Displaying 20 results from an estimated 178 matches for "u_char".
Did you mean:
x_char
2004 Feb 04
3
[PATCH] Adding ocfs support to blkid
...cleCFS", probe_ocfs },
{ NULL, 0, 0, 0, NULL, NULL }
};
diff -Nru a/lib/blkid/probe.h b/lib/blkid/probe.h
--- a/lib/blkid/probe.h Wed Feb 4 00:21:03 2004
+++ b/lib/blkid/probe.h Wed Feb 4 00:21:03 2004
@@ -209,6 +209,27 @@
__u32 h_blksize;
};
+struct ocfs_volume_header {
+ u_char minor_version[4];
+ u_char major_version[4];
+ u_char signature[128];
+ u_char mount[128];
+ u_char mount_len[2];
+};
+
+struct ocfs_volume_label {
+ u_char disk_lock[48];
+ u_char label[64];
+ u_char label_len[2];
+ u_char vol_id[16];
+ u_char vol_id_len[2];
+};
+
+#define ocfslabellen(o) ((u...
2001 Sep 14
8
Call for testers.
http://bass.directhit.com/openssh_snap/
Starting tonight I plan on tracking changes very closely with the OpenBSD
tree. I need people to test the latest snapshot (9/14 at of right now)
and report success or failure on compiling.
I am starting this now because we are looking at a code freeze soon and I
really want to ensure it compiles and runs on all existing platforms. So
we (the portable
2009 Jul 16
1
Compilation error
...c -o np/vis.o_a
np/vis.c: In function `svis':
np/vis.c:205: error: `u_int32_t' undeclared (first use in this function)
np/vis.c:205: error: (Each undeclared identifier is reported only once
np/vis.c:205: error: for each function it appears in.)
np/vis.c:205: error: syntax error before "u_char"
np/vis.c:205: error: syntax error before ')' token
np/vis.c:205: error: syntax error before "u_char"
np/vis.c:205: error: syntax error before ')' token
np/vis.c:207: error: syntax error before "u_char"
np/vis.c:207: error: syntax error before ')' to...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string
client_version_string.
These are used just in a few functions and can easily be passed as
parameters.
Also, there is a strange construct, where their memory is allocated to
the global pointers, then copies of these pointers are assigned to the
kex structure. The kex_free finally frees them via cleanup of the kex
2013 Jan 14
3
Inconsisten declaration of ssh_aes_ctr_iv()
...pat.h 9 Jan 2013 05:42:49 -0000 1.21
+++ openbsd-compat/openssl-compat.h 14 Jan 2013 18:39:27 -0000
@@ -68,7 +68,7 @@
#define EVP_aes_192_ctr evp_aes_128_ctr
#define EVP_aes_256_ctr evp_aes_128_ctr
extern const EVP_CIPHER *evp_aes_128_ctr(void);
-extern void ssh_aes_ctr_iv(EVP_CIPHER_CTX *, int, u_char *, u_int);
+extern void ssh_aes_ctr_iv(EVP_CIPHER_CTX *, int, u_char *, size_t);
#endif
/* Avoid some #ifdef. Code that uses these is unreachable without GCM */
--
Iain Morgan
2020 Jan 16
3
[patch 1/2] use chacha20 from openssl (1.1.0+) when possible
...est my changes, but I believe something like this should address the
difference:
diff --git a/cipher-chachapoly.c b/cipher-chachapoly.c
index a58616fb..7e6995f6 100644
--- a/cipher-chachapoly.c
+++ b/cipher-chachapoly.c
@@ -109,7 +109,14 @@ chachapoly_crypt(struct chachapoly_ctx *ctx, u_int
seqnr, u_char *dest,
const u_char *src, u_int len, u_int aadlen, u_int authlen, int
do_encrypt)
{
#if defined(WITH_OPENSSL) && defined(HAVE_EVP_CHACHA20)
+#if defined(LIBRESSL_VERSION_NUMBER)
+#define CHACHA_IV_OFFSET 4
+ u_char seqbuf[12];
+#else
+#define CHACHA_IV_OFFSET 8
+ /* OpenSSL IV contai...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
...c->number != SSH_CIPHER_SSH2) {
debug("bad cipher %s [%s]", p, names);
xfree(cipher_list);
@@ -291,9 +300,25 @@
cipher_set_key_string(CipherContext *cc, Cipher *cipher,
const char *passphrase, int do_encrypt)
{
+#ifdef OPENSSL_FIPS
+ SHA_CTX sha;
+#endif
MD5_CTX md;
- u_char digest[16];
+ u_char digest[20];
+#ifdef OPENSSL_FIPS
+ if (fips_mode) {
+ SHA1_Init(&sha);
+ SHA1_Update(&sha, (const u_char *)passphrase, strlen(passphrase));
+ SHA1_Final(digest, &sha);
+
+ cipher_init(cc, cipher, digest, 20, NULL, 0, do_encrypt);
+
+ memset(digest, 0, sizeof...
2013 Jun 09
1
[PATCH] fix mac_computer
...tion in openssh calls umac_final() to prepend a tag
to a buffer. Umac_final() calls pdf_gen_xor() on the tag as its final
operation, and as implemented, pdf_gen_xor() assumes an appropriate
alignment for 64-bit operations on its buffer. However, the buffer
is declared in mac_compute() as a static u_char array, and the linker
doesn't guarantee 64-bit alignment for such arrays. On ARM v7 NEON
platforms with gcc, 64-bit values must be 64-bit aligned, and the
unaligned buffer declaration caused alignment faults when executing
certain openssh tests.
Force the buffer in mac_compute() to be 64-bit...
2013 May 15
2
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?
Functionality request for supporting Digital Signatures for RSA and DSS
Public Key Algorithms in alignment with NIST SP800-131A.
I
assume this has been asked before, but I could not find in the
archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key
algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH
Extension Algorithms are supported, but not a
2007 Apr 18
0
[Bridge] BCP code ported to pppd 2.4.2
...that peer ack'd */
+bcp_options bcp_allowoptions[NUM_PPP]; /* Options we allow peer to
request */
+bcp_options bcp_hisoptions[NUM_PPP]; /* Options that we ack'd */
+
+/* local vars */
+static int bcp_is_up; /* have called np_up() */
+
+static bool bcp_maclocal_valid;
+static u_char bcp_maclocal[ETH_ALEN];
+static char bcp_maclocal_str[3*ETH_ALEN]; /* string form of "maclocal"
arg */
+
+/*
+ * Callbacks for fsm code. (CI = Configuration Information)
+ */
+static void bcp_resetci __P((fsm *)); /* Reset our CI */
+static int bcp_cilen __P((fsm *)); /*...
2015 Mar 17
2
[patch] Updated patch for pkcs#11 smartcard readers that have a protected PIN path
...31 2015 +0100
Ensuring support for PINs that can only be entered on a secure keypad (CKF_PROTECTED_AUTHENTICATION_PATH)
diff --git a/ssh-pkcs11.c b/ssh-pkcs11.c
index c3a112f..b053332 100644
--- a/ssh-pkcs11.c
+++ b/ssh-pkcs11.c
@@ -255,22 +255,30 @@ pkcs11_rsa_private_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa,
si = &k11->provider->slotinfo[k11->slotidx];
if ((si->token.flags & CKF_LOGIN_REQUIRED) && !si->logged_in) {
if (!pkcs11_interactive) {
- error("need pin");
+ error("need pin%s",
+ (si->token.flags &am...
2004 Aug 06
2
ices2 + pid-file (was: ices2 + stdin + metadata)
Ok, so i have to know the PID of ices to send the update-signal. I've added
this to my ices.xml:
<pidfile>/home/www/bin/ices.pid</pidfile> (directly under the node <ices>)
I thought i've seen this somewhere in the manual.
However, when i start ices, no pid-file is created :-/ Is this the right
way?
<p>----- Original Message -----
From: "Karl Heyes"
2002 Mar 08
1
Problems with Solaris 8 and OpenSSH 3.1p1
When compiling the software it breaks with an error on the cipher.c file.
Lot's of warnings and error of undeclared stuff.
Snippet follows:
gcc -g -O2 -Wall -Wpointer-arith -Wno-uninitialized -I. -I.
-I/usr/local/ssl/include -Iyes -I/usr/local/include -DSSHDIR=\"/etc\"
-D_PATH_SSH_PROGRAM=\"/usr/bin/ssh\"
2014 Jun 16
1
[PATCH 1/1] rework printing for visual host key upper border
...048]----+
+--[ECDSA 256]---+
+---[ECDSA 256]---+
+--[ED25519 256--+
+--[ED25519 256]--+
---
key.c | 12 ++++++++----
1 file changed, 8 insertions(+), 4 deletions(-)
diff --git a/key.c b/key.c
index e8fc5b1..a71d46c 100644
--- a/key.c
+++ b/key.c
@@ -547,13 +547,14 @@ key_fingerprint_randomart(u_char *dgst_raw, u_int dgst_raw_len, const Key *k)
* intersects with itself. Matter of taste.
*/
char *augmentation_string = " .o+=*BOX@%&#/^SE";
- char *retval, *p;
+ char *retval, *p, key_details[FLDSIZE_X + 1];
u_char field[FLDSIZE_X][FLDSIZE_Y];
u_int i, b;
int x, y;...
2004 Jan 01
1
[PATCH] Add winbind-backed NTLMSSP support to Cyrus-SASL
...TH 16
-
-typedef unsigned short uint16;
-typedef unsigned int uint32;
-
-typedef enum {
- NTLM_REQUEST = 1,
- NTLM_CHALLENGE = 2,
- NTLM_RESPONSE = 3
-} ntlm_type_t;
-
-typedef struct {
- uint16 len;
- uint16 maxlen;
- uint32 offset;
-} ntlm_buffer_t;
-
-typedef struct {
- u_char sig[sizeof(NTLM_SIGNATURE)];
- uint32 type;
- uint32 flags;
- ntlm_buffer_t domain;
- ntlm_buffer_t wkstn;
- /* buffer data follows */
-} ntlm_request_t;
-
-typedef struct {
- u_char sig[sizeof(NTLM_SIGNATURE)];
- uint32 type;
- ntlm_buffer_t domain;
- uint32 flags;
-...
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
...KEX_C25519_SHA256,
KEX_MAX
};
@@ -161,6 +163,8 @@ void kexgex_client(Kex *);
void kexgex_server(Kex *);
void kexecdh_client(Kex *);
void kexecdh_server(Kex *);
+void kexc25519_client(Kex *);
+void kexc25519_server(Kex *);
void
kex_dh_hash(char *, char *, char *, int, char *, int, u_char *, int,
@@ -177,6 +181,11 @@ kex_ecdh_hash(const EVP_MD *, const EC_GROUP *, char *, char *, char *, int,
#endif
void
+kex_c25519_hash(const EVP_MD *, char *, char *, char *, int,
+ char *, int, u_char *, int, const unsigned char *, const unsigned char *,
+ const BIGNUM *, u_char **, u_in...
2011 Oct 03
0
patch: Fix [-Wunused-but-set-variable]
...psfd, buf, sizeof(buf));
return;
}
Index: b/drivers/mge-shut.c
===================================================================
--- a/drivers/mge-shut.c 2011-05-31 13:36:49.000000000 +0300
+++ b/drivers/mge-shut.c 2011-08-17 00:23:22.000000000 +0300
@@ -796,7 +796,6 @@ int shut_packet_recv (u_char *Buf, int d
u_short Pos=0;
u_char Retry=0;
int recv;
- shut_data_t sdata;
upsdebugx (4, "entering shut_packet_recv (%i)", datalen);
@@ -804,7 +803,6 @@ int shut_packet_recv (u_char *Buf, int d
{
if(serial_read (DEFAULT_TIMEOUT, &Start[0]) >= 0)
{
- sdata....
2015 May 09
5
[Bug 2396] New: Out of bounds read when parsing EscapeChar configuration value
...ssh
Assignee: unassigned-bugs at mindrot.org
Reporter: jaak+mindrot at ristioja.ee
An out of bounds memory read occurs during parsing the value for
EscapeChar in the following if-statement in readconf.c:1239:
if (arg[0] == '^' && arg[2] == 0 &&
(u_char) arg[1] >= 64 && (u_char) arg[1] < 128)
This is erroneous because arg[2] might be one character off the end of
the string. I suggest the first two branches be rewritten as follows:
if (arg[1] == 0) // was "else if (strlen(arg) == 1)"
value = (u_char) arg[0];
else...
1997 Nov 14
0
Linux IP fragment overlap bug (fwd)
...ame padding for first packet */
#define MAGIC 0x3 /* Magic Fragment Constant (tm). Should be 2 or 3 */
#define COUNT 0x1 /* Linux dies with 1, NT is more stalwart and can
* withstand maybe 5 or 10 sometimes... Experiment.
*/
void usage(u_char *);
u_long name_resolve(u_char *);
u_short in_cksum(u_short *, int);
void send_frags(int, u_long, u_long, u_short, u_short);
int main(int argc, char **argv)
{
int one = 1, count = 0, i, rip_sock;
u_long src_ip = 0, dst_ip = 0;
u_short src_prt = 0, dst_prt = 0;
struct in_addr addr;...
2002 Nov 17
0
[PATCH] Patches to rsync-2.5.5 for Stratus VOS (update)
...added
it.
I am not enclosing patches for config.guess and config.sub, but
I would request that you pick up current copies of these. The
ones in the rsync-2.5.5 package are a year old and do not
recognize VOS (the current ones do recognize us).
These patches change some Unix types to POSIX types (u_char ->
uchar_t), hide various unused declarations on systems that don't
implement IPv6, supply a network constants if the system doesn't
supply it, and properly supply a version of inet_pton on systems
that don't have one. (Looks like an editing error misspelled
inet_pton).
If you have...