Displaying 15 results from an estimated 15 matches for "kexgexc".
2014 Mar 07
12
[Bug 2209] New: Problem logging into Cisco devices under 6.5p1 (kexgexc.c)
https://bugzilla.mindrot.org/show_bug.cgi?id=2209
Bug ID: 2209
Summary: Problem logging into Cisco devices under 6.5p1
(kexgexc.c)
Product: Portable OpenSSH
Version: 6.5p1
Hardware: amd64
OS: FreeBSD
Status: NEW
Severity: normal
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
Reporter: openssh at...
2018 Jun 08
4
vanilla build of 7.7p1 release on linux/4.17 fails with gcc8 @ "/usr/bin/ld: unrecognized option '-Wl,-z,retpolineplt'"
On 8 June 2018 at 11:21, PGNet Dev <pgnet.dev at gmail.com> wrote:
> fyi
>
> add'l -- and looks unrelated -- issue
> /usr/include/pthread.h:251:12: note: previous declaration of ?pthread_join? was here
> extern int pthread_join (pthread_t __th, void **__thread_return);
What included pthread.h? That's explicitly not supported by sshd:
$ grep THREAD
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string
client_version_string.
These are used just in a few functions and can easily be passed as
parameters.
Also, there is a strange construct, where their memory is allocated to
the global pointers, then copies of these pointers are assigned to the
kex structure. The kex_free finally frees them via cleanup of the kex
2015 Feb 28
3
SAP-2015-3-1 issues
....o dns.o entropy.o gss-genr.o umac.o umac128.o ssh-pkcs11.o smult_curve25519_ref.o poly1305.o chacha.o cipher-chachapoly.o ssh-ed25519.o digest-openssl.o digest-libc.o hmac.o sc25519.o ge25519.o fe25519.o ed25519.o verify.o hash.o blocks.o kex.o kexdh.o kexgex.o kexecdh.o kexc25519.o kexdhc.o kexgexc.o kexecdhc.o kexc25519c.o kexdhs.o kexgexs.o kexecdhs.o kexc25519s.o
r - ssh_api.o
r - ssherr.o
r - sshbuf.o
r - sshkey.o
r - sshbuf-getput-basic.o
r - sshbuf-misc.o
r - sshbuf-getput-crypto.o
r - krl.o
r - bitmap.o
r - authfd.o
r - authfile.o
r - bufaux.o
r - bufbn.o
r - bufec.o
r - buffer.o
r -...
2006 Nov 15
11
OpenSSH Certkey (PKI)
..._DHGEX_SHA256 "diffie-hellman-group-exchange-sha256"
+#define KEX_DHGEX_CERT "diffie-hellman-group-exchange-cert"
#define COMP_NONE 0
#define COMP_ZLIB 1
@@ -62,6 +63,7 @@
KEX_DH_GRP14_SHA1,
KEX_DH_GEX_SHA1,
KEX_DH_GEX_SHA256,
+ KEX_DH_GEX_CERT,
KEX_MAX
};
Index: kexgexc.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/kexgexc.c,v
retrieving revision 1.11
diff -u -r1.11 kexgexc.c
--- kexgexc.c 6 Nov 2006 21:25:28 -0000 1.11
+++ kexgexc.c 15 Nov 2006 14:14:33 -0000
@@ -124,8 +124,6 @@
fatal("type mismatch f...
2003 Oct 08
4
OS/390 openssh
...&b, SSH2_MSG_KEXINIT);
buffer_append(&b, skexinit, skexinitlen);
- buffer_put_string(&b, serverhostkeyblob, sbloblen);
+ buffer_put_binary(&b, serverhostkeyblob, sbloblen);
if (min == -1 || max == -1)
buffer_put_int(&b, wantbits);
else {
diff -bur openssh-3.7.1p2.orig/kexgexc.c openssh-3.7.1p2/kexgexc.c
--- openssh-3.7.1p2.orig/kexgexc.c Mon Feb 24 02:06:32 2003
+++ openssh-3.7.1p2/kexgexc.c Tue Oct 7 08:22:01 2003
@@ -108,7 +108,7 @@
packet_read_expect(SSH2_MSG_KEX_DH_GEX_REPLY);
/* key, cert */
- server_host_key_blob = packet_get_string(&sbloblen);
+ server...
2004 Oct 03
3
[PATCH] PreferAskpass in ssh_config
...1.265
diff -u -r1.265 Makefile.in
--- Makefile.in 30 Aug 2004 11:33:02 -0000 1.265
+++ Makefile.in 3 Oct 2004 10:58:49 -0000
@@ -70,7 +70,7 @@
atomicio.o key.o dispatch.o kex.o mac.o uidswap.o uuencode.o misc.o \
monitor_fdpass.o rijndael.o ssh-dss.o ssh-rsa.o dh.o kexdh.o \
kexgex.o kexdhc.o kexgexc.o scard.o msg.o progressmeter.o dns.o \
- entropy.o scard-opensc.o gss-genr.o
+ entropy.o scard-opensc.o gss-genr.o readconf.o
SSHOBJS= ssh.o readconf.o clientloop.o sshtty.o \
sshconnect.o sshconnect1.o sshconnect2.o
Index: readconf.c
==========================================================...
2024 Aug 06
1
[PATCH] Add SM3 secure hash algorithm
...s11.o smult_curve25519_ref.o \
poly1305.o chacha.o cipher-chachapoly.o cipher-chachapoly-libcrypto.o \
- ssh-ed25519.o digest-openssl.o digest-libc.o \
+ ssh-ed25519.o digest-openssl.o digest-libc.o sm3.o \
hmac.o ed25519.o hash.o \
kex.o kex-names.o kexdh.o kexgex.o kexecdh.o kexc25519.o \
kexgexc.o kexgexs.o \
diff --git a/configure.ac b/configure.ac
index 016c96472d15..00bb4132adb7 100644
--- a/configure.ac
+++ b/configure.ac
@@ -3067,7 +3067,7 @@ if test "x$openssl" = "xyes" ; then
)
# Check for various EVP support in OpenSSL
- AC_CHECK_FUNCS([EVP_sha256 EVP_sha3...
2006 Aug 30
30
Testing for the 4.4p1 release
Hi,
The 4.4p1 release is approaching now, so we are now asking people to
actively test snapshots or CVS and report back to the mailing list.
Snapshots are available from http://www.mindrot.org/openssh_snap or
from any of the mirrors listed on http://www.openssh.org/portable.html
The latter page also includes instructions for checking out portable
OpenSSH via anonymous CVS.
This release
2024 Aug 07
1
[PATCH] Add SM3 secure hash algorithm
...> poly1305.o chacha.o cipher-chachapoly.o cipher-chachapoly-libcrypto.o \
> - ssh-ed25519.o digest-openssl.o digest-libc.o \
> + ssh-ed25519.o digest-openssl.o digest-libc.o sm3.o \
> hmac.o ed25519.o hash.o \
> kex.o kex-names.o kexdh.o kexgex.o kexecdh.o kexc25519.o \
> kexgexc.o kexgexs.o \
> diff --git a/configure.ac b/configure.ac
> index 016c96472d15..00bb4132adb7 100644
> --- a/configure.ac
> +++ b/configure.ac
> @@ -3067,7 +3067,7 @@ if test "x$openssl" = "xyes" ; then
> )
>
> # Check for various EVP support in OpenS...
2007 Mar 23
7
4.6p1 chan_read_failed error
The 4.6p1 sshd is logging this error during remote commands or file
transfers:
error: channel 0: chan_read_failed for istate 3
Platform is Solaris 8, 4.6p1 + OpenSSL 0.9.8d.
The commands and transfers work correctly, so the error message appears
to be spurious. The error message does not appear when processing logins.
Otherwise 4.6p1 is running without any apparent problems. This error
2003 Nov 20
11
Problem running SSH on IBM PPC440 processor, help appreciated
Hi,
Sorry to bother you on this mailing list, however I tried everything else and I am desperate to get this running. Please send me any hints you can think of.
I have installed openssh-3.7.1p2 on a ppc target and trying to connect to an sshd running on a redhat 9 with openssh-3.5p1. I keep getting the error "Disconnecting: Corrupted check bytes on input" no matter what I tried. I
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
...00644 kexc25519s.c
diff --git a/Makefile.in b/Makefile.in
index 92c95a9..a8e282a 100644
--- a/Makefile.in
+++ b/Makefile.in
@@ -73,7 +73,7 @@ LIBSSH_OBJS=authfd.o authfile.o bufaux.o bufbn.o buffer.o \
monitor_fdpass.o rijndael.o ssh-dss.o ssh-ecdsa.o ssh-rsa.o dh.o \
kexdh.o kexgex.o kexdhc.o kexgexc.o bufec.o kexecdh.o kexecdhc.o \
msg.o progressmeter.o dns.o entropy.o gss-genr.o umac.o umac128.o \
- jpake.o schnorr.o ssh-pkcs11.o krl.o
+ jpake.o schnorr.o ssh-pkcs11.o krl.o kexc25519.o kexc25519c.o
SSHOBJS= ssh.o readconf.o clientloop.o sshtty.o \
sshconnect.o sshconnect1.o sshconnect2...
2015 Mar 02
127
[Bug 2360] New: Bugs intended to be fixed in 6.9
https://bugzilla.mindrot.org/show_bug.cgi?id=2360
Bug ID: 2360
Summary: Bugs intended to be fixed in 6.9
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Keywords: meta
Severity: enhancement
Priority: P5
Component: Miscellaneous
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |