Displaying 11 results from an estimated 11 matches for "kex_setup".
Did you mean:
ez_setup
2002 Jun 18
2
kex_reset_dispatch()
Hi All,
kex_reset_dispatch() function is called in kex_setup() function at the
start of the key exchange. But kex_reset_dispatch() is called again
in kex_finish(). Why is it needed ?
Regards
DSA
_________________________________________________________________
Send and receive Hotmail on your mobile device: http://mobile.msn.com
2007 Jan 08
0
How to remove group1 and group14 from OpenSSH..
..."diffie-hellman-group-exchange-sha1," \
"diffie-hellman-group14-sha1," \
"diffie-hellman-group1-sha1"
CHANGE TO
#define KEX_DEFAULT_KEX "diffie-hellman-group-exchange-sha256," \
"diffie-hellman-group-exchange-sha1"
IN sshd.c
kex = kex_setup(myproposal);
kex->kex[KEX_DH_GRP1_SHA1] = kexdh_server;
kex->kex[KEX_DH_GRP14_SHA1] = kexdh_server;
kex->kex[KEX_DH_GEX_SHA1] = kexgex_server;
kex->kex[KEX_DH_GEX_SHA256] = kexgex_server;
kex->server = 1;
CHANGE TO
kex = kex_setup(myproposal);
kex->kex[KEX_DH_GEX_SHA1] = kexgex...
2008 Sep 15
0
No subject
...in key_ssh_name
?in KEY_RSA
in buffer_append
in buffer_append_space
in buffer_len
in buffer_append
in buffer_append_space
?in key_ssh_name
?in KEY_DSA
in buffer_append
in buffer_append_space
in buffer_append
in buffer_append_space
in buffer_ptr
in buffer_free
list_hostkey_types: ssh-rsa,ssh-dss
?in kex_setup
in buffer_init
in buffer_init
?before kex_send_kexinit
in buffer_len
kex_send_kexinit: kex proposal too short
?len=0
in buffer_ptr
packet_start[20]
in buffer_clear
in buffer_append
in buffer_append_space
in buffer_ptr
in buffer_len
in buffer_append
in buffer_append_space
in buffer_ptr
in buffer_ptr...
2008 Sep 18
2
SSHD_PROBLEM
...in key_ssh_name
in KEY_RSA
in buffer_append
in buffer_append_space
in buffer_len
in buffer_append
in buffer_append_space
in key_ssh_name
in KEY_DSA
in buffer_append
in buffer_append_space
in buffer_append
in buffer_append_space
in buffer_ptr
in buffer_free
list_hostkey_types: ssh-rsa,ssh-dss
in kex_setup
in buffer_init
in buffer_init
before kex_send_kexinit
in buffer_len
kex_send_kexinit: kex proposal too short
len=0
in buffer_ptr
packet_start[20]
in buffer_clear
in buffer_append
in buffer_append_space
in buffer_ptr
in buffer_len
in buffer_append
in buffer_append_space
in buffer_ptr
in buffer_ptr...
2012 Dec 17
15
[Bug 2052] New: Memory leak when SSH login and logout
...ry using
xstrdup call and this was not freeed.
2, In function input_userauth_request(from line no 299) we allocate
memory using xstrdup call and this was not freeed.
3, In Function list_hostkey_types (from line no 825) we allocate memory
using xstrdup call and this was not freeed.
4, In function kex_setup (line no : 246) we allocate memory using
buffer_init call and this was not freeed.
5, In Function channel_new (line no :332) allocate memory using xstrdup
call and this was not freeed.
6, In function channel_new (line no:317) we allocate memory using
buffer_init call and this was not freeed.
If...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string
client_version_string.
These are used just in a few functions and can easily be passed as
parameters.
Also, there is a strange construct, where their memory is allocated to
the global pointers, then copies of these pointers are assigned to the
kex structure. The kex_free finally frees them via cleanup of the kex
2001 May 14
2
openssh-2.9p1
Hi,
1. I think you should apply the attached patch to openssh-2.9p1,
otherwise ssh-keyscan on linux boxes with glibc-2.1 will experience enormous
timeout delays.
2. Is there a program like ssh-keyscan for the Version2 (dsa and rsa) keys??
regards
Peter Breitenlohner <peb at mppmu.mpg.de>
-------------- next part --------------
diff -ur openssh-2.9p1.orig/ssh-keyscan.c
2007 Mar 14
1
sshd gets stuck: select() in packet_read_seqnr waits indefinitely
...ce:
(gdb) where
#0 0x.. in select () from /lib/libc.so.6
#1 0x.. in packet_read_seqnr () from /usr/lib/libssh.so.3
#2 0x.. in packet_read () from /usr/lib/libssh.so.3
#3 0x.. in packet_read_expect () from /usr/lib/libssh.so.3
#4 0x.. in kexgex_server (kex=0x538900) at kexgexs.c:99
#5 0x.. in kex_setup () from /usr/lib/libssh.so.3
#6 0x.. in kex_input_kexinit () from /usr/lib/libssh.so.3
#7 0x.. in dispatch_run () from /usr/lib/libssh.so.3
#8 0x.. in process_buffered_input_packets () at serverloop.c:475
#9 0x.. in server_loop2 (authctxt=0x4) at serverloop.c:760
#10 0x.. in do_authenticated2 (...
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
...+ default:
+ break;
+ }
+ return 0;
+}
+
+static Key *
+keygrab_ssh2(con *c)
+{
+ int j;
+
+ packet_set_connection(c->c_fd, c->c_fd);
+ enable_compat20();
+ myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = c->c_keytype == KT_DSA?
+ "ssh-dss": "ssh-rsa";
+ c->c_kex = kex_setup(myproposal);
+ c->c_kex->verify_host_key = hostjump;
+
+ if (!(j = setjmp(kexjmp))) {
+ nonfatal_fatal = 1;
+ dispatch_run(DISPATCH_BLOCK, &c->c_kex->done, c->c_kex);
+ fprintf(stderr, "Impossible! dispatch_run() returned!\n");
+ exit(1);
+ }
+ nonfatal_fatal = 0;
+...
2007 Sep 17
18
[Bug 1363] New: sshd gets stuck: select() in packet_read_seqnr waits indefinitely
...ce:
(gdb) where
#0 0x.. in select () from /lib/libc.so.6
#1 0x.. in packet_read_seqnr () from /usr/lib/libssh.so.3
#2 0x.. in packet_read () from /usr/lib/libssh.so.3
#3 0x.. in packet_read_expect () from /usr/lib/libssh.so.3
#4 0x.. in kexgex_server (kex=0x538900) at kexgexs.c:99
#5 0x.. in kex_setup () from /usr/lib/libssh.so.3
#6 0x.. in kex_input_kexinit () from /usr/lib/libssh.so.3
#7 0x.. in dispatch_run () from /usr/lib/libssh.so.3
#8 0x.. in process_buffered_input_packets () at serverloop.c:475
#9 0x.. in server_loop2 (authctxt=0x4) at serverloop.c:760
#10 0x.. in do_authenticated2 (...
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |