Displaying 12 results from an estimated 12 matches for "key_ssh_name".
2002 Jan 31
7
x509 for hostkeys.
...(name, "x509v3-sign-dss") == 0) {
+ return KEY_DSA;
}
debug2("key_type_from_name: unknown key type '%s'", name);
return KEY_UNSPEC;
@@ -739,9 +751,16 @@
buffer_put_bignum2(&b, key->dsa->pub_key);
break;
case KEY_RSA:
- buffer_put_cstring(&b, key_ssh_name(key));
- buffer_put_bignum2(&b, key->rsa->e);
- buffer_put_bignum2(&b, key->rsa->n);
+ if (key->x509) {
+ /* XXX ssh.com does not accept a key name here */
+ len = i2d_X509(key->x509, NULL);
+ buf = buffer_append_space(&b, len);
+ i2d_X509(key->x509, &...
2008 Sep 15
0
No subject
...set_nonblocking
in buffer_init
?after buffer_init
?before use_privsep=0',use_privsep
before privsep_preauth
in authctxt_new
in buffer_init
?authenticate user and start session
?in do_ssh2_kex
?compat_cipher_proposal
?compat_cipher_proposal
?in list_hostkey_types
in buffer_init
in buffer_len
?in key_ssh_name
?in KEY_RSA
in buffer_append
in buffer_append_space
in buffer_len
in buffer_append
in buffer_append_space
?in key_ssh_name
?in KEY_DSA
in buffer_append
in buffer_append_space
in buffer_append
in buffer_append_space
in buffer_ptr
in buffer_free
list_hostkey_types: ssh-rsa,ssh-dss
?in kex_setup
in bu...
2008 Sep 18
2
SSHD_PROBLEM
...set_nonblocking
in buffer_init
after buffer_init
before use_privsep=0',use_privsep
before privsep_preauth
in authctxt_new
in buffer_init
authenticate user and start session
in do_ssh2_kex
compat_cipher_proposal
compat_cipher_proposal
in list_hostkey_types
in buffer_init
in buffer_len
in key_ssh_name
in KEY_RSA
in buffer_append
in buffer_append_space
in buffer_len
in buffer_append
in buffer_append_space
in key_ssh_name
in KEY_DSA
in buffer_append
in buffer_append_space
in buffer_append
in buffer_append_space
in buffer_ptr
in buffer_free
list_hostkey_types: ssh-rsa,ssh-dss
in kex_setup
in bu...
2005 Jul 26
1
Linux in-kernel keys support
...(keyutil, keyctl_read)
inet6_default_4in6=yes
case `uname -r` in
1.*|2.0.*)
diff -ubr -x configure openssh-4.1p1/key.c openssh-4.1p1-hacked/key.c
--- openssh-4.1p1/key.c 2004-11-05 10:42:29.000000000 +0100
+++ openssh-4.1p1-hacked/key.c 2005-07-25 22:13:45.000000000 +0200
@@ -545,6 +545,9 @@
key_ssh_name(const Key *k)
{
switch (k->type) {
+ case KEY_RSA1:
+ return "rsa1";
+ break;
case KEY_RSA:
return "ssh-rsa";
break;
@@ -698,6 +701,7 @@
type = key_type_from_name(ktype);
switch (type) {
+ case KEY_RSA1:
case KEY_RSA:
key = key_new(type);
if (buffer...
2011 Feb 04
0
OpenSSH security advisory: legacy certificate signing in 5.6/5.7
...===============================================================
RCS file: /cvs/src/usr.bin/ssh/key.c,v
retrieving revision 1.95
diff -u -r1.95 key.c
--- key.c 10 Nov 2010 01:33:07 -0000 1.95
+++ key.c 3 Feb 2011 06:52:33 -0000
@@ -1823,8 +1823,8 @@
buffer_put_cstring(&k->cert->certblob, key_ssh_name(k));
/* -v01 certs put nonce first */
+ arc4random_buf(&nonce, sizeof(nonce));
if (!key_cert_is_legacy(k)) {
- arc4random_buf(&nonce, sizeof(nonce));
buffer_put_string(&k->cert->certblob, nonce, sizeof(nonce));
}
2011 Feb 04
0
OpenSSH security advisory: legacy certificate signing in 5.6/5.7
...===============================================================
RCS file: /cvs/src/usr.bin/ssh/key.c,v
retrieving revision 1.95
diff -u -r1.95 key.c
--- key.c 10 Nov 2010 01:33:07 -0000 1.95
+++ key.c 3 Feb 2011 06:52:33 -0000
@@ -1823,8 +1823,8 @@
buffer_put_cstring(&k->cert->certblob, key_ssh_name(k));
/* -v01 certs put nonce first */
+ arc4random_buf(&nonce, sizeof(nonce));
if (!key_cert_is_legacy(k)) {
- arc4random_buf(&nonce, sizeof(nonce));
buffer_put_string(&k->cert->certblob, nonce, sizeof(nonce));
}
2003 Oct 08
4
OS/390 openssh
...e {
- buffer_put_string(&b, session_id2, session_id2_len);
+ buffer_put_binary(&b, session_id2, session_id2_len);
skip = buffer_len(&b);
}
buffer_put_char(&b, SSH2_MSG_USERAUTH_REQUEST);
@@ -863,7 +863,7 @@
buffer_put_char(&b, have_sig);
buffer_put_cstring(&b, key_ssh_name(id->key));
}
- buffer_put_string(&b, blob, bloblen);
+ buffer_put_binary(&b, blob, bloblen);
/* generate signature */
ret = identity_sign(id, &signature, &slen,
@@ -887,12 +887,12 @@
buffer_put_char(&b, have_sig);
if (!(datafellows & SSH_BUG_PKAUTH))
buf...
2001 Jun 28
1
Adding 'name' key types
Playing around with the [wonderful] GSS-API patches for OpenSSH [1] I
noticed that there is a bit of functionality missing from
OpenSSH/GSS-API, namely that authorized_keys2 has no meaning when using
GSS authentication.
Yes, ~/.k5login can be used to grant access to an account for
applications that support Kerberos, as does OpenSSH with those GSS
patches, but .k5login does not and cannot provide
2002 Jan 24
1
PATCH: krb4/krb5/... names/patterns in auth_keys entries
...>rsa != NULL)) {
- int len, n;
+ u_int len, n;
u_char *blob, *uu;
key_to_blob(key, &blob, &len);
uu = xmalloc(2*len);
@@ -499,6 +632,12 @@
}
xfree(blob);
xfree(uu);
+ } else if (key->type == KEY_NAME && key->name != NULL) {
+ fprintf(f, "%s ", key_ssh_name(key));
+ if (key->name_type != NULL)
+ fprintf(f, ":%s", key->name_type);
+ else
+ fprintf(f, " \"%s\"", key->name);
}
return success;
}
@@ -515,6 +654,12 @@
case KEY_DSA:
return "DSA";
break;
+ case KEY_NAME:
+ return "Named...
2001 Aug 15
0
[ossh patch] principal name/patterns in authorized_keys2
...u_int len, n;
u_char *blob, *uu;
key_to_blob(key, &blob, &len);
uu = xmalloc(2*len);
@@ -498,6 +631,14 @@
}
xfree(blob);
xfree(uu);
+ } else if (key->type == KEY_NAME && key->name != NULL &&
+ key->name_len) {
+
+ fprintf(f, "%s ", key_ssh_name(key));
+ if (key->name_type != NULL)
+ fprintf(f, ":%s", key->name_type);
+ else
+ fprintf(f, " \"%.*s\"", key->name, key->name_len);
}
return success;
}
@@ -514,6 +655,12 @@
case KEY_DSA:
return "DSA";
break;
+ case KEY_NAME:
+...
2006 Nov 15
11
OpenSSH Certkey (PKI)
...H_BUG_PKSERVICE ?
+ "ssh-userauth" :
+ authctxt->service);
+ if (datafellows & SSH_BUG_PKAUTH) {
+ buffer_put_char(&b, have_sig);
+ } else {
+ buffer_put_cstring(&b, authctxt->method->name);
+ buffer_put_char(&b, have_sig);
+ buffer_put_cstring(&b, key_ssh_name(id->key));
+ }
+ buffer_put_string(&b, blob, bloblen);
+
+ /* generate signature */
+ ret = identity_sign(id, &signature, &slen,
+ buffer_ptr(&b), buffer_len(&b));
+ if (ret == -1) {
+ xfree(blob);
+ buffer_free(&b);
+ return 0;
+ }
+#ifdef DEBUG_PK
+ buffer_dump(&...
2004 Apr 13
1
Patch Status
...y_sign entering
debug3: mm_request_send entering: type 4
debug3: mm_key_sign: waiting for MONITOR_ANS_SIGN
debug3: mm_request_receive_expect entering: type 5
debug3: mm_request_receive entering
debug3: monitor_read: checking request 4
debug3: mm_answer_sign
debug3: ssh_x509_sign: key_type=RSA+cert,
key_ssh_name=x509v3-sign-rsa
debug3: ssh_x509_sign: evp_md { 4(md5),
8(md5WithRSAEncryption), 16, ... }
debug3: ssh_x509_sign: return 0
debug3: mm_answer_sign: signature 0x809cdc0(151)
debug3: mm_request_send entering: type 5
debug2: monitor_read: 4 used once, disabling now
debug3: mm_request_receive entering
d...