search for: signaturelen

Displaying 5 results from an estimated 5 matches for "signaturelen".

Did you mean: signature_len
2002 Apr 24
0
need help in ssh client: key exchange
...re, slen, hash, 20) != 1){ fatal("key_verify failed for server_host_key"); exit(-109); } I see: (gdb) p key->type $1 = 1 which would mean: KEY_RSA. Can someone please let me know: why in file key.c: case KEY_RSA: return ssh_rsa_verify(key, signature, signaturelen, data, datalen); break; when would routine: ssh_rsa_verify(..) fail and why ? I am trying to do password based authentication on V2. Is it mandatory that v2 used only RSA based authentication ? Any help/info is appreciated. Thank you, _____________________________________________...
2001 May 17
0
Patch: Set SSH_AUTHKEY to key id used to authenticate.
...len++) + *s = *cp; + *s = '\0'; + isSet = 1; + + return(NULL); +} diff -ur openssh-2.9p1/key.h openssh-2.9p1authdata/key.h --- openssh-2.9p1/key.h Tue Apr 17 12:11:37 2001 +++ openssh-2.9p1authdata/key.h Thu May 17 00:34:28 2001 @@ -80,5 +80,6 @@ Key *key, u_char *signature, int signaturelen, u_char *data, int datalen); +const char *key_matching_data(char *cp); #endif diff -ur openssh-2.9p1/session.c openssh-2.9p1authdata/session.c --- openssh-2.9p1/session.c Wed Apr 18 09:29:34 2001 +++ openssh-2.9p1authdata/session.c Thu May 17 00:41:15 2001 @@ -57,6 +57,7 @@ #include "...
2002 Apr 24
1
Fwd: need help in ssh client: key exchange
This is debugs seen on server, whose keys are not accepted by the client: debug1: Seeding random number generator debug1: sshd version OpenSSH_2.5.2p2 debug1: load_private_key_autodetect: type 0 RSA1 debug1: read SSH2 private key done: name rsa w/o comment success 1 debug1: load_private_key_autodetect: type 1 RSA debug1: read SSH2 private key done: name dsa w/o comment success 1 debug1:
2013 May 15
2
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?‏
Functionality request for supporting Digital Signatures for RSA and DSS Public Key Algorithms in alignment with NIST SP800-131A. I assume this has been asked before, but I could not find in the archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH Extension Algorithms are supported, but not a
2003 Oct 08
4
OS/390 openssh
...get_binary(&b, &len); if ((session_id2 == NULL) || (len != session_id2_len) || (memcmp(p, session_id2, session_id2_len) != 0)) @@ -1122,9 +1122,9 @@ int verified = 0; int valid_data = 0; - blob = buffer_get_string(m, &bloblen); - signature = buffer_get_string(m, &signaturelen); - data = buffer_get_string(m, &datalen); + blob = buffer_get_binary(m, &bloblen); + signature = buffer_get_binary(m, &signaturelen); + data = buffer_get_binary(m, &datalen); if (hostbased_cuser == NULL || hostbased_chost == NULL || !monitor_allowed_key(blob, bloblen)) @@ -...