search for: u_char

Displaying 20 results from an estimated 178 matches for "u_char".

Did you mean: x_char
2004 Feb 04
3
[PATCH] Adding ocfs support to blkid
...cleCFS", probe_ocfs }, { NULL, 0, 0, 0, NULL, NULL } }; diff -Nru a/lib/blkid/probe.h b/lib/blkid/probe.h --- a/lib/blkid/probe.h Wed Feb 4 00:21:03 2004 +++ b/lib/blkid/probe.h Wed Feb 4 00:21:03 2004 @@ -209,6 +209,27 @@ __u32 h_blksize; }; +struct ocfs_volume_header { + u_char minor_version[4]; + u_char major_version[4]; + u_char signature[128]; + u_char mount[128]; + u_char mount_len[2]; +}; + +struct ocfs_volume_label { + u_char disk_lock[48]; + u_char label[64]; + u_char label_len[2]; + u_char vol_id[16]; + u_char vol_id_len[2]; +}; + +#define ocfslabellen(o) ((u...
2001 Sep 14
8
Call for testers.
http://bass.directhit.com/openssh_snap/ Starting tonight I plan on tracking changes very closely with the OpenBSD tree. I need people to test the latest snapshot (9/14 at of right now) and report success or failure on compiling. I am starting this now because we are looking at a code freeze soon and I really want to ensure it compiles and runs on all existing platforms. So we (the portable
2009 Jul 16
1
Compilation error
...c -o np/vis.o_a np/vis.c: In function `svis': np/vis.c:205: error: `u_int32_t' undeclared (first use in this function) np/vis.c:205: error: (Each undeclared identifier is reported only once np/vis.c:205: error: for each function it appears in.) np/vis.c:205: error: syntax error before "u_char" np/vis.c:205: error: syntax error before ')' token np/vis.c:205: error: syntax error before "u_char" np/vis.c:205: error: syntax error before ')' token np/vis.c:207: error: syntax error before "u_char" np/vis.c:207: error: syntax error before ')' to...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string client_version_string. These are used just in a few functions and can easily be passed as parameters. Also, there is a strange construct, where their memory is allocated to the global pointers, then copies of these pointers are assigned to the kex structure. The kex_free finally frees them via cleanup of the kex
2013 Jan 14
3
Inconsisten declaration of ssh_aes_ctr_iv()
...pat.h 9 Jan 2013 05:42:49 -0000 1.21 +++ openbsd-compat/openssl-compat.h 14 Jan 2013 18:39:27 -0000 @@ -68,7 +68,7 @@ #define EVP_aes_192_ctr evp_aes_128_ctr #define EVP_aes_256_ctr evp_aes_128_ctr extern const EVP_CIPHER *evp_aes_128_ctr(void); -extern void ssh_aes_ctr_iv(EVP_CIPHER_CTX *, int, u_char *, u_int); +extern void ssh_aes_ctr_iv(EVP_CIPHER_CTX *, int, u_char *, size_t); #endif /* Avoid some #ifdef. Code that uses these is unreachable without GCM */ -- Iain Morgan
2020 Jan 16
3
[patch 1/2] use chacha20 from openssl (1.1.0+) when possible
...est my changes, but I believe something like this should address the difference: diff --git a/cipher-chachapoly.c b/cipher-chachapoly.c index a58616fb..7e6995f6 100644 --- a/cipher-chachapoly.c +++ b/cipher-chachapoly.c @@ -109,7 +109,14 @@ chachapoly_crypt(struct chachapoly_ctx *ctx, u_int seqnr, u_char *dest, const u_char *src, u_int len, u_int aadlen, u_int authlen, int do_encrypt) { #if defined(WITH_OPENSSL) && defined(HAVE_EVP_CHACHA20) +#if defined(LIBRESSL_VERSION_NUMBER) +#define CHACHA_IV_OFFSET 4 + u_char seqbuf[12]; +#else +#define CHACHA_IV_OFFSET 8 + /* OpenSSL IV contai...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
...c->number != SSH_CIPHER_SSH2) { debug("bad cipher %s [%s]", p, names); xfree(cipher_list); @@ -291,9 +300,25 @@ cipher_set_key_string(CipherContext *cc, Cipher *cipher, const char *passphrase, int do_encrypt) { +#ifdef OPENSSL_FIPS + SHA_CTX sha; +#endif MD5_CTX md; - u_char digest[16]; + u_char digest[20]; +#ifdef OPENSSL_FIPS + if (fips_mode) { + SHA1_Init(&sha); + SHA1_Update(&sha, (const u_char *)passphrase, strlen(passphrase)); + SHA1_Final(digest, &sha); + + cipher_init(cc, cipher, digest, 20, NULL, 0, do_encrypt); + + memset(digest, 0, sizeof...
2013 Jun 09
1
[PATCH] fix mac_computer
...tion in openssh calls umac_final() to prepend a tag to a buffer. Umac_final() calls pdf_gen_xor() on the tag as its final operation, and as implemented, pdf_gen_xor() assumes an appropriate alignment for 64-bit operations on its buffer. However, the buffer is declared in mac_compute() as a static u_char array, and the linker doesn't guarantee 64-bit alignment for such arrays. On ARM v7 NEON platforms with gcc, 64-bit values must be 64-bit aligned, and the unaligned buffer declaration caused alignment faults when executing certain openssh tests. Force the buffer in mac_compute() to be 64-bit...
2013 May 15
2
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?‏
Functionality request for supporting Digital Signatures for RSA and DSS Public Key Algorithms in alignment with NIST SP800-131A. I assume this has been asked before, but I could not find in the archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH Extension Algorithms are supported, but not a
2007 Apr 18
0
[Bridge] BCP code ported to pppd 2.4.2
...that peer ack'd */ +bcp_options bcp_allowoptions[NUM_PPP]; /* Options we allow peer to request */ +bcp_options bcp_hisoptions[NUM_PPP]; /* Options that we ack'd */ + +/* local vars */ +static int bcp_is_up; /* have called np_up() */ + +static bool bcp_maclocal_valid; +static u_char bcp_maclocal[ETH_ALEN]; +static char bcp_maclocal_str[3*ETH_ALEN]; /* string form of "maclocal" arg */ + +/* + * Callbacks for fsm code. (CI = Configuration Information) + */ +static void bcp_resetci __P((fsm *)); /* Reset our CI */ +static int bcp_cilen __P((fsm *)); /*...
2015 Mar 17
2
[patch] Updated patch for pkcs#11 smartcard readers that have a protected PIN path
...31 2015 +0100 Ensuring support for PINs that can only be entered on a secure keypad (CKF_PROTECTED_AUTHENTICATION_PATH) diff --git a/ssh-pkcs11.c b/ssh-pkcs11.c index c3a112f..b053332 100644 --- a/ssh-pkcs11.c +++ b/ssh-pkcs11.c @@ -255,22 +255,30 @@ pkcs11_rsa_private_encrypt(int flen, const u_char *from, u_char *to, RSA *rsa, si = &k11->provider->slotinfo[k11->slotidx]; if ((si->token.flags & CKF_LOGIN_REQUIRED) && !si->logged_in) { if (!pkcs11_interactive) { - error("need pin"); + error("need pin%s", + (si->token.flags &am...
2004 Aug 06
2
ices2 + pid-file (was: ices2 + stdin + metadata)
Ok, so i have to know the PID of ices to send the update-signal. I've added this to my ices.xml: <pidfile>/home/www/bin/ices.pid</pidfile> (directly under the node <ices>) I thought i've seen this somewhere in the manual. However, when i start ices, no pid-file is created :-/ Is this the right way? <p>----- Original Message ----- From: "Karl Heyes"
2002 Mar 08
1
Problems with Solaris 8 and OpenSSH 3.1p1
When compiling the software it breaks with an error on the cipher.c file. Lot's of warnings and error of undeclared stuff. Snippet follows: gcc -g -O2 -Wall -Wpointer-arith -Wno-uninitialized -I. -I. -I/usr/local/ssl/include -Iyes -I/usr/local/include -DSSHDIR=\"/etc\" -D_PATH_SSH_PROGRAM=\"/usr/bin/ssh\"
2014 Jun 16
1
[PATCH 1/1] rework printing for visual host key upper border
...048]----+ +--[ECDSA 256]---+ +---[ECDSA 256]---+ +--[ED25519 256--+ +--[ED25519 256]--+ --- key.c | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/key.c b/key.c index e8fc5b1..a71d46c 100644 --- a/key.c +++ b/key.c @@ -547,13 +547,14 @@ key_fingerprint_randomart(u_char *dgst_raw, u_int dgst_raw_len, const Key *k) * intersects with itself. Matter of taste. */ char *augmentation_string = " .o+=*BOX@%&#/^SE"; - char *retval, *p; + char *retval, *p, key_details[FLDSIZE_X + 1]; u_char field[FLDSIZE_X][FLDSIZE_Y]; u_int i, b; int x, y;...
2004 Jan 01
1
[PATCH] Add winbind-backed NTLMSSP support to Cyrus-SASL
...TH 16 - -typedef unsigned short uint16; -typedef unsigned int uint32; - -typedef enum { - NTLM_REQUEST = 1, - NTLM_CHALLENGE = 2, - NTLM_RESPONSE = 3 -} ntlm_type_t; - -typedef struct { - uint16 len; - uint16 maxlen; - uint32 offset; -} ntlm_buffer_t; - -typedef struct { - u_char sig[sizeof(NTLM_SIGNATURE)]; - uint32 type; - uint32 flags; - ntlm_buffer_t domain; - ntlm_buffer_t wkstn; - /* buffer data follows */ -} ntlm_request_t; - -typedef struct { - u_char sig[sizeof(NTLM_SIGNATURE)]; - uint32 type; - ntlm_buffer_t domain; - uint32 flags; -...
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
...KEX_C25519_SHA256, KEX_MAX }; @@ -161,6 +163,8 @@ void kexgex_client(Kex *); void kexgex_server(Kex *); void kexecdh_client(Kex *); void kexecdh_server(Kex *); +void kexc25519_client(Kex *); +void kexc25519_server(Kex *); void kex_dh_hash(char *, char *, char *, int, char *, int, u_char *, int, @@ -177,6 +181,11 @@ kex_ecdh_hash(const EVP_MD *, const EC_GROUP *, char *, char *, char *, int, #endif void +kex_c25519_hash(const EVP_MD *, char *, char *, char *, int, + char *, int, u_char *, int, const unsigned char *, const unsigned char *, + const BIGNUM *, u_char **, u_in...
2011 Oct 03
0
patch: Fix [-Wunused-but-set-variable]
...psfd, buf, sizeof(buf)); return; } Index: b/drivers/mge-shut.c =================================================================== --- a/drivers/mge-shut.c 2011-05-31 13:36:49.000000000 +0300 +++ b/drivers/mge-shut.c 2011-08-17 00:23:22.000000000 +0300 @@ -796,7 +796,6 @@ int shut_packet_recv (u_char *Buf, int d u_short Pos=0; u_char Retry=0; int recv; - shut_data_t sdata; upsdebugx (4, "entering shut_packet_recv (%i)", datalen); @@ -804,7 +803,6 @@ int shut_packet_recv (u_char *Buf, int d { if(serial_read (DEFAULT_TIMEOUT, &Start[0]) >= 0) { - sdata....
2015 May 09
5
[Bug 2396] New: Out of bounds read when parsing EscapeChar configuration value
...ssh Assignee: unassigned-bugs at mindrot.org Reporter: jaak+mindrot at ristioja.ee An out of bounds memory read occurs during parsing the value for EscapeChar in the following if-statement in readconf.c:1239: if (arg[0] == '^' && arg[2] == 0 && (u_char) arg[1] >= 64 && (u_char) arg[1] < 128) This is erroneous because arg[2] might be one character off the end of the string. I suggest the first two branches be rewritten as follows: if (arg[1] == 0) // was "else if (strlen(arg) == 1)" value = (u_char) arg[0]; else...
1997 Nov 14
0
Linux IP fragment overlap bug (fwd)
...ame padding for first packet */ #define MAGIC 0x3 /* Magic Fragment Constant (tm). Should be 2 or 3 */ #define COUNT 0x1 /* Linux dies with 1, NT is more stalwart and can * withstand maybe 5 or 10 sometimes... Experiment. */ void usage(u_char *); u_long name_resolve(u_char *); u_short in_cksum(u_short *, int); void send_frags(int, u_long, u_long, u_short, u_short); int main(int argc, char **argv) { int one = 1, count = 0, i, rip_sock; u_long src_ip = 0, dst_ip = 0; u_short src_prt = 0, dst_prt = 0; struct in_addr addr;...
2002 Nov 17
0
[PATCH] Patches to rsync-2.5.5 for Stratus VOS (update)
...added it. I am not enclosing patches for config.guess and config.sub, but I would request that you pick up current copies of these. The ones in the rsync-2.5.5 package are a year old and do not recognize VOS (the current ones do recognize us). These patches change some Unix types to POSIX types (u_char -> uchar_t), hide various unused declarations on systems that don't implement IPv6, supply a network constants if the system doesn't supply it, and properly supply a version of inet_pton on systems that don't have one. (Looks like an editing error misspelled inet_pton). If you have...