Displaying 3 results from an estimated 3 matches for "sshbuf_get_string".
Did you mean:
sshbuf_get_cstring
2017 Nov 14
2
OpenSSH 7.6p1 ssh-agent exiting if passed an invalid key blob
...socket: cleanup
The ssh-agent actually exited in this case, as the ?buffer error? here was a fatal() condition. The message sent to the agent was well-formed, though. It was only the key blob that was not recognizable. Looking more closely at the code, the 7.5p1 code looked like:
if ((r = sshbuf_get_string(e->request, &blob, &blen)) != 0 ||
(r = sshbuf_get_string(e->request, &data, &dlen)) != 0 ||
(r = sshbuf_get_u32(e->request, &flags)) != 0)
fatal("%s: buffer error: %s", __func__, ssh_err(r));
if (flags & SSH...
2018 Sep 06
4
Some wishes regarding revoked keys
Hello.
I am trying to play through the following test scenario about
certificate revocation on Ubuntu 18.04, which has OpenSSH of this version:
OpenSSH_7.6p1 Ubuntu-4, OpenSSL 1.0.2n? 7 Dec 2017
1. A CA key is created
ssh-keygen -t ed25519 -f ca
2. The CA public key is added to ~/.ssh/authorized_keys on some server:
cert-authority ssh-ed25519 AAAA...e ca at yoga
3. A user key is created on a
2020 Apr 25
2
[PATCH 1/3] Add private key protection information extraction to ssh-keygen
...OC_FAIL;
+?? ??? ?goto out;
+?? ?}
??? ?if (strcmp(kdfname, "none") == 0 && strcmp(ciphername, "none") != 0) {
??? ??? ?r = SSH_ERR_INVALID_FORMAT;
??? ??? ?goto out;
@@ -4108,6 +4168,7 @@ private2_decrypt(struct sshbuf *decoded, const
char *passphrase,
??? ??? ?if ((r = sshbuf_get_string(kdf, &salt, &slen)) != 0 ||
??? ??? ???? (r = sshbuf_get_u32(kdf, &rounds)) != 0)
??? ??? ??? ?goto out;
+?? ??? ?vault_info->rounds = rounds;
??? ??? ?if (bcrypt_pbkdf(passphrase, strlen(passphrase), salt, slen,
??? ??? ???? key, keylen + ivlen, rounds) < 0) {
??? ??? ??? ?r = SS...