Displaying 16 results from an estimated 16 matches for "rsa_sign".
2006 Sep 06
0
FreeBSD Security Advisory FreeBSD-SA-06:19.openssl
...etails
The following list contains the revision numbers of each file that was
corrected in FreeBSD.
Branch Revision
Path
- -------------------------------------------------------------------------
RELENG_4
src/crypto/openssl/crypto/rsa/rsa_sign.c 1.1.1.1.2.6
RELENG_4_11
src/UPDATING 1.73.2.91.2.22
src/sys/conf/newvers.sh 1.44.2.39.2.25
src/crypto/openssl/crypto/rsa/rsa_sign.c 1.1.1.1.2.5.6.1
RELENG_5
src/crypto/openssl/cr...
2018 Dec 20
2
Intentionally use weak server key
...dle but
> that is very easy in CentOS7
>
Thank you, Marc.
We created our own CA and certificates just fine. The problem is that
SSL does not seem to like them giving the error I mentioned in the
previous message:
dovecot: imap-login: Error: SSL: Stacked error: error:04075070:rsa
routines:RSA_sign:digest too big for rsa key
What would an SSL+Dovecot expert do if this error was encountered? A
1024 bit key works just fine but we have to stick to 256.
2005 Apr 02
3
OpenSSH and Smartcard
...ng with: Security status
not satisfied sec.c:53:sc_compute_signature: returning with: Security
status not satisfied pkcs15-sec.c:285:sc_pkcs15_compute_signature:
sc_compute_signature() failed: Security status not satisfied
sc_pkcs15_compute_signature() failed: Security status not satisfied
ssh_rsa_sign: RSA_sign failed: error:00000000:lib(0):func(0):reason(0)
This is happen because openssh never prompt for the pin.
If I use the openssh-agent and ssh-add everything works well.
ssh-add -s 0
ssh localhost
:) --> Have a lot of fun
The question now:
Does Smartcards only work, if I use the ssh-...
2018 Dec 20
2
Intentionally use weak server key
Hi list!
For some reason I need to use a really weak server key (256 bit) with
dovecot for imaps access. Is this possible?
I tried but getting this error:
dovecot: imap-login: Error: SSL: Stacked error: error:04075070:rsa
routines:RSA_sign:digest too big for rsa key
This is on an Ubuntu 14.04 on x64.
Thank you!
Stavros
2002 Apr 24
2
RSA_verify question on OpenSSH Client w/ OpenSSL0.9.6a
...f=0x1990300
"\0205:\t\026\217????\206b#??nG?\177??\002U*P^9\0213?]??f\225?:?m\005\215\225??n????\205?\205?'?\220??,e#?\2150\025K\em?\022Wn\177[@?\fQ?4w3g?yX???\024\b\2222????F[p??n??r?(??\017?\214\177\220;qI?Z,.Bv\026$R?",
siglen=128, rsa=0x198b700) at
bsd/tools/openssl/crypto/rsa/rsa_sign.c:147
147 if (siglen != (unsigned
int)RSA_size(rsa))
(gdb) x/40x
0x198b7a0: 0x00000041 0x00000000
0x00008000 0x00000000
0x198b7b0: 0x00000000 0x00000000
0x00000000 0x00008000
0x198b7c0: 0xe5b83d65 0x00000001
0x5555686d 0x61632d...
2013 May 15
2
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?
Functionality request for supporting Digital Signatures for RSA and DSS
Public Key Algorithms in alignment with NIST SP800-131A.
I
assume this has been asked before, but I could not find in the
archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key
algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH
Extension Algorithms are supported, but not a
2015 Nov 26
4
[Bug 2507] New: missing or misleading error messages
...Status: NEW
Severity: normal
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
Reporter: tomas.kuthan at oracle.com
After code refactoring for library-like interfaces, error messages are
no longer printed for DSA_do_sign() or RSA_sign() failures in some code
paths.
When investigating error messaging for signing failures I also noticed,
that incorrect messages are printed for sshkey_from_blob() and
sshkey_sign() errors in ssh-agent.c.
--
You are receiving this mail because:
You are watching the assignee of the bug.
2018 Dec 20
0
Intentionally use weak server key
...t;/div>
<div>
<br>
</div>
<div>
I tried but getting this error:
</div>
<div>
<br>
</div>
<div>
dovecot: imap-login: Error: SSL: Stacked error: error:04075070:rsa
</div>
<div>
routines:RSA_sign:digest too big for rsa key
</div>
<div>
<br>
</div>
<div>
This is on an Ubuntu 14.04 on x64.
</div>
<div>
<br>
</div>
<div>
Thank you!
</div>
<div>
<br>
</div>...
2018 Dec 20
0
Intentionally use weak server key
...seem to like them giving the error I mentioned in the
</div>
<div>
previous message:
</div>
<div>
<br>
</div>
<div>
dovecot: imap-login: Error: SSL: Stacked error: error:04075070:rsa
</div>
<div>
routines:RSA_sign:digest too big for rsa key
</div>
<div>
<br>
</div>
<div>
What would an SSL+Dovecot expert do if this error was encountered? A
</div>
<div>
1024 bit key works just fine but we have to stick to 256.
</div>
</blockq...
2003 Apr 04
1
overload key signing function for opensc tokens...
I wasn't having much luck getting a key and certificate stored on a hardware
token to work until I made this fix. The ssh_rsa_sign key was not using
either overloading. I used the rsa.meth way, instead of the engine.
With this patch ssh-add works. I'm working on getting ssh to take a PIN, but
when I put in a call to read_passphrase in the appropriate place, it muddies
the waters for stdin, I think. I get errors in...
2018 Dec 20
3
Intentionally use weak server key
>
> If you can convince openssl to use it.
Does anybody have any hints on how it may be done, if possible at all?
Stavros
2004 May 17
4
Redhat 7.3 compiling problem
...te type
res_crypto.c:268: dereferencing pointer to incomplete type
res_crypto.c: In function `ast_sign':
res_crypto.c:391: dereferencing pointer to incomplete type
res_crypto.c:397: warning: implicit declaration of function `SHA1'
res_crypto.c:400: warning: implicit declaration of function `RSA_sign'
res_crypto.c:400: `NID_sha1' undeclared (first use in this function)
res_crypto.c:400: (Each undeclared identifier is reported only once
res_crypto.c:400: for each function it appears in.)
res_crypto.c:400: dereferencing pointer to incomplete type
res_crypto.c:403: dereferencing pointer to...
2005 Aug 09
2
error compiling asterisk on solaris
...`COMP_expand_block'
/usr/local/ssl/lib/libssl.so: undefined reference to `BIO_snprintf'
/usr/local/ssl/lib/libssl.so: undefined reference to `d2i_RSAPrivateKey_bio'
/usr/local/ssl/lib/libssl.so: undefined reference to `ASN1_dup'
/usr/local/ssl/lib/libssl.so: undefined reference to `RSA_sign'
/usr/local/ssl/lib/libssl.so: undefined reference to `ERR_peek_error'
/usr/local/ssl/lib/libssl.so: undefined reference to `PEM_read_bio_PrivateKey'
/usr/local/ssl/lib/libssl.so: undefined reference to `lh_retrieve'
/usr/local/ssl/lib/libssl.so: undefined reference to `X509_get_pub...
2010 Mar 17
20
[Bug 1736] New: OpenSSH doesn't seem to work with my MuscleCard PKCS#11 library
...local/lib/libmusclepkcs11.so
debug1: Authentications that can continue:
publickey,keyboard-interactive
debug1: Offering public key: /usr/local/lib/libmusclepkcs11.so
debug1: Server accepts key: pkalg ssh-rsa blen 151
Enter PIN for 'MuscleCard Applet':
C_FindObjects failed (0 nfound): 0
ssh_rsa_sign: RSA_sign failed: error:00000000:lib(0):func(0):reason(0)
debug1: Trying private key: /home/dbenoy/.ssh/id_rsa
debug1: Trying private key: /home/dbenoy/.ssh/id_dsa
debug1: Next authentication method: keyboard-interactive
Password:
----------
This PKCS#11 module works fine with Evolution, Firefox,...
2006 Nov 15
11
OpenSSH Certkey (PKI)
...-r1.26 key.h
--- key.h 3 Aug 2006 03:34:42 -0000 1.26
+++ key.h 15 Nov 2006 14:14:33 -0000
@@ -53,6 +53,7 @@
int flags;
RSA *rsa;
DSA *dsa;
+ u_char *cert;
};
Key *key_new(int);
@@ -83,5 +84,7 @@
int ssh_dss_verify(const Key *, const u_char *, u_int, const u_char *, u_int);
int ssh_rsa_sign(const Key *, u_char **, u_int *, const u_char *, u_int);
int ssh_rsa_verify(const Key *, const u_char *, u_int, const u_char *, u_int);
+
+int cert_verify(const u_char *cert, const Key *, const Key *, const u_char *);
#endif
Index: monitor.c
===================================================...
2012 Sep 17
9
[PATCH] Upgrade vtpmd to berlios version 0.7.4
...+ sizeof_TPM_CURRENT_TICKS(currentTicks));
-- memcpy(&info[30], digestToStamp->digest, sizeof(TPM_DIGEST));
-- p = &info[30 + sizeof(TPM_DIGEST)];
-- length = sizeof_TPM_CURRENT_TICKS(currentTicks);
-- if (tpm_marshal_TPM_CURRENT_TICKS(&p, &length, currentTicks)
-- || rsa_sign(&key->key, RSA_SSA_PKCS1_SHA1, info, info_length,
*sig)) {
-- tpm_free(*sig);
-- tpm_free(info);
-- return TPM_FAIL;
-- }
-- return TPM_SUCCESS;
-+ return TPM_DISABLED_CMD;
- }
-
- void tpm_update_ticks(void)
- {
-- if (tpmData.stany.data.currentTicks.tag == 0) {
-- tpmData...