search for: match_list

Displaying 18 results from an estimated 18 matches for "match_list".

2017 Oct 13
1
comparing two strings from data
Combining and completing the advice from Greg and Boris the complete solution is two lines: data_2 <- read.csv("excel_data.csv", stringsAsFactors = FALSE) match_list <- match( data_2$data1, data_2$data2 ) The vector match_list will have the matching position when it exists and NA's otherwise. Its length will be the same as the length of data_2$data1. You should get experience in reading the help information for R functions. In this case, type ?match to...
2017 Oct 12
4
comparing two strings from data
...like to keep this index 5. AST2017000005534 TUR2017000001428 CTS2017000079930 CTS2017000071989 CTS2017000079931 CTS2017000072015 In a loop, when I use the following code to get those indices, data_2 = read.csv("excel_data.csv") column_1 = data_2$data1 column_2 = data_2$data2 match_list <- array(0,dim=c(310,1)); # 310 is the length of the first column for (indx in 1: 310){ for(indx2 in 1:713){ # 713 is the length of the second column if(column_1[indx] == column_2[indx2] ){ match_list[indx,1] = indx2; break; } } } R provides th...
2018 Oct 10
2
no mutual signature algorithm with RSA user certs client 7.8, server 7.4
...ssh-ed25519-cert-v01 at openssh.com sshkey_sigalg_by_name(cp): ssh-ed25519 debug1: key_sig_algorithm: skipping ssh-ed25519-cert-v01 at openssh.com due to not matching key->type debug1: key_sig_algorithm: cp: rsa-sha2-512-cert-v01 at openssh.com sshkey_sigalg_by_name(cp): ssh-rsa-sha2-512 debug1: match_list: comparing cp: ssh-rsa-sha2-512 against sp: rsa-sha2-256 debug1: match_list: comparing cp: ssh-rsa-sha2-512 against sp: rsa-sha2-512 debug1: key_sig_algorithm: cp: rsa-sha2-256-cert-v01 at openssh.com sshkey_sigalg_by_name(cp): ssh-rsa-sha2-256 debug1: match_list: comparing cp: ssh-rsa-sha2-256 aga...
2017 Oct 12
0
comparing two strings from data
...00001428 > CTS2017000079930 CTS2017000071989 > CTS2017000079931 CTS2017000072015 > > In a loop, when I use the following code to get those indices, > > > data_2 = read.csv("excel_data.csv") > column_1 = data_2$data1 > column_2 = data_2$data2 > > match_list <- array(0,dim=c(310,1)); # 310 is the length of the first > column > > for (indx in 1: 310){ > for(indx2 in 1:713){ # 713 is the length of the second column > if(column_1[indx] == column_2[indx2] ){ > match_list[indx,1] = indx2; > break; &g...
2018 Oct 11
3
no mutual signature algorithm with RSA user certs client 7.8, server 7.4
...gt;type != KEY_RSA && key->type != KEY_RSA_CERT)) { + (key->type != KEY_RSA && key->type != KEY_RSA_CERT) || + (key->type == KEY_RSA_CERT && (datafellows & SSH_BUG_SIGTYPE))) { /* Filter base key signature alg against our configuration */ return match_list(sshkey_ssh_name(key), options.pubkey_key_types, NULL);
2007 Jan 08
0
How to remove group1 and group14 from OpenSSH..
...6" AND ALSO enum kex_exchange { KEX_DH_GRP1_SHA1, KEX_DH_GRP14_SHA1, KEX_DH_GEX_SHA1, KEX_DH_GEX_SHA256, KEX_MAX }; CHANGE TO enum kex_exchange { KEX_DH_GEX_SHA1, KEX_DH_GEX_SHA256, KEX_MAX }; IN kex.c static void choose_kex(Kex *k, char *client, char *server) { k->name = match_list(client, server, NULL); if (k->name == NULL) fatal("no kex alg"); if (strcmp(k->name, KEX_DH1) == 0) { k->kex_type = KEX_DH_GRP1_SHA1; k->evp_md = EVP_sha1(); } else if (strcmp(k->name, KEX_DH14) == 0) { k->kex_type = KEX_DH_GRP14_SHA1; k->evp_md = EVP_sha...
2005 Aug 01
1
patching postfix with VDA
..._addr_list.c patching file src/util/inet_addr_list.h patching file src/util/inet_addr_local.c patching file src/util/inet_addr_local.h patching file src/util/inet_connect.c patching file src/util/inet_listen.c patching file src/util/inet_util.c patching file src/util/listen.h patching file src/util/match_list.c patching file src/util/match_ops.c patching file src/util/match_ops.h patching file src/util/sdbm.c patching file src/util/sdbm.h patching file src/util/sys_defs.h patching file src/util/valid_hostname.c Patch #1 (postfix-2.1.1-config.patch): Patch #2 (postfix-smtp_sasl_proto.c.patch): Patch #3 (...
2018 Oct 11
2
no mutual signature algorithm with RSA user certs client 7.8, server 7.4
...(key->type != KEY_RSA && key->type != KEY_RSA_CERT) || > > + (key->type == KEY_RSA_CERT && (datafellows & SSH_BUG_SIGTYPE))) { > > /* Filter base key signature alg against our configuration */ > > return match_list(sshkey_ssh_name(key), > > options.pubkey_key_types, NULL); > > That fixes it for me, thank you. Would you still like a copy of the > previous failing client trace? No, I think I figured it out :)
2005 Jan 20
0
AllowUsers - proposal for useful variations on the theme
...ret = 1; + break; + } + } + } + freeaddrinfo(aitop); + } + + xfree(pat); + + return ret; +} + /* * Returns first item from client-list that is also supported by server-list, * caller must xfree() returned string. */ #define MAX_PROP 40 #define SEP "," char * match_list(const char *client, const char *server, u_int *next) diff -r -U 8 openssh-3.9p1.orig/match.h openssh-3.9p1.jpmg/match.h --- openssh-3.9p1.orig/match.h 2002-03-05 01:42:43.000000000 +0000 +++ openssh-3.9p1.jpmg/match.h 2005-01-20 10:11:24.691070340 +0000 @@ -14,11 +14,12 @@ #ifndef MATCH_H #define...
2018 Oct 11
2
no mutual signature algorithm with RSA user certs client 7.8, server 7.4
On Thu, Oct 11, 2018 at 10:41 AM Damien Miller <djm at mindrot.org> wrote: > On Wed, 10 Oct 2018, Adam Eijdenberg wrote: > > We see this error on the client side: > > > > debug1: kex_input_ext_info: server-sig-algs=<rsa-sha2-256,rsa-sha2-512> > > ... > > debug1: Offering public key: RSA-CERT SHA256:xxx /path/to/key > > debug1: send_pubkey_test: no
2010 Jan 21
6
[Bug 1702] New: PreferredAuthentications setting doesn't work when spaces are used as documented
...: PreferredAuthentications "gssapi-keyex, gssapi-with-mic, publickey, hostbased, password" with a space after each comma, ssh fails to process authentication methods beyond the first one in the list. It will however work as expected if the spaces are removed. Either the man page or code (match_list()?) needs to be fixed. Below is the debug log of the failure: debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive debug3: start over, passed a different list publickey,gssapi-keyex,gssapi-with-mic,password,keyboard-interactive debug3: pr...
2020 Sep 26
18
[Bug 3213] New: openssh 8.3p1 will not use any type of RSA key for legacy servers if ssh-rsa is not in PubkeyAcceptedKeyTypes
...er words, the private key type has already been checked against the local security policy before key_sig_algorithm is called, so key_sig_algorithm shouldn't be acting as a filter. It should be finding the correct name to refer to the client's key type. I'd suggest dropping the call to match_list, and instead simply return sshkey_ssh_name(key) for all non-RSA key types, and for RSA key types when connecting to a legacy server with SSH_BUG_SIGTYPE set. -- You are receiving this mail because: You are watching the assignee of the bug.
2012 Dec 17
15
[Bug 2052] New: Memory leak when SSH login and logout
...d attachment 2200 --> https://bugzilla.mindrot.org/attachment.cgi?id=2200&action=edit Memory allocation and deallocation information We are using openSSH version release-5.1. When we do ssh login and logout we notice memory leak, we noticed this memory leak in the following functions. 1, match_list (from Line no 287) function allocated memory using xstrdup call and this was not freeed. 2, In function input_userauth_request(from line no 299) we allocate memory using xstrdup call and this was not freeed. 3, In Function list_hostkey_types (from line no 825) we allocate memory using xstrdup cal...
2003 Mar 04
0
hashing known_hosts
...4p1/match.h Mon Mar 4 20:42:43 2002 +++ openssh-3.4p1-hash/match.h Mon Mar 3 17:30:44 2003 @@ -20,5 +20,8 @@ int match_hostname(const char *, const int match_host_and_ip(const char *, const char *, const char *); int match_user(const char *, const char *, const char *, const char *); char *match_list(const char *, const char *, u_int *); +#ifdef HASH_KNOWN_HOSTS +int match_hashed_hostname(const char *, const char *, u_int); +#endif #endif Common subdirectories: openssh-3.4p1/openbsd-compat and openssh-3.4p1-hash/openbsd-compat diff -u -p openssh-3.4p1/readconf.c openssh-3.4p1-hash/readc...
2012 Nov 24
0
ssh-keyscan continuity patch --
..."dispatch.h" #include "monitor.h" #include "roaming.h" +#include "canohost.h" #if OPENSSL_VERSION_NUMBER >= 0x00907000L # if defined(HAVE_EVP_SHA256) @@ -366,11 +367,19 @@ choose_hostkeyalg(Kex *k, char *client, char *server) { char *hostkeyalg = match_list(client, server, NULL); - if (hostkeyalg == NULL) - fatal("no hostkey alg"); + if (hostkeyalg == NULL) { + if (k->server) + fatal("bad '%.100s' hostkey alg request from %.200s", client, get_remote_ipaddr()); + else + fatal("no '%.100s' hostkey...
2020 Jun 11
2
pointer subtraciton on arm for 8.3p1
...01 at openssh.com,ssh-ed25519-cert-v01 at openssh.com,sk-ssh-ed25519-cert-v01 at openssh.com,rsa-sha2-512-cert-v01 at openssh.com,rsa-sha2-256-cert-v01 at openssh.com,ssh-rsa-cert-v01 at openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521") at xmalloc.c:94 #5 0x7f6c6ee4 in match_list ( client=0x7ffffec0 "ecdsa-sha2-nistp256-cert-v01 at openssh.com,ecdsa-sha2-nistp384-cert-v01 at openssh.com,ecdsa-sha2-nistp521-cert-v01 at openssh.com,sk-ecdsa-sha2-nistp256-cert-v01 at openssh.com,ssh-ed25519-cert-v01 at openssh.com,sk-ssh-ed25519-cert-v01 at openssh.com,rsa-sha2-512-ce...
2016 Aug 24
3
kex protocol error: type 7 seq xxx error message
Hi, mancha and me debugged a problem with OpenSSH 7.3p1 that was reported on the #openssh freenode channel. Symptoms were that this message was popping on the console during a busy X11 session: kex protocol error: type 7 seq 1234 I managed to reproduce the problem, it is related to the SSH_EXT_INFO packet that is send by the server every time it is sending an SSH_NEWKEYS packet, hence after
2017 Mar 02
61
[Bug 2687] New: Coverity scan fixes
...ral issues: auth-pam.c * NULL_RETURNS -- missing check before dereferencing allocated buffer clientloop.c * REVERSE_INULL -- check for null after it was already dereferenced --> check for null earlier too digest-openssl.c * NULL_RETURNS -- missing check for null kex.c * RESOURCE_LEAK -- match_list() allocates data which is not freed in several cases readconf.c * RESOURCE_LEAK -- Variable "arg2" going out of scope leaks the storage it points to. servconf.c * DEADCODE -- cannot reach the expression ""none"" sshconnect.c * RESOURCE_LEAK -- Handle variable &qu...