Displaying 5 results from an estimated 5 matches for "signaturelen".
Did you mean:
signature_len
2002 Apr 24
0
need help in ssh client: key exchange
...re, slen, hash, 20) != 1){
fatal("key_verify failed for
server_host_key");
exit(-109);
}
I see:
(gdb) p key->type
$1 = 1
which would mean: KEY_RSA.
Can someone please let me know: why in
file key.c:
case KEY_RSA:
return ssh_rsa_verify(key, signature,
signaturelen, data, datalen);
break;
when would routine:
ssh_rsa_verify(..) fail and why ?
I am trying to do password based authentication
on V2. Is it mandatory that v2 used only RSA based
authentication ?
Any help/info is appreciated.
Thank you,
_____________________________________________...
2001 May 17
0
Patch: Set SSH_AUTHKEY to key id used to authenticate.
...len++)
+ *s = *cp;
+ *s = '\0';
+ isSet = 1;
+
+ return(NULL);
+}
diff -ur openssh-2.9p1/key.h openssh-2.9p1authdata/key.h
--- openssh-2.9p1/key.h Tue Apr 17 12:11:37 2001
+++ openssh-2.9p1authdata/key.h Thu May 17 00:34:28 2001
@@ -80,5 +80,6 @@
Key *key,
u_char *signature, int signaturelen,
u_char *data, int datalen);
+const char *key_matching_data(char *cp);
#endif
diff -ur openssh-2.9p1/session.c openssh-2.9p1authdata/session.c
--- openssh-2.9p1/session.c Wed Apr 18 09:29:34 2001
+++ openssh-2.9p1authdata/session.c Thu May 17 00:41:15 2001
@@ -57,6 +57,7 @@
#include "...
2002 Apr 24
1
Fwd: need help in ssh client: key exchange
This is debugs seen on server, whose keys are
not accepted by the client:
debug1: Seeding random number generator
debug1: sshd version OpenSSH_2.5.2p2
debug1: load_private_key_autodetect: type 0 RSA1
debug1: read SSH2 private key done: name rsa w/o
comment success 1
debug1: load_private_key_autodetect: type 1 RSA
debug1: read SSH2 private key done: name dsa w/o
comment success 1
debug1:
2013 May 15
2
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?
Functionality request for supporting Digital Signatures for RSA and DSS
Public Key Algorithms in alignment with NIST SP800-131A.
I
assume this has been asked before, but I could not find in the
archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key
algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH
Extension Algorithms are supported, but not a
2003 Oct 08
4
OS/390 openssh
...get_binary(&b, &len);
if ((session_id2 == NULL) ||
(len != session_id2_len) ||
(memcmp(p, session_id2, session_id2_len) != 0))
@@ -1122,9 +1122,9 @@
int verified = 0;
int valid_data = 0;
- blob = buffer_get_string(m, &bloblen);
- signature = buffer_get_string(m, &signaturelen);
- data = buffer_get_string(m, &datalen);
+ blob = buffer_get_binary(m, &bloblen);
+ signature = buffer_get_binary(m, &signaturelen);
+ data = buffer_get_binary(m, &datalen);
if (hostbased_cuser == NULL || hostbased_chost == NULL ||
!monitor_allowed_key(blob, bloblen))
@@ -...