Displaying 15 results from an estimated 15 matches for "nresp".
Did you mean:
resp
2002 Jun 26
0
OpenSSH Security Advisory (adv.iss)
...=====================================
RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v
retrieving revision 1.18
diff -u -r1.18 auth2-chall.c
--- auth2-chall.c 19 Jun 2002 00:27:55 -0000 1.18
+++ auth2-chall.c 26 Jun 2002 09:37:03 -0000
@@ -256,6 +256,8 @@
authctxt->postponed = 0; /* reset */
nresp = packet_get_int();
+ if (nresp > 100)
+ fatal("input_userauth_info_response: nresp too big %u", nresp);
if (nresp > 0) {
response = xmalloc(nresp * sizeof(char*));
for (i = 0; i < nresp; i++)
B:
Index: auth2-pam.c
======================================================...
2002 Jun 26
0
Revised OpenSSH Security Advisory (adv.iss)
...=====================================
RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v
retrieving revision 1.18
diff -u -r1.18 auth2-chall.c
--- auth2-chall.c 19 Jun 2002 00:27:55 -0000 1.18
+++ auth2-chall.c 26 Jun 2002 09:37:03 -0000
@@ -256,6 +256,8 @@
authctxt->postponed = 0; /* reset */
nresp = packet_get_int();
+ if (nresp > 100)
+ fatal("input_userauth_info_response: nresp too big %u", nresp);
if (nresp > 0) {
response = xmalloc(nresp * sizeof(char*));
for (i = 0; i < nresp; i++)
B:
Index: auth2-pam.c
======================================================...
2002 Jun 26
1
Revised OpenSSH Security Advisory (adv.iss)
...=====================================
RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v
retrieving revision 1.18
diff -u -r1.18 auth2-chall.c
--- auth2-chall.c 19 Jun 2002 00:27:55 -0000 1.18
+++ auth2-chall.c 26 Jun 2002 09:37:03 -0000
@@ -256,6 +256,8 @@
authctxt->postponed = 0; /* reset */
nresp = packet_get_int();
+ if (nresp > 100)
+ fatal("input_userauth_info_response: nresp too big %u", nresp);
if (nresp > 0) {
response = xmalloc(nresp * sizeof(char*));
for (i = 0; i < nresp; i++)
B:
Index: auth2-pam.c
======================================================...
2002 Jun 26
2
OpenSSH Security Advisory (adv.iss)
...=====================================
RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v
retrieving revision 1.18
diff -u -r1.18 auth2-chall.c
--- auth2-chall.c 19 Jun 2002 00:27:55 -0000 1.18
+++ auth2-chall.c 26 Jun 2002 09:37:03 -0000
@@ -256,6 +256,8 @@
authctxt->postponed = 0; /* reset */
nresp = packet_get_int();
+ if (nresp > 100)
+ fatal("input_userauth_info_response: nresp too big %u", nresp);
if (nresp > 0) {
response = xmalloc(nresp * sizeof(char*));
for (i = 0; i < nresp; i++)
B:
Index: auth2-pam.c
======================================================...
2002 Jul 01
0
Revised OpenSSH Security Advisory
...=====================================
RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v
retrieving revision 1.18
diff -u -r1.18 auth2-chall.c
--- auth2-chall.c 19 Jun 2002 00:27:55 -0000 1.18
+++ auth2-chall.c 26 Jun 2002 09:37:03 -0000
@@ -256,6 +256,8 @@
authctxt->postponed = 0; /* reset */
nresp = packet_get_int();
+ if (nresp > 100)
+ fatal("input_userauth_info_response: nresp too big %u", nresp);
if (nresp > 0) {
response = xmalloc(nresp * sizeof(char*));
for (i = 0; i < nresp; i++)
B:
Index: auth2-pam.c
======================================================...
2002 Jul 01
0
Revised OpenSSH Security Advisory
...=====================================
RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v
retrieving revision 1.18
diff -u -r1.18 auth2-chall.c
--- auth2-chall.c 19 Jun 2002 00:27:55 -0000 1.18
+++ auth2-chall.c 26 Jun 2002 09:37:03 -0000
@@ -256,6 +256,8 @@
authctxt->postponed = 0; /* reset */
nresp = packet_get_int();
+ if (nresp > 100)
+ fatal("input_userauth_info_response: nresp too big %u", nresp);
if (nresp > 0) {
response = xmalloc(nresp * sizeof(char*));
for (i = 0; i < nresp; i++)
B:
Index: auth2-pam.c
======================================================...
2002 Feb 27
0
openssh & solaris (part 2)
...mpted to change their password.
NOTE: "pam_setcred: error Permission denied" errors are still issued when
exiting a session.
*** auth2-pam.c- Tue Feb 26 15:30:14 2002
--- auth2-pam.c Tue Feb 26 15:31:26 2002
***************
*** 134,141 ****
--- 134,143 ----
unsigned int nresp = 0, rlen = 0, i = 0;
char *resp;
+ /*
if (authctxt == NULL)
fatal("input_userauth_info_response_pam: no authentication
context");
+ */
nresp = packet_get_int(); /* Number of responses. */
debug("got %d responses", nresp);...
2002 Feb 27
0
[Bug 128] New: PAM with ssh authentication and pam_krb5 doesn't work properly
...entry:
sshd auth sufficient /usr/lib/security/$ISA/pam_krb5.so.1
sshd auth required /usr/lib/security/$ISA/pam_unix.so.1 try_first_pass
*** auth2-pam.c- Tue Feb 26 15:30:14 2002
--- auth2-pam.c Tue Feb 26 15:31:26 2002
***************
*** 134,141 ****
--- 134,143 ----
unsigned int nresp = 0, rlen = 0, i = 0;
char *resp;
+ /*
if (authctxt == NULL)
fatal("input_userauth_info_response_pam: no authentication
context");
+ */
nresp = packet_get_int(); /* Number of responses. */
debug("got %d responses", nresp);
-...
2001 Jun 26
1
OpenSSH 2.9p2 with PAMAuthenticationViaKbdInt
...t;input_userauth_info_response_pam: no authentication context");
- if (authctxt->attempt++ >= AUTH_FAIL_MAX)
- packet_disconnect("too many failed userauth_requests");
+ if (authctxt->failures >= AUTH_FAIL_MAX)
+ packet_disconnect(AUTH_FAIL_MSG, authctxt->user);
nresp = packet_get_int(); /* Number of responses. */
debug("got %d responses", nresp);
2002 Jul 02
3
New PAM kbd-int diff
...it(0);
+
+ auth_fail:
+ sshpam_send(ctxt, "!%s", pam_strerror(sshpamh, err));
+ pam_end(sshpamh, err);
+ exit(0);
}
-void
-input_userauth_info_response_pam(int type, u_int32_t seqnr, void *ctxt)
+void *
+sshpam_init_ctx(Authctxt *authctxt)
{
- Authctxt *authctxt = ctxt;
- unsigned int nresp = 0, rlen = 0, i = 0;
- char *resp;
-
- if (authctxt == NULL)
- fatal("input_userauth_info_response_pam: no authentication context");
+ struct sshpam_ctxt *ctxt;
+ int socks[2];
+ int i;
+
+ debug3("PAM kbd-int init ctx");
+
+ ctxt = xmalloc(sizeof *ctxt);
+ ctxt->user = xst...
2002 Jul 02
0
error in plot residuals in a glm with iterations.
...1))
X <- model.matrix(fit.model)
n <- nrow(X)
p <- ncol(X)
w <- fit.model$weights
W <- diag(w)
H <- solve(t(X)%*%W%*%X)
H <- sqrt(W)%*%X%*%H%*%t(X)%*%sqrt(W)
h <- diag(H)
td <- resid(fit.model,type="deviance")/sqrt(1-h)
e <- matrix(0,n,100)
#
for(i in 1:100){
nresp <- rpois(n, fitted(fit.model))
fit <- glm(nresp ~ X , family=poisson)
w <- fit$weights
W <- diag(w)
H <- solve(t(X)%*%W%*%X)
H <- sqrt(W)%*%X%*%H%*%t(X)%*%sqrt(W)
h <- diag(H)
e[,i] <- sort(resid(fit,type="deviance")/sqrt(1-h))}
#
e1 <- numeric(n)
e2 <- numer...
2002 Apr 26
0
PAM keyboard-interactive
...");
- }
-
- if(context_pam2.num_received == context_pam2.num_expected) {
- *resp = context_pam2.responses;
- return PAM_SUCCESS;
- } else
- return PAM_CONV_ERR;
-}
-
-void
-input_userauth_info_response_pam(int type, u_int32_t seqnr, void *ctxt)
-{
- Authctxt *authctxt = ctxt;
- unsigned int nresp = 0, rlen = 0, i = 0;
- char *resp;
-
- if (authctxt == NULL)
- fatal("input_userauth_info_response_pam: no authentication context");
-
- nresp = packet_get_int(); /* Number of responses. */
- debug("got %d responses", nresp);
-
- for (i = 0; i < nresp; i++) {
- int j = con...
2002 Jun 25
4
PAM kbd-int with privsep
...ctxt->sock = socks[0];
+ close(socks[1]);
+ return (ctxt);
}
-void
-input_userauth_info_response_pam(int type, u_int32_t seqnr, void *ctxt)
+int
+sshpam_query(void *ctx, char **name, char **info,
+ u_int *num, char ***prompts, u_int **echo_on)
{
- Authctxt *authctxt = ctxt;
- unsigned int nresp = 0, rlen = 0, i = 0;
- char *resp;
+ struct sshpam_ctxt *ctxt = ctx;
+ char *msg;
- if (authctxt == NULL)
- fatal("input_userauth_info_response_pam: no authentication context");
+ debug3("PAM kbd-int query");
- nresp = packet_get_int(); /* Number of responses. */
- debug(&...
2002 Feb 02
1
openssh-3.0.2p1 BUGs
...c == NULL, this line segfaults. Test at 1142
should probably return
1234 If c == NULL, this line segfaults. Test at 1224
should probably return
Sshd.c 106 IPv4or6 is an int. Line 136 of channels.c
declares a static int for same variable. ???
Auth2-chall.c 261 Test at 246 check for > 0. If nresp
== 0, response never gets alloc?ed and is still NULL
at line 261.
Session.c 1476 There?s several ways that cp could
still be NULL by the time it gets to this line.
Especially if AIX is defined. Better checking of cp is
needed leading up to this line.
2021 Are all session tty members guaranteed...
2004 Jan 25
1
Puzzled about PAM support in OpenSSH-3.7.1p2
...;valid case (i.e. when the getpwnam() returns a real
acct). This seems to make the fakepw() case above pointless (and
prevents my captive acct scenario from working).
if (authctxt->valid) {
res = kbdintctxt->device->respond(kbdintctxt->ctxt,
nresp, response);
} else {
res = -1;
}
My question is how is the !valid case supposed to work? Is this just
an oversight in the OpenSSH code, or am I missing some other piece of
the puzzle (perhaps somewhere where valid is supposed to be set)? If
this is just a bug, I&...