Displaying 3 results from an estimated 3 matches for "kexc25519_shared_key".
2014 Apr 18
2
[Bug 2232] New: curve25519-sha256@libssh.org Signature Failures When 'ssh' Used with Dropbear, libssh Servers
...here: https://red.libssh.org/issues/159.
My understanding of the actual bug is that OpenSSH is generating the
shared secret bignum value 'K' in a way that is not expected by other
implementations.
I believe the problem is in 'buffer_put_bignum2_from_string' (used by
'kexc25519_shared_key'), as is mentioned here on the mailing list,
with a patch to bufaux.c to fix:
http://marc.info/?l=openssh-unix-dev&m=139699836815285&w=2
Some test results between a patched OpenSSH client and a libssh-based
server are in the above libssh bug link, and they suggest that the...
2014 Apr 18
3
[Bug 2233] New: curve25519-sha256@libssh.org Signature Failures When 'sshd' Used with Dropbear Clients
...here: https://red.libssh.org/issues/159.
My understanding of the actual bug is that OpenSSH is generating the
shared secret bignum value 'K' in a way that is not expected by other
implementations.
I believe the problem is in 'buffer_put_bignum2_from_string' (used by
'kexc25519_shared_key'), as is mentioned here on the mailing list,
with a patch to bufaux.c to fix:
http://marc.info/?l=openssh-unix-dev&m=139699836815285&w=2
With the bufaux.c patch applied, I am no longer able to reproduce
the failure.
I believe this bug affects interop of 'curve25519-sh...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string
client_version_string.
These are used just in a few functions and can easily be passed as
parameters.
Also, there is a strange construct, where their memory is allocated to
the global pointers, then copies of these pointers are assigned to the
kex structure. The kex_free finally frees them via cleanup of the kex