Displaying 5 results from an estimated 5 matches for "hostkey_type".
2013 Jun 25
1
RFC: encrypted hostkeys patch
..._char **, u_int *, u_char *, u_int);
void (*kex[KEX_MAX])(Kex *);
};
diff --git a/kexdhs.c b/kexdhs.c
index 1512863..f6d43f2 100644
--- a/kexdhs.c
+++ b/kexdhs.c
@@ -80,9 +80,6 @@ kexdh_server(Kex *kex)
if (server_host_public == NULL)
fatal("Unsupported hostkey type %d", kex->hostkey_type);
server_host_private = kex->load_host_private_key(kex->hostkey_type);
- if (server_host_private == NULL)
- fatal("Missing private key for hostkey type %d",
- kex->hostkey_type);
/* key, cert */
if ((dh_client_pub = BN_new()) == NULL)
@@ -144,9 +141,8 @@ kexdh_serve...
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
...SH2_MSG_KEX_ECDH_REPLY);
+
+ /* hostkey */
+ server_host_key_blob = packet_get_string(&sbloblen);
+ server_host_key = key_from_blob(server_host_key_blob, sbloblen);
+ if (server_host_key == NULL)
+ fatal("cannot decode server_host_key_blob");
+ if (server_host_key->type != kex->hostkey_type)
+ fatal("type mismatch for decoded server_host_key_blob");
+ if (kex->verify_host_key == NULL)
+ fatal("cannot verify server_host_key");
+ if (kex->verify_host_key(server_host_key) == -1)
+ fatal("server_host_key verification failed");
+
+ /* Q_S, server publ...
2012 Nov 24
0
ssh-keyscan continuity patch --
...y alg request from %.200s", client, get_remote_ipaddr());
+ else
+ fatal("no '%.100s' hostkey alg(s) for %.200s", client, get_remote_ipaddr());
+ }
+/*
+ * Note that if KEY_UNSPEC is returned, BOTH the client and the server
+ * have the same bad key string.
+ */
k->hostkey_type = key_type_from_name(hostkeyalg);
if (k->hostkey_type == KEY_UNSPEC)
- fatal("bad hostkey alg '%s'", hostkeyalg);
+ fatal("unknown hostkey alg '%s'", hostkeyalg);
xfree(hostkeyalg);
}
diff -u openssh-6.1p1/packet.c.orig openssh-6.1p1/packet.c
--- open...
2003 Oct 08
4
OS/390 openssh
...sponse = buffer_get_string(m, &len);
+ response = buffer_get_binary(m, &len);
if (len != 16)
fatal("%s: received bad response to challenge", __func__);
success = auth_rsa_verify_response(key, ssh1_challenge, response);
@@ -1550,11 +1550,11 @@
kex->server = 1;
kex->hostkey_type = buffer_get_int(m);
kex->kex_type = buffer_get_int(m);
- blob = buffer_get_string(m, &bloblen);
+ blob = buffer_get_binary(m, &bloblen);
buffer_init(&kex->my);
buffer_append(&kex->my, blob, bloblen);
xfree(blob);
- blob = buffer_get_string(m, &bloblen);
+ blob...
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |