing back on password-based auth.
We're double-checking that the public key was correctly configured with the account, and also trying a DSA key to see if it behaves differently.
Is there anything you'd suggest we look at or try at this point, and thank you very much
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
...+ enable_compat20();
+ myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = c->c_keytype == KT_DSA?
+ "ssh-dss": "ssh-rsa";
+ c->c_kex = kex_setup(myproposal);
+ c->c_kex->verify_host_key = hostjump;
+
+ if (!(j = setjmp(kexjmp))) {
+ nonfatal_fatal = 1;
+ dispatch_run(DISPATCH_BLOCK, &c->c_kex->done, c->c_kex);
+ fprintf(stderr, "Impossible! dispatch_run() returned!\n");
+ exit(1);
+ }
+ nonfatal_fatal = 0;
+ xfree(c->c_kex);
+ c->c_kex = NULL;
+ packet_close();
+ if (j < 0)
+ j = 0;
- fprintf(stdout, "%s ", output_name ? output_n...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string
client_version_string.
These are used just in a few functions and can easily be passed as
parameters.
Also, there is a strange construct, where their memory is allocated to
the global pointers, then copies of these pointers are assigned to the
kex structure. The kex_free finally frees them via cleanup of the kex
2002 Apr 26
0
PAM keyboard-interactive
...* Grabbing control of execution and spinning until we get what
- * we want is probably rude, but it seems to work properly, and
- * the client *should* be in lock-step with us, so the loop should
- * only be traversed once.
- */
- while(context_pam2.finished == 0) {
- done = 1;
- dispatch_run(DISPATCH_BLOCK, &done, appdata_ptr);
- if(context_pam2.finished == 0)
- debug("extra packet during conversation");
- }
-
- if(context_pam2.num_received == context_pam2.num_expected) {
- *resp = context_pam2.responses;
- return PAM_SUCCESS;
- } else
- return PAM_CONV_ERR;
-}
-
-void
-input_user...
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...interactive
*/
if (options.challenge_response_authentication)
options.kbd_interactive_authentication = 1;
@@ -125,7 +150,7 @@
dispatch_init(&dispatch_protocol_error);
dispatch_set(SSH2_MSG_SERVICE_REQUEST,
&input_service_request);
dispatch_run(DISPATCH_BLOCK, &authctxt->success, authctxt);
- - do_authenticated(authctxt);
+ do_authenticated(authctxt, realname);
}
static void
@@ -403,6 +428,13 @@
u_int alen, blen, slen;
int have_sig, pktype;
int authenticated = 0;
+
+ char realname[40] = "UNKNOWN&q...
2002 Jul 02
3
New PAM kbd-int diff
...s to work properly, and
- * the client *should* be in lock-step with us, so the loop should
- * only be traversed once.
+ * Can't switch this on until we can handle multiple passes through
+ * the conversation function
*/
- while(context_pam2.finished == 0) {
- done = 1;
- dispatch_run(DISPATCH_BLOCK, &done, appdata_ptr);
- if (context_pam2.finished == 0)
- debug("extra packet during conversation");
- }
-
- if (context_pam2.num_received == context_pam2.num_expected) {
- *resp = context_pam2.responses;
- return PAM_SUCCESS;
- } else
- return PAM_CONV_ERR;
+ err = pam_acct_mgm...
2002 Jun 25
4
PAM kbd-int with privsep
...we want is probably rude, but it seems to work properly, and
- * the client *should* be in lock-step with us, so the loop should
- * only be traversed once.
+ * Can't switch this on until we can handle multiple queries
*/
- while(context_pam2.finished == 0) {
- done = 1;
- dispatch_run(DISPATCH_BLOCK, &done, appdata_ptr);
- if(context_pam2.finished == 0)
- debug("extra packet during conversation");
- }
+ err = pam_acct_mgmt(sshpamh, 0);
+ if (err == PAM_NEW_AUTHTOK_REQD)
+ err = pam_chauthtok(sshpamh, PAM_CHANGE_EXPIRED_AUTHTOK);
+ if (err != PAM_SUCCESS)
+ goto auth_fail;
+#...
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |