Displaying 9 results from an estimated 9 matches for "iqmp".
Did you mean:
imp
2017 Jun 19
1
OpenSSL 1.1.0 support and RSA_set0_key() double frees?
...at line 3344:
http://pkgs.fedoraproject.org/cgit/rpms/openssh.git/tree/openssh-7.3p1-openssl-1.1.0.patch#n3344
as shown in the below snippet:
/* calculate p-1 and q-1 */
- if ((r = rsa_generate_additional_parameters(prv->rsa)) != 0)
+ if ((r = rsa_generate_additional_parameters(prv->rsa, iqmp)) != 0)
+ BN_free(iqmp);
goto out;
/* enable blinding */
FYI,
venkat
2000 Jul 19
2
Why do I *still* need RSA?
OpenSSH Developers,
I'm researching whether or not OpenSSH is a viable commercial
alternative to F-SECURE SSH or SSH.COM's ssh, but I'm not getting the
kind of results that I expected from a "Non patent encumbered ssh
client".
When I attempt to build OpenSSH against an OpenSSL build without rc5,
idea, or rsa it bombs since OpenSSL doesn't place the header files in
the
2002 Apr 24
2
RSA_verify question on OpenSSH Client w/ OpenSSL0.9.6a
...0000001
0x198b820: 0x0198b780 0x00000000
0x00000000 0x00000000
0x198b830: 0x00000000 0x00000000
0x00000000 0x00000000
(gdb) p *rsa
$3 = {pad = 0, version = 0, meth = 0x195bb1c, n =
0x199d480, e = 0x199d3c0,
d = 0x0, p = 0x0, q = 0x0, dmp1 = 0x0, dmq1 = 0x0,
iqmp = 0x0, ex_data = {
sk = 0x0, dummy = 1848469362}, references = 1,
flags = 6,
_method_mod_n = 0x0, _method_mod_p = 0x0,
_method_mod_q = 0x0,
bignum_data = 0x0, blinding = 0x0}
(gdb) x/40x 0x199d480
0x199d480: 0x0199d4a0 0x00000001
0x00000001 0x00000000
0x199d490: 0x0...
2005 May 19
1
ssh-keygen private keys export - new feature
...+ buffer_put_bignum_bits(&b, key->dsa->priv_key);
+ break;
+ case KEY_RSA:
+ buffer_put_bignum_bits(&b, key->rsa->e);
+ buffer_put_bignum_bits(&b, key->rsa->d);
+ buffer_put_bignum_bits(&b, key->rsa->n);
+ buffer_put_bignum_bits(&b, key->rsa->iqmp);
+ buffer_put_bignum_bits(&b, key->rsa->q);
+ buffer_put_bignum_bits(&b, key->rsa->p);
+ break;
+ }
+ len = buffer_len(&b);
+ if (lenp != NULL)
+ *lenp = len;
+ pb = buffer_ptr(&b);
+ PUT_32BIT(pb + 4, len);
+ PUT_32BIT(pb + len1, len - len1 - 4);
+ PUT_32BIT(pb + l...
2012 Jan 28
1
PATCH: Support for encrypted host keys
..."log.h"
+#include "key.h"
+#include "rsa.h"
+
+static void
+buffer_put_key_rsa(Buffer *buffer, const RSA *key)
+{
+ buffer_put_bignum(buffer, key->e);
+ buffer_put_bignum(buffer, key->n);
+ buffer_put_bignum(buffer, key->d);
+ buffer_put_bignum(buffer, key->iqmp);
+ buffer_put_bignum(buffer, key->p);
+ buffer_put_bignum(buffer, key->q);
+}
+
+static void
+buffer_get_key_rsa(Buffer *buffer, RSA *key)
+{
+ buffer_get_bignum(buffer, key->e);
+ buffer_get_bignum(buffer, key->n);
+ buffer_get_bignum(buffer, key->d);
+ buffer_get_bignum(buffer, ke...
2016 Dec 28
2
certificates keys on pkcs11 devices
Hi,
I have not found any way to use a Certificate with ssh-agent when my Key is
stored on a pkcs11 device. I can add my key with
ssh-add -s /usr/local/lib/opensc-pkcs11.so
but
ssh-add -s /usr/local/lib/opensc-pkcs11.so ~/.ssh/mykey-cert.pub
does not add the certificate to my agent. As far as I undestand, in
ssh-add.c line 580
if (pkcs11provider != NULL) {
if (update_card(agent_fd,
2015 Jul 26
2
[PATCH] ssh-agent: Add support to load additional certificates
...nt
+sshkey_is_private(const struct sshkey *k)
+{
+ switch (k->type) {
+#ifdef WITH_OPENSSL
+ case KEY_RSA1:
+ case KEY_RSA:
+ case KEY_RSA_CERT_V00:
+ case KEY_RSA_CERT:
+ if (k->rsa && k->rsa->d && k->rsa->q && k->rsa->p &&
+ k->rsa->iqmp &&
+ !BN_is_zero(k->rsa->d) &&
+ !BN_is_zero(k->rsa->q) &&
+ !BN_is_zero(k->rsa->p) &&
+ !BN_is_zero(k->rsa->iqmp))
+ return 1;
+ break;
+ case KEY_DSA:
+ case KEY_DSA_CERT_V00:
+ case KEY_DSA_CERT:
+ if (k->dsa && k-&g...
2015 Apr 26
7
[Bug 2390] New: PROTOCOL.key mis-describes private section
...e entire 'encrypted' section in this key
looks like this:
uint32 0x92773013 (checkint)
uint32 0x92773013 (checkint again)
string "ssh-rsa"
mpint modulus
mpint 0x10001 (public exponent)
mpint private exponent
mpint iqmp
mpint p
mpint q
string "simon at resolution" (key comment)
data 0x01 0x02 0x03 (padding)
so you can see that a decoder of this format has to see "ssh-rsa" and
know that that means six mpints follow, otherwise they cannot know
where to fin...
2005 Nov 17
3
4.2 and the 'last' command
We've run into an interesting dilemma regarding last log information and
ssh 4.2p1. In 3.8, we didn't see this problem, but now has cropped up
in 4.2.
When a user logs in, sshd seems to call 'last' to get the last log
information. 'last' then opens the /var/log/wtmp file and processes the
information. On some systems, this file can be quite large, and we're
seeing