similar to: [Bug 231] New: ssh-keygen has fatal error while updating comment in RSA1 key

Displaying 20 results from an estimated 6000 matches similar to: "[Bug 231] New: ssh-keygen has fatal error while updating comment in RSA1 key"

2002 May 11
2
[Bug 231] ssh-keygen has fatal error while updating comment in RSA1 key
http://bugzilla.mindrot.org/show_bug.cgi?id=231 ------- Additional Comments From stevesk at pobox.com 2002-05-12 05:31 ------- the error is not seen in current i believe due to the fix to arc4random() to call seed_rng() correctly. is there a way we can reduce the diff in terms of moving function calls around due to delaying RNG seeding?
2002 Jul 20
0
[Bug 231] ssh-keygen has fatal error while updating comment in RSA1 key
http://bugzilla.mindrot.org/show_bug.cgi?id=231 stevesk at pobox.com changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |FIXED ------- Additional Comments From stevesk at pobox.com 2002-07-21 05:05
2015 Mar 22
5
[Bug 2369] New: `ssh-keygen -A` errors on RSA1 when building with SSH1 disabled
https://bugzilla.mindrot.org/show_bug.cgi?id=2369 Bug ID: 2369 Summary: `ssh-keygen -A` errors on RSA1 when building with SSH1 disabled Product: Portable OpenSSH Version: 6.9p1 Hardware: All OS: All Status: NEW Severity: normal Priority: P5 Component: ssh-keygen
2015 Dec 08
2
[Bug 2513] New: Do not mention rsa1 key type in ssh-keygen usage & in manual pages
https://bugzilla.mindrot.org/show_bug.cgi?id=2513 Bug ID: 2513 Summary: Do not mention rsa1 key type in ssh-keygen usage & in manual pages Product: Portable OpenSSH Version: 7.1p1 Hardware: Other OS: Linux Status: NEW Keywords: patch Severity: enhancement
2015 Sep 07
10
[Bug 2459] New: ssh-keygen -t rsa1 should be removed from Makefile
https://bugzilla.mindrot.org/show_bug.cgi?id=2459 Bug ID: 2459 Summary: ssh-keygen -t rsa1 should be removed from Makefile Product: Portable OpenSSH Version: 7.1p1 Hardware: All OS: All Status: NEW Severity: trivial Priority: P5 Component: Build system Assignee:
2001 Mar 14
1
poor default seeding of RNG
Correct me if I'm wrong, but init_rng() in entropy.c doesn't call seed_rng(), and in fact seed_rng() isn't called from _anywhere_ (in openssh-2.5.1p2). So calls to BN_rand() only pick up the tiny/non-existent amount of entropy added by BN_rand() itself from the system clock (time in seconds). Shouldn't seed_rng() be called from init_rng()? It should be called from _somewhere_,
2004 Oct 03
3
[PATCH] PreferAskpass in ssh_config
Moin, attached is a patch, which adds a new configuration option "PreferAskpass" to the ssh config. ssh{,-add,-keygen,-agent} will use ssh-askpass to prompt for passwords, if this option is set to "yes", and if ssh-askpass is available. Default for "PreferAskpass" is "no". Pacth is against current CVS. Sebastian -- signature intentionally left blank.
2001 Jun 07
2
Patch to enable multiple possible sources of entropy
I have a need to have the same OpenSSH binaries run on multiple machines which are administered by different people. That means on Solaris, for example, there will be some with /dev/random, some on which I can run prngd because they'll be installing my binaries as root, and some which will have neither because they will be only installed as non-root. Below is a patch to enable choosing all 3
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
In the past 2 months another change occurred in the CVS code that broke my ssh-keyscan patch. Here's an updated version that tweaks the changed name (in the Kex struct) and also causes an attempt to grab an ssh2 key from an older server (without ssh2 support) to fail earlier and without an error message (Stuart Pearlman emailed me some code for this). This patch is based on the BSD CVS
2005 Jul 13
1
ssh-keygen problem with openssh-4* and openssl-0.9.7g on AIX
hi i got a strange error for openssh-4.0p1 and openssh-4.1p1 (didn't try other versions) with openssl-0.9.7g on AIX 5.1 openssl-0.9.7g and openssh build without errors, "make test" for openssl returns no errors, "make test" for openssh stops at the first connection test "make test" for openssh with openssl-0.9.6m returns no errors (i don't get errors for
2003 May 14
2
[Bug 566] ssh-keygen -l does not print key comment for rsa/dsa keys
http://bugzilla.mindrot.org/show_bug.cgi?id=566 Summary: ssh-keygen -l does not print key comment for rsa/dsa keys Product: Portable OpenSSH Version: -current Platform: All OS/Version: All Status: NEW Severity: trivial Priority: P2 Component: ssh-keygen AssignedTo:
2017 Feb 15
2
Issue with ssh-keygen
Hi, I am running openssh7.3p1 on an embedded Linux system and discovered this problem. If I run: ssh-keygen -t rsa1 -f testfile it appears to generate the key and I get the output: Generating public/private rsa1 key pair. Enter passphrase (empty for no passphrase): Enter same passphrase again: Saving key "testfile" failed: unknown or unsupported key type Should this option
2017 Feb 16
1
Issue with ssh-keygen
On Wed, Feb 15, 2017 at 9:50 PM, Kelly Dunlop <kdunlop at guralp.com> wrote: > > > Hi, > > I am running openssh7.3p1 on an embedded Linux system and discovered this problem. > > If I run: > > ssh-keygen -t rsa1 -f testfile > > it appears to generate the key and I get the output: > > Generating public/private rsa1 key pair. >
2017 Feb 16
2
Issue with ssh-keygen
On Fri, Feb 17, 2017 at 09:28:52AM +1100, Darren Tucker wrote: [...] > so yeah, ssh-keygen should have probably errored out "unsupported key type". diff --git a/sshkey.c b/sshkey.c index 4768790..f45e239 100644 --- a/sshkey.c +++ b/sshkey.c @@ -89,7 +89,9 @@ static const struct keytype keytypes[] = { { "ssh-ed25519-cert-v01 at openssh.com", "ED25519-CERT",
2003 Oct 20
12
[Bug 747] host authentication requires RSA1 keys
http://bugzilla.mindrot.org/show_bug.cgi?id=747 Summary: host authentication requires RSA1 keys Product: Portable OpenSSH Version: 3.7.1p1 Platform: All OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: Documentation AssignedTo: openssh-bugs at mindrot.org ReportedBy:
2008 Sep 15
0
No subject
hello.. i am running openssh-3.7.1p2. on linux.It is working successfully..and daemon is running &client also connecting.But the problem is with the mips architecture when i connecting this server from remote syytem.?i got an error of buufer_get:trying to get more bytes 1 than buffer0.And client is not connecting from remote system.My out is as follows on my server ?in sshd main before
2002 Feb 26
2
problem running ssh-keygen in Solaris 8 x86
Hi, I encountered the following when i run the below command on my Solaris 8 x86 box: #ssh-keygen -t rsa1 -f /usr/local/etc/ssh_host_key -N "" I got the following error: Segmentation fault - core dumped Does anyone have any idea what is wrong? I am using pre-compiled packages downloaded from sunfreeware.com. Regards, Matthew This communication contains confidential or privileged
2002 Sep 25
0
[Bug 403] New: scp generates sparse file when no space left
http://bugzilla.mindrot.org/show_bug.cgi?id=403 Summary: scp generates sparse file when no space left Product: Portable OpenSSH Version: 3.1p1 Platform: HPPA OS/Version: HP-UX Status: NEW Severity: normal Priority: P2 Component: scp AssignedTo: openssh-unix-dev at mindrot.org ReportedBy:
2002 Jul 24
2
ssh-keygen listing fingerprints little unclear
Since ssh-keygen is not listing the _types_ of keys I have in my file, wouldn't it be a good idea to make the -t switch filtering out the selected type of key when doing a listing with -l? i.e. in this case I see both rsa1, rsa, and dss keys: $ ssh-keygen -l -f ~/.ssh/known_hosts 1024 a9:4f:0b:b6:33:d7:d0:ad:6a:11:b4:57:25:7e:1e:f8 fluff.x42.com 1024
2006 Aug 28
0
patch for ssh-agent force confirm keys
Hi all Patch adds flag -C to ssh-agent which will force confirmation for any key added in agent (similar to ssh-add -c) Helps when forwarded agent authentication is used and each key should be confirmed before use catam --- ssh-agent.c 2006-08-28 14:02:12.000000000 +0300 +++ ssh-agent.c.orig 2006-08-28 13:36:05.000000000 +0300 @@ -111,9 +111,6 @@ /* Default lifetime (0 == forever) */