Displaying 20 results from an estimated 20 matches for "random_pool".
2001 Jun 07
2
Patch to enable multiple possible sources of entropy
...Please accept this patch into the openssh code base. Don't forget to
run autoheader and autoconf.
- Dave Dykstra
*** entropy.c.O Fri Jun 1 15:52:20 2001
--- entropy.c Tue Jun 5 17:41:47 2001
***************
*** 80,91 ****
# define USE_PRNGD
#endif
- #if defined(USE_PRNGD) || defined(RANDOM_POOL)
-
#ifdef USE_PRNGD
/* Collect entropy from PRNGD/EGD */
int
! get_random_bytes(unsigned char *buf, int len)
{
int fd;
char msg[2];
--- 80,89 ----
# define USE_PRNGD
#endif
#ifdef USE_PRNGD
/* Collect entropy from PRNGD/EGD */
int
! prngd_get_random_bytes(unsigned char *...
1999 Nov 19
0
EGD socket problem ...
...;fatal:' result when connect() is tested:
char egd_message[2] = { 0x02, 0x00 };
struct sockaddr_un addr;
int addr_len;
memset(&addr, '\0', sizeof(addr));
addr.sun_family = AF_UNIX;
/* FIXME: compile time check? */
if (sizeof(RANDOM_POOL) > sizeof(addr.sun_path))
fatal("Random pool path is too long");
strncpy(addr.sun_path, RANDOM_POOL, sizeof(addr.sun_path - 1));
addr.sun_path[sizeof(addr.sun_path - 1)] = '\0';
addr_len = offsetof(struct sockaddr_un, sun_path) + sizeof...
2000 Apr 30
2
OpenSSH ssh-keygen on Solaris8 x86
...and tests fine the egd "make test" and with:
#./egd.pl /etc/entropy get
22 sources found
forking into background...
server starting
But when I go to "make host-key", it just sits there. Tracking it down,
the place it stops is in random.c (line 99):
c = atomicio(write, random_pool, egd_message,
sizeof(egd_message));
if (c == -1)
fatal("Couldn't write to EGD socket \"%s\": %s",
RANDOM_POOL, st
rerror(errno));
c = atomicio(read, random_pool, buf, len); <--------- HERE
It's this last line it never completes (line...
1999 Nov 22
3
3 Bugs to Report: OpenSSH V1.2pre13
Three possibly related bugs to report. N.B. The test machines in question
are in peak form (with the exception of different kernel versions) and were
working 100% under the old ssh 1.2.x. The two clients we tested from are
machines running 2.2.13 & 2.2.14preX Linux kernels. The server where the
problems appeared is running 2.2.12.
1. sshd dies periodically. The crash occurred just after a
2000 Nov 10
0
Irix job limits patch
...is
--- config.h.in Sun Nov 5 21:25:18 2000
+++ config.h.in Wed Nov 8 10:25:53 2000
@@ -92,6 +92,9 @@
/* Define if you want IRIX audit trails */
#undef WITH_IRIX_AUDIT
+/* Define if you want IRIX kernel job initiation */
+#undef WITH_IRIX_JOBS
+
/* Location of random number pool */
#undef RANDOM_POOL
end
--- configure.in Sun Nov 5 03:08:45 2000
+++ configure.in Wed Nov 8 10:26:57 2000
@@ -111,6 +111,7 @@
AC_DEFINE(WITH_IRIX_ARRAY)
AC_DEFINE(WITH_IRIX_PROJECT)
AC_DEFINE(WITH_IRIX_AUDIT)
+ AC_DEFINE(WITH_IRIX_JOBS)
no_libsocket=1
no_libnsl=1
AC_DEFINE(BROKEN_INET_NTOA)
end
---...
2000 Aug 02
1
IRIX 6.5.5m openssh-2.1.1p4 IRIX_AUDIT PROBLEM
...file
---BEGIN PATCH---
*** config.h Wed Aug 2 14:37:08 2000
--- config.h.me Wed Aug 2 14:37:42 2000
***************
*** 41,47 ****
#define WITH_IRIX_PROJECT 1
/* Define if you want IRIX audit trails */
! #define WITH_IRIX_AUDIT 1
/* Location of random number pool */
/* #undef RANDOM_POOL */
--- 41,47 ----
#define WITH_IRIX_PROJECT 1
/* Define if you want IRIX audit trails */
! /* #undef WITH_IRIX_AUDIT */
/* Location of random number pool */
/* #undef RANDOM_POOL */
---END PATCH---
Shouldn't there actually be a --enable --disable switch for the IRIX stuff
or a...
1999 Dec 09
0
xauth location in openssh-1.2pre17
...uot; 1>&6
+fi
+
+cat >> confdefs.h <<EOF
+#define XAUTH_PATH "$xauth_path"
+EOF
+
+
trap '' 1 2 15
cat > confcache <<\EOF
# This file is a shell script that caches the results of configure
@@ -2426,6 +2466,7 @@
s%@GNOME_ASKPASS@%$GNOME_ASKPASS%g
s%@RANDOM_POOL@%$RANDOM_POOL%g
s%@LIBWRAP@%$LIBWRAP%g
+s%@xauth_path@%$xauth_path%g
CEOF
EOF
_____________________________________________________
Sent by Jahoopa Free Email!
Find us on the web at http://www.jahoopa.com
Join today!
2000 Jan 19
3
AIX openssh patches
...****
--- 141,156 ----
void get_random_bytes(unsigned char *buf, int len)
{
+
+ #ifdef USE_SYSRANDOM
+ int index;
+
+ srandom(time(NULL) + getpid());
+
+ for (index = 0; index < len+1; index++) {
+ buf[index] = rand()%255;
+ }
+ #else /* USE_SYSRANDOM */
static int random_pool;
int c;
#ifdef HAVE_EGD
***************
*** 184,189 ****
--- 200,206 ----
fatal("Couldn't read from random pool \"%s\": %s", RANDOM_POOL, strerror(errno));
close(random_pool);
+ #endif /* USE_SYSRANDOM */
}
#endif /* !HAVE_ARC4RANDOM */
*** canohost.c....
2000 May 30
1
[BUG?] openssh-2.1.0p3
...18:34:31 2000
+++ entropy.c Tue May 30 18:49:45 2000
@@ -82,8 +82,6 @@
c = atomicio(read, egd_socket, buf, len);
if (c <= 0)
fatal("Couldn't read from EGD socket \"%s\": %s", EGD_SOCKET, strerror(errno));
-
- close(EGD_SOCKET);
}
#else /* !EGD_SOCKET */
#ifdef RANDOM_POOL
(When close(EGD_SOCKET) -> close(egd_socket), ssh don't work.)
--
IWAMURO, Motonori [E-Mail: vmi at kw.netlaputa.ne.jp / iwa at mmp.fujitsu.co.jp]
2000 Jun 15
1
problem in entropy.c if no getrusage
entropy.c assumes RUSAGE_SELF and RUSAGE_CHILDREN
*** entropy.c.orig Thu Jun 15 13:57:28 2000
--- entropy.c Thu Jun 15 13:58:25 2000
***************
*** 201,207 ****
--- 201,209 ----
total_entropy_estimate += stir_gettimeofday(1.0);
total_entropy_estimate += stir_clock(0.2);
+ #ifdef HAVE_GETRUSAGE
total_entropy_estimate += stir_rusage(RUSAGE_SELF, 2.0);
+ #endif
2001 Feb 28
2
small patch for configure.in
...------------
--- openssh_cvs/configure.in.old Tue Feb 27 12:56:06 2001
+++ openssh_cvs/configure.in Tue Feb 27 16:54:48 2001
@@ -5,6 +5,7 @@
AC_CONFIG_HEADER(config.h)
AC_PROG_CC
AC_CANONICAL_HOST
+AC_C_BIGENDIAN
# Checks for programs.
AC_PROG_CPP
@@ -1279,14 +1280,14 @@
if test -z "$RANDOM_POOL" ; then
AC_MSG_CHECKING(for PRNGD/EGD socket)
# Insert other locations here
- for egdsock in /var/run/egd-pool /etc/entropy /tmp/entropy ; do
+ for egdsock in /var/run/egd-pool /tmp/egd-pool /etc/entropy /tmp/entropy ; do
if test -r $egdsock && $TEST_MINUS_S_SH -c &quo...
2001 Sep 06
0
line_abbrevname patch
...9:47 2001
+++ openssh-2.9p2/config.h.in Wed Sep 5 19:11:41 2001
@@ -102,6 +102,9 @@
/* Define if you want IRIX kernel jobs */
#undef WITH_IRIX_JOBS
+/* Define if the tty id (abbreviated name) in *tmp strips tty */
+#undef WITH_NO_TTY_IN_UTMP_ID
+
/* Location of random number pool */
#undef RANDOM_POOL
--- openssh-2.9p2.orig/configure.in Mon May 28 17:21:44 2001
+++ openssh-2.9p2/configure.in Wed Sep 5 19:13:06 2001
@@ -111,6 +111,7 @@
AC_DEFINE(WITH_IRIX_ARRAY)
AC_DEFINE(WITH_IRIX_PROJECT)
AC_DEFINE(WITH_IRIX_AUDIT)
+ AC_DEFINE(WITH_NO_TTY_IN_UTMP_ID)...
2000 Jun 21
0
IRIX patches
...if you have/want arrays (cluster-wide session managment, not C arrays) */
+ #undef WITH_ARRAY
+
+ /* Define if you want IRIX project management */
+ #undef WITH_IRIX_PROJECT
+
+ /* Define if you want IRIX audit trails */
+ #undef WITH_IRIX_AUDIT
+
/* Location of random number pool */
#undef RANDOM_POOL
*** openssh-2.1.1p1.orig/session.c Wed Jun 07 07:22:38 EDT 2000
--- openssh-2.1.1p1/session.c Wed Jun 21 15:05:37 EDT 2000
***************
*** 27,32 ****
--- 27,36 ----
#include "ssh2.h"
#include "auth.h"
+ #ifdef WITH_IRIX_PROJECT
+ #include <proj.h>
+ #endif /*...
2001 Feb 07
2
Patch for unformatted manpages
...AC_SUBST(MANTYPE)
-AC_SUBST(mansubdir)
-
# Check whether user wants Kerberos support
KRB4_MSG="no"
AC_ARG_WITH(kerberos4,
@@ -1645,11 +1601,6 @@
# Print summary of options
-if test x$MANTYPE = x'$(CATMAN)' ; then
- MAN_MSG=cat
-else
- MAN_MSG=man
-fi
if test ! -z "$RANDOM_POOL" ; then
RAND_MSG="Device ($RANDOM_POOL)"
else
@@ -1667,7 +1618,7 @@
C=`eval echo ${sbindir}` ; C=`eval echo ${C}`
D=`eval echo ${sysconfdir}` ; D=`eval echo ${D}`
E=`eval echo ${libexecdir}/ssh-askpass` ; E=`eval echo ${E}`
-F=`eval echo ${mandir}/${mansubdir}X` ; F=`eval echo...
2000 Jun 20
2
Critical EGD handling in 2.1.1p1
Hi,
when running OpenSSH with EGD as entropy source, the sshd server connects
to the EGD socket and leaves it open to re-seed on the fly.
Unfortunately the connection is not checked when re-seeding, so that
a failure or restart of EGD will lead to a "fatal()" abort of the sshd
server process.
Since a dying server process can not be accepted, I would recommend to
not have sshd call it
2000 Aug 25
1
[patch] configurable ssh_prng_cmds
...c openssh-SNAP-20000823.new/entropy.c
--- openssh-SNAP-20000823.orig/entropy.c Sat Jul 15 06:59:15 2000
+++ openssh-SNAP-20000823.new/entropy.c Fri Aug 25 14:44:52 2000
@@ -67,6 +67,8 @@
# define RUSAGE_CHILDREN 0
#endif
+char *ssh_prng_command_file = NULL;
+
#if defined(EGD_SOCKET) || defined(RANDOM_POOL)
#ifdef EGD_SOCKET
@@ -810,7 +812,7 @@
original_uid = getuid();
/* Read in collection commands */
- if (!prng_read_commands(SSH_PRNG_COMMAND_FILE))
+ if (!prng_read_commands(ssh_prng_command_file))
fatal("PRNG initialisation failed -- exiting.");
/* Set ourselves up to sav...
1999 Dec 21
0
Problem with UTMP recording
...mpiler calls it. */
/* #undef inline */
/* SSL directory. */
#define ssldir "/usr/local/ssl"
/* Location of lastlog file */
#define LASTLOG_LOCATION "/var/log/lastlog"
/* If lastlog is a directory */
/* #undef LASTLOG_IS_DIR */
/* Location of random number pool */
#define RANDOM_POOL "/dev/urandom"
/* Are we using the Entropy gathering daemon */
/* #undef HAVE_EGD */
/* Define if your ssl headers are included with #include <ssl/header.h> */
/* #undef HAVE_SSL */
/* Define if your ssl headers are included with #include <openssl/header.h> */
#define HAV...
1999 Nov 19
1
[solaris 7 patch] resubmit and extended ...
Okay, everything as the first large one I sent today, with a few extra
mods. _PATH_MAILDIR is only used in sshd.c, that I can see, so moved the
#ifdef from config.h.in to there.
several files had __progname defined in the middle of the code, as well as
at the top of the code, so cleaned those out.
all the fixes for u_int32_t -> uint32_t and u_int16_t -> uint16_t, plus
added appropriate
2001 Sep 28
3
OpenSSH (portable) and entropy gathering
On Thu, 27 Sep 2001 20:41:05 EDT, Damien Miller writes:
> On Thu, 27 Sep 2001, Dan Astoorian wrote:
>
> >
> > It would (IMHO) be useful if there were a way to optionally configure
> > that code to fall back to the internal entropy gathering routines in the
> > event that EGD was not available; as it is, the routines simply fail if
> > EGD is unavailable at the
2001 Feb 16
7
OpenSSH 2.5.0p1
Known issues:
1) Linux 'sleep 20' -- Unfixable before 2.5.0 (known work around)
2) HP/UX signal issue -- Patched and HP/UX 11 works in v2
3) SCO 2/ Native Compiler -- Unfixable before 2.5.0 (known work around)
4) NeXTStep -- Resynced, MAX_GROUPS vs NGROUPS unresolved (not major)
5) DG/UX regcomp/regexec -- Fixed.
6) Cray signal issues -- ???
7) Solaris '$PATH' issue -- ??