Displaying 3 results from an estimated 3 matches for "kexc25519_shared_key".
2014 Apr 18
2
[Bug 2232] New: curve25519-sha256@libssh.org Signature Failures When 'ssh' Used with Dropbear, libssh Servers
...here: https://red.libssh.org/issues/159.
  My understanding of the actual bug is that OpenSSH is generating the
  shared secret bignum value 'K' in a way that is not expected by other
  implementations.
  I believe the problem is in 'buffer_put_bignum2_from_string' (used by
  'kexc25519_shared_key'), as is mentioned here on the mailing list,
  with a patch to bufaux.c to fix:
    http://marc.info/?l=openssh-unix-dev&m=139699836815285&w=2
  Some test results between a patched OpenSSH client and a libssh-based
  server are in the above libssh bug link, and they suggest that the...
2014 Apr 18
3
[Bug 2233] New: curve25519-sha256@libssh.org Signature Failures When 'sshd' Used with Dropbear Clients
...here: https://red.libssh.org/issues/159.
  My understanding of the actual bug is that OpenSSH is generating the
  shared secret bignum value 'K' in a way that is not expected by other
  implementations.
  I believe the problem is in 'buffer_put_bignum2_from_string' (used by
  'kexc25519_shared_key'), as is mentioned here on the mailing list,
  with a patch to bufaux.c to fix:
    http://marc.info/?l=openssh-unix-dev&m=139699836815285&w=2
  With the bufaux.c patch applied, I am no longer able to reproduce
  the failure.
  I believe this bug affects interop of 'curve25519-sh...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string 
client_version_string.
These are used just in a few functions and can easily be passed as 
parameters.
Also, there is a strange construct, where their memory is  allocated to 
the global pointers, then copies of these pointers are assigned to the 
kex structure. The kex_free finally frees them via cleanup of the kex