Displaying 20 results from an estimated 200 matches similar to: "[PATCH] Fix sizeof in jpake_free()"
2012 Dec 20
4
Deprecated calls to bzero() and index() found in OpenSSH 6.1p1
Hello All,
In reviewing source code for OpenSSH-6.1p1, I found instances
of deprecated library calls still within various source code files.
Examples of deprecated calls are: bzero() (replaced with memset()
which is ANSI compliant), index() (replaced with strchr() which
is also ANSI compliant).
In file 'auth2-jpake.c', I've replaced all the bzero() calls with
the equivalent
2012 Dec 21
0
File Attachments for previous bug report
I have renamed all of the patch files to .txt, which should be acceptable
for the mailer daemon at mindrot, per Angel's suggestion.
I am attaching the patch files to the email, with the extra space removed
and a minor correction made.
Bill Parker (wp02855 at gmail dot com)
-------------- next part --------------
--- port-linux.c.orig 2012-12-19 17:40:53.231529475 -0800
+++ port-linux.c
2014 Jan 30
2
CVE-2014-1692
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1692
The NIST advisory says that all versions of OpenSSH potentially contain the flaw. ?But is that really true? ?For example, I looked at the 3.8.1p1 distribution and didn't find any reference to JPAKE at all.
Thanks.
2006 Aug 04
2
PowerMust 500
Hi folks,
has anyone been successful in getting a Mustek PowerMust 500 to talk to
nut? All my attempts (tried "mustek" and "powermust" as drivers) have
been unsuccessful so far.
Thanks for any clues.
Sascha
--
http://yoyodyne.ath.cx
2023 Jun 22
1
[PATCH vhost v10 10/10] virtio_net: support dma premapped
On Fri, Jun 02, 2023 at 05:22:06PM +0800, Xuan Zhuo wrote:
> Introduce the module param "experiment_premapped" to enable the function
> that the virtio-net do dma mapping.
>
> If that is true, the vq of virtio-net is under the premapped mode.
> It just handle the sg with dma_address. And the driver must get the dma
> address of the buffer to unmap after get the buffer
2012 May 25
2
Announce: X.509 certificates support v7.2 for OpenSSH version 6.0p1
Dear All,
X.509 certificates support for OpenSSH version 6.0p1 was published.
I brief new version include :
- support for Android platform;
- engine implementation is now considered stable;
- various regression test improvements including fixes for OpenSSL FIPS
enabled 1.0.1 stable release and korn shell
Yours sincerely,
Roumen Petrov
--
Get X.509 certificates support in OpenSSH:
2010 Apr 11
3
[LLVMdev] Proposal: stack/context switching within a thread
Kenneth Uildriks <kennethuil at gmail.com> wrote:
> As I see it, the context switching mechanism itself needs to know
> where to point the stack register when switching. The C routines take
> an initial stack pointer when creating the context, and keep track of
> it from there. If we don't actually need to interoperate with
> contexts created from the C routines, we have
2011 Jan 22
1
SRP for OpenSSH
Hello all
Support for Secure Remote Password (SRP) for OpenSSH was last discussed in 2004:
http://marc.info/?l=openssh-unix-dev&w=2&r=1&s=SRP&q=b
There's a SRP patch for OpenSSL that's about 2 years in the making:
http://rt.openssl.org/Ticket/Display.html?id=1794
Tom Wu from Stanford has been working on that.
Has anything changed since 2004 that would make inclusion
2009 Oct 29
1
Match vs. ChallengeResponseAuthentication?
Hello,
We'd like to allow passwords only from the local network, and allow public key auth from on-campus or off-campus. The server runs SuSE Linux, and we might do the same on RHEL/CentOS & Mac OS X if we can get it to work.
Unfortunately, Match allows PasswordAuthentication but not ChallengeResponseAuthentication. Is there any reason ChallengeResponseAuthentication cannot be
2017 Jun 23
5
OpenSSL 1.1 support status : what next?
OpenSC has taken a different approach to OpenSSL-1.1. Rather then writing
a shim for OpenSSL-1.1, the OpenSC code has been converted to
the OpenSSL-1.1 API and a sc-ossl-compat.h" file consisting of defines and
macros was written to support older versions of OpenSSL and Libressl.
https://github.com/OpenSC/OpenSC/blob/master/src/libopensc/sc-ossl-compat.h
The nice part of this approach is
2023 Jun 02
12
[PATCH vhost v10 00/10] virtio core prepares for AF_XDP
## About DMA APIs
Now, virtio may can not work with DMA APIs when virtio features do not have
VIRTIO_F_ACCESS_PLATFORM.
1. I tried to let DMA APIs return phy address by virtio-device. But DMA APIs just
work with the "real" devices.
2. I tried to let xsk support callballs to get phy address from virtio-net
driver as the dma address. But the maintainers of xsk may want to use
2023 Jun 02
12
[PATCH vhost v10 00/10] virtio core prepares for AF_XDP
## About DMA APIs
Now, virtio may can not work with DMA APIs when virtio features do not have
VIRTIO_F_ACCESS_PLATFORM.
1. I tried to let DMA APIs return phy address by virtio-device. But DMA APIs just
work with the "real" devices.
2. I tried to let xsk support callballs to get phy address from virtio-net
driver as the dma address. But the maintainers of xsk may want to use
2013 Dec 16
8
XEN/arm XENFB support
Goodmorning,
I''m currently playing with XEN/arm on my Allwinner A20 (cubieboard2)
I would like to get the XENFB driver working on domU.
But currently in xen/arm there''s no support for VFB, atleast qemu is not
supported.
But this video http://www.youtube.com/watch?v=po1IeElg8tg and this one
http://www.youtube.com/watch?v=Km6gBnIqaWo is showing a working framebuffer.
So there are
2014 Jun 30
0
[PATCH 1/1] ia64: use ARRAY_SIZE instead of sizeof/sizeof[0]
Use macro definition
Cc: Jeremy Fitzhardinge <jeremy at goop.org>
Cc: Chris Wright <chrisw at sous-sol.org>
Cc: virtualization at lists.linux-foundation.org
Cc: linux-ia64 at vger.kernel.org
Signed-off-by: Fabian Frederick <fabf at skynet.be>
---
This is untested.
arch/ia64/kernel/paravirt.c | 8 +++-----
1 file changed, 3 insertions(+), 5 deletions(-)
diff --git
2014 Jun 30
0
[PATCH 1/1] ia64: use ARRAY_SIZE instead of sizeof/sizeof[0]
Use macro definition
Cc: Jeremy Fitzhardinge <jeremy at goop.org>
Cc: Chris Wright <chrisw at sous-sol.org>
Cc: virtualization at lists.linux-foundation.org
Cc: linux-ia64 at vger.kernel.org
Signed-off-by: Fabian Frederick <fabf at skynet.be>
---
This is untested.
arch/ia64/kernel/paravirt.c | 8 +++-----
1 file changed, 3 insertions(+), 5 deletions(-)
diff --git
2014 Apr 13
1
[Bug 915] New: segfault in error case : expr_evaluate_payload not checking payload->payload.desc being null
https://bugzilla.netfilter.org/show_bug.cgi?id=915
Summary: segfault in error case : expr_evaluate_payload not
checking payload->payload.desc being null
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
2012 Mar 06
6
openssh static build - mission impossible?
I am trying to build a static version of ssh, sshd and sftp, but after banging my head against the wall for the best part of the last 3 days I am about to give up...
Since I plan to use this on an embedded device (building dropbear is *NOT* an option!), I've excluded as many openssh configure options as I can but, ultimately, failed. This is my setup:
export LDFLAGS=' -pie -z relro -z
2013 Dec 03
0
[PATCH] nfsmount: memset uses sizeof pointer as length
gcc picked up a couple of suspicious memset lengths which turned
out to be real bugs.
Signed-off-by: Anton Blanchard <anton at samba.org>
---
usr/kinit/nfsmount/sunrpc.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/usr/kinit/nfsmount/sunrpc.c b/usr/kinit/nfsmount/sunrpc.c
index 0628cef..0a7fcf5 100644
--- a/usr/kinit/nfsmount/sunrpc.c
+++
2013 Dec 03
0
[klibc:master] nfsmount: memset uses sizeof pointer as length
Commit-ID: 71a849a7e2d5e73321e986fa91d1f34b387e71ba
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=71a849a7e2d5e73321e986fa91d1f34b387e71ba
Author: Anton Blanchard <anton at samba.org>
AuthorDate: Tue, 3 Dec 2013 18:14:58 +1100
Committer: H. Peter Anvin <hpa at zytor.com>
CommitDate: Tue, 3 Dec 2013 10:53:38 -0800
[klibc] nfsmount: memset uses sizeof
2015 Feb 10
0
[PATCH 3/6] gpllib: fix sizeof(char *) misuse
The code was passing sizeof(char *) - not the length of the buffer - to
strlcpy and snprintf. Change the function to take the length of the
buffer as a parameter.
Fixes the warning: argument to 'sizeof' in 'snprintf' call is the same
expression as the destination; did you mean to provide an explicit
length?
Signed-off-by: Jonathan Boeing <jonathan.n.boeing at gmail.com>