search for: rsa_free

Displaying 11 results from an estimated 11 matches for "rsa_free".

2000 May 15
1
[PATCH] using openssl with no-rsa?
...lowing patch to the sshd code, a quick test with an ssh session worked: --- sshd.c~ Sat May 6 22:03:20 2000 +++ sshd.c Mon May 15 12:04:34 2000 @@ -404,9 +404,12 @@ destroy_sensitive_data(void) { /* Destroy the private and public keys. They will no longer be needed. */ - RSA_free(public_key); - RSA_free(sensitive_data.private_key); - RSA_free(sensitive_data.host_key); + if (public_key != NULL) + RSA_free(public_key); + if (sensitive_data.private_key != NULL) + RSA_free(sensitive_data.private_key); + if (sensitive_dat...
2002 Aug 30
1
LIBCRYPTO?
...ation. In Makefile there is defined LIBS=$(LIBCRYPTO), but the problem is that the version of OpenSSL that I'm using holds only the version LIBCRYPT. When adding LIBCRYPT to the Makefile I get: sshd.elf2flt: In function `key_regeneration_alarm': /.../ssh/sshd.c:252: undefined reference to `RSA_free' /.../ssh/sshd.c:253: undefined reference to `RSA_new' /.../ssh/sshd.c:256: undefined reference to `RSA_free' /.../ssh/sshd.c:257: undefined reference to `RSA_new' sshd.elf2flt: In function `destroy_sensitive_data': /.../ssh/sshd.c:399: undefined reference to `RSA_free' /......
2004 May 17
4
Redhat 7.3 compiling problem
...pe res_crypto.c:484: dereferencing pointer to incomplete type res_crypto.c:484: dereferencing pointer to incomplete type res_crypto.c:487: dereferencing pointer to incomplete type res_crypto.c:490: dereferencing pointer to incomplete type res_crypto.c:491: warning: implicit declaration of function `RSA_free' res_crypto.c:491: dereferencing pointer to incomplete type res_crypto.c:492: warning: implicit declaration of function `free' res_crypto.c:454: warning: `nkey' might be used uninitialized in this function res_crypto.c: In function `show_keys': res_crypto.c:516: dereferencing point...
2008 Aug 16
21
[Bug 1506] New: rationalize agent behavior on smartcard removal/reattachment
https://bugzilla.mindrot.org/show_bug.cgi?id=1506 Summary: rationalize agent behavior on smartcard removal/reattachment Product: Portable OpenSSH Version: 5.1p1 Platform: Other OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: Smartcard AssignedTo:
2015 Mar 31
7
Wanted: smartcard with ECDSA support
Hi list, I have no idea if Damien Miller had the time to work on that. I have an initial patch to authenticate using PKCS#11 and ECDSA keys. This requires OpenSSL 1.0.2, prior OpenSSL versions do not expose the required interfaces to override the signature function pointer for ECDSA. The only limitation is that the OpenSSL API misses some cleanup function (finish, for instance), hence I have yet
2001 Jun 28
1
Adding 'name' key types
Playing around with the [wonderful] GSS-API patches for OpenSSH [1] I noticed that there is a bit of functionality missing from OpenSSH/GSS-API, namely that authorized_keys2 has no meaning when using GSS authentication. Yes, ~/.k5login can be used to grant access to an account for applications that support Kerberos, as does OpenSSH with those GSS patches, but .k5login does not and cannot provide
2005 Aug 09
2
error compiling asterisk on solaris
...BIO_read' /usr/local/ssl/lib/libssl.so: undefined reference to `X509_certificate_type' /usr/local/ssl/lib/libssl.so: undefined reference to `EVP_MD_CTX_copy' /usr/local/ssl/lib/libssl.so: undefined reference to `ASN1_INTEGER_get' /usr/local/ssl/lib/libssl.so: undefined reference to `RSA_free' /usr/local/ssl/lib/libssl.so: undefined reference to `d2i_DHparams' /usr/local/ssl/lib/libssl.so: undefined reference to `BIO_int_ctrl' /usr/local/ssl/lib/libssl.so: undefined reference to `BIO_f_buffer' /usr/local/ssl/lib/libssl.so: undefined reference to `ERR_get_error' /usr/...
2002 Jan 24
1
PATCH: krb4/krb5/... names/patterns in auth_keys entries
..._NAME_PAT)) { + /* + if (ret->name != NULL) + xfree(ret->name); + */ + ret->name = k->name; + ret->name_type = k->name_type; + k->name = NULL; + k->name_type = NULL; + success = 1; + } else if (ret->type == KEY_RSA) { if (ret->rsa != NULL) RSA_free(ret->rsa); ret->rsa = k->rsa; @@ -488,7 +621,7 @@ } } else if ((key->type == KEY_DSA && key->dsa != NULL) || (key->type == KEY_RSA && key->rsa != NULL)) { - int len, n; + u_int len, n; u_char *blob, *uu; key_to_blob(key, &blob, &le...
2001 Aug 15
0
[ossh patch] principal name/patterns in authorized_keys2
...et->name); + */ + ret->name = k->name; + ret->name_len = k->name_len; + ret->name_type = k->name_type; + k->name = NULL; + k->name_type = NULL; + k->name_len = 0; + success = 1; + } else if (ret->type == KEY_RSA) { if (ret->rsa != NULL) RSA_free(ret->rsa); ret->rsa = k->rsa; @@ -487,7 +620,7 @@ } } else if ((key->type == KEY_DSA && key->dsa != NULL) || (key->type == KEY_RSA && key->rsa != NULL)) { - int len, n; + u_int len, n; u_char *blob, *uu; key_to_blob(key, &blob, &le...
2000 Jan 19
3
AIX openssh patches
...SSH_CMSG_USER); /* Get the user name. */ ! user = packet_get_string((unsigned int*)&ulen); packet_integrity_check(plen, (4 + ulen), SSH_CMSG_USER); /* Destroy the private and public keys. They will no longer be needed. */ *************** *** 997,1002 **** --- 1002,1008 ---- RSA_free(sensitive_data.host_key); setproctitle("%s", user); + /* Do the authentication. */ do_authentication(user); } *************** *** 1084,1089 **** --- 1090,1099 ---- { struct passwd *pw, pwcopy; + #ifdef _AIX + char *loginmsg; + #endif + #ifdef AFS /* If machin...
2001 Nov 20
3
problem with AFS token forwarding
Hello, I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1 concerning the AFS token forwarding. That means that the new versions are not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this problem already existed in Openssh 2.9.9p1, but I have never used this version (I only looked at the