search for: ssh2_agent_sign_response

Displaying 5 results from an estimated 5 matches for "ssh2_agent_sign_response".

2000 Oct 08
1
OpenSSH-2.2.0 problem with ssh.com ssh-agent2
...!= SSH_AGENT_RSA_RESPONSE) { fatal("Bad authentication response: %d", type); *************** *** 366,372 **** return -1; } type = buffer_get_char(&msg); ! if (agent_failed(type)) { log("Agent admitted failure to sign using the key."); } else if (type != SSH2_AGENT_SIGN_RESPONSE) { fatal("Bad authentication response: %d", type); --- 366,372 ---- return -1; } type = buffer_get_char(&msg); ! if (type == SSH_AGENT_FAILURE) { log("Agent admitted failure to sign using the key."); } else if (type != SSH2_AGENT_SIGN_RESPONSE) { fa...
2003 Sep 16
0
help verifying ssh-agent signature from python?
...licKey.RSA module, but it keeps failing to verify. I've stared at it for about 5 hours now... I went and read RFC 2437... that seemed straightforward. I tried to read the underlying RSA signature code in the openssl library; truth be told, I couldn't follow that. But I'm pretty sure the SSH2_AGENT_SIGN_RESPONSE message carries just the key type name ("ssh-rsa") and the signature data in buffer_put_bignum2 SSH2 format; I should be able to just decode that bignum and pass it right to k.verify(dh, (sigdata,)) no? Are there some padding bytes or encoding or something that I'm missing? Help?!?!...
2006 May 15
0
[PATCH 9/12] bug fix: openssh 4.3p2 possible NULL dereference
...*e) Identity *id = lookup_identity(key, 2); if (id != NULL && (!id->confirm || confirm_key(id) == 0)) ok = key_sign(id->key, &signature, &slen, data, dlen); + key_free(key); } - key_free(key); buffer_init(&msg); if (ok == 0) { buffer_put_char(&msg, SSH2_AGENT_SIGN_RESPONSE);
2015 Mar 31
7
Wanted: smartcard with ECDSA support
Hi list, I have no idea if Damien Miller had the time to work on that. I have an initial patch to authenticate using PKCS#11 and ECDSA keys. This requires OpenSSL 1.0.2, prior OpenSSL versions do not expose the required interfaces to override the signature function pointer for ECDSA. The only limitation is that the OpenSSL API misses some cleanup function (finish, for instance), hence I have yet
2003 Oct 08
4
OS/390 openssh
...+ blob = buffer_get_binary(&e->request, &blen); + data = buffer_get_binary(&e->request, &dlen); flags = buffer_get_int(&e->request); if (flags & SSH_AGENT_OLD_SIGNATURE) @@ -319,7 +319,7 @@ buffer_init(&msg); if (ok == 0) { buffer_put_char(&msg, SSH2_AGENT_SIGN_RESPONSE); - buffer_put_string(&msg, signature, slen); + buffer_put_binary(&msg, signature, slen); } else { buffer_put_char(&msg, SSH_AGENT_FAILURE); } @@ -354,7 +354,7 @@ key_size(key), bits); break; case 2: - blob = buffer_get_string(&e->request, &blen); + bl...