Displaying 4 results from an estimated 4 matches for "do_ssh1_kex".
2000 Dec 27
1
patch to support hurd-i386.
...un Oct 29 16:44:50 2000
@@ -140,7 +140,7 @@
int session_id2_len = 0;
/* record remote hostname or ip */
-unsigned int utmp_len = MAXHOSTNAMELEN;
+unsigned int utmp_len = 256; /* bigger than LI_HOSTSIZE makes no sense */
/* Prototypes for various functions defined later in this file. */
void do_ssh1_kex();
--
Debian Developer and Quality Assurance Team Member
1024/26CC7853 31E6 A8CA 68FC 284F 7D16 63EC A9E6 67FF 26CC 7853
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 242 bytes
Desc: not avail...
2002 Aug 30
1
LIBCRYPTO?
..._num_bits'
/opt/uClinux-dist/user/ssh/sshd.c:599: undefined reference to `BN_num_bits'
/.../ssh/sshd.c:603: undefined reference to `BN_num_bits'
/.../ssh/sshd.c:664: undefined reference to `RSA_new'
/.../ssh/sshd.c:665: undefined reference to `RSA_new'
sshd.elf2flt: In function `do_ssh1_kex':
/.../ssh/sshd.c:1077: undefined reference to `BN_num_bits'
/opt/uClinux-dist/user/ssh/sshd.c:1082: undefined reference to
`BN_num_bits'
/.../ssh/sshd.c:1122: undefined reference to `BN_num_bits'
/opt/uClinux-dist/user/ssh/sshd.c:1122: undefined reference to
`BN_num_bits'
/.../...
2013 Jun 25
1
RFC: encrypted hostkeys patch
..._connection();
/* perform the key exchange */
/* authenticate user and start session */
if (compat20) {
do_ssh2_kex();
do_authentication2(authctxt);
+ if (!use_privsep && auth_conn) {
+ ssh_close_authentication_connection(auth_conn);
+ auth_conn = NULL;
+ }
} else {
do_ssh1_kex();
do_authentication(authctxt);
@@ -2336,6 +2390,23 @@ do_ssh1_kex(void)
packet_write_wait();
}
+static void
+kex_server_sign(Key *privkey, Key *pubkey, u_char **signature, u_int *slen,
+ u_char *data, u_int dlen)
+{
+ if (privkey) {
+ if (PRIVSEP(key_sign(privkey, signature, slen, data...
2003 Oct 28
2
Privilege separation
...cation messages */
buffer_init(&loginmsg);
+#ifndef DISABLE_PRIVSEP
if (use_privsep)
if ((authctxt = privsep_preauth()) != NULL)
goto authenticated;
+#endif /* DISABLE_PRIVSEP */
/* perform the key exchange */
/* authenticate user and start session */
@@ -1481,6 +1489,7 @@
do_ssh1_kex();
authctxt = do_authentication();
}
+#ifndef DISABLE_PRIVSEP
/*
* If we use privilege separation, the unprivileged child transfers
* the current keystate and exits
@@ -1501,6 +1510,7 @@
if (!compat20)
destroy_sensitive_data();
}
+#endif /* DISABLE_PRIVSEP */
/* Perform se...