Displaying 20 results from an estimated 3000 matches similar to: "[PATCH] Simplify code with freezero"
2024 Aug 13
2
[PATCH] Fix typos in sshbuf.c
This patch fixes two spelling mistakes in code comments,
which means no functional change:
still-extant -> still-existant
the -> then
Okay?
Index: sshbuf.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/sshbuf.c,v
diff -u -p -u -p -r1.19 sshbuf.c
--- sshbuf.c 2 Dec 2022 04:40:27 -0000 1.19
+++ sshbuf.c 13 Aug 2024 16:39:12 -0000
@@
2024 Aug 13
1
[PATCH] harden parent-child check in sshbuf.c
This simple additional check hardens sshbuf against linking an
sshbuf into itself as parent/child pair, which could lead to ref
counting issues.
Purely defensive measure. I am not aware that this could happen
somehwere in the code by now.
Okay?
Index: sshbuf.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/sshbuf.c,v
diff -u -p -u -p -r1.19
2024 Aug 13
1
[PATCH] Reorder calloc arguments
Reordering calloc arguments silences gcc compiler warnings of
latest versions. Spotted with OpenSSH-portable on a Linux system.
Okay?
Index: cipher.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/cipher.c,v
diff -u -p -u -p -r1.121 cipher.c
--- cipher.c 17 May 2024 02:39:11 -0000 1.121
+++ cipher.c 13 Aug 2024 16:46:00 -0000
@@ -249,7 +249,7
2020 Apr 25
2
[PATCH 1/3] Add private key protection information extraction to ssh-keygen
Add private key protection information extraction to shh-keygen using -v
option on top of -y option which is already parsing the private key.
Technically, the passphrase isn't necessary to do this, but it is the
most logical thing to do for me.
Adding this to -l option is not appropriate because fingerprinting is
using the .pub file when available.
An other idea is to add a new option, I
2019 Aug 06
2
[PATCH v2] Remove sshkey_load_private()
Remove sshkey_load_private(), as this function's role
is similar to sshkey_load_private_type().
---
Dependency:
This change depends over recently merged change in openbsd:
https://github.com/openbsd/src/commit/b0c328c8f066f6689874bef7f338179145ce58d0
Change log:
v1->v2
- Remove declaration of sshkey_load_private() in authfile.h
authfile.c | 38
2023 Feb 24
1
[PATCH 1/1] Add support for ZSTD compression
From: Sebastian Andrzej Siewior <sebastian at breakpoint.cc>
The "zstd at breakpoint.cc" compression algorithm enables ZSTD based
compression as defined in RFC8478. The compression is delayed until the
server sends the SSH_MSG_USERAUTH_SUCCESS which is the same time as with
the "zlib at openssh.com" method.
Signed-off-by: Sebastian Andrzej Siewior <sebastian at
2015 Jun 23
2
Call for testing: OpenSSH 6.9
On Tue, 23 Jun 2015, Jakub Jelen wrote:
>
> On 05/29/2015 09:12 AM, Damien Miller wrote:
> > Hi,
> >
> > OpenSSH 6.9 is almost ready for release, so we would appreciate testing
> > on as many platforms and systems as possible. This release contains
> > some substantial new features and a number of bugfixes.
> Tested basic configuration on Fedora 22. With
2024 Feb 03
1
a little note on sshbuf_reset()
Hello!
I have a minor observation about code in sshbuf.c, not sure if it would be
useful, but here it is.
sshbuf_reset() is currently implemented like this:
void
sshbuf_reset(struct sshbuf *buf)
{
u_char *d;
if (buf->readonly || buf->refcount > 1) {
/* Nonsensical. Just make buffer appear empty */
buf->off = buf->size;
return;
}
if (sshbuf_check_sanity(buf) != 0)
2024 Aug 07
1
[PATCH] Add SM3 secure hash algorithm
Hi,
This implementation looks fine, but there is no specification for using
SM3 in the SSH protocol. Could I suggest that you start by talking to the
IETF to get the standardisation process started?
https://mailman3.ietf.org/mailman3/lists/ssh.ietf.org/ is a good mailing
list to start at. There have been recent conversations in the IETF about
how best to handle national cryptographic standards
2019 Nov 27
2
[PATCH] remove stray `;` after function definitions
This is not valid in ISO C.
---
ssh-sk.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/ssh-sk.c b/ssh-sk.c
index 2b25c42f..3d6ac3d0 100644
--- a/ssh-sk.c
+++ b/ssh-sk.c
@@ -153,7 +153,7 @@ sshsk_free_enroll_response(struct sk_enroll_response *r)
freezero(r->signature, r->signature_len);
freezero(r->attestation_cert, r->attestation_cert_len);
freezero(r,
2024 Aug 06
1
[PATCH] Add SM3 secure hash algorithm
Add OSCCA SM3 secure hash algorithm (OSCCA GM/T 0004-2012 SM3).
---
Makefile.in | 2 +-
configure.ac | 2 +-
digest-libc.c | 11 ++
digest-openssl.c | 1 +
digest.h | 3 +-
mac.c | 1 +
sm3.c | 320 +++++++++++++++++++++++++++++++++++++++++++++++
sm3.h | 51 ++++++++
8 files changed, 388 insertions(+), 3 deletions(-)
create mode
2016 Feb 14
5
[Bug 2541] New: Add explicit_bzero() before free() in OpenSSH-7.1p2 for auth1.c/auth2.c/auth2-hostbased.c
https://bugzilla.mindrot.org/show_bug.cgi?id=2541
Bug ID: 2541
Summary: Add explicit_bzero() before free() in OpenSSH-7.1p2
for auth1.c/auth2.c/auth2-hostbased.c
Product: Portable OpenSSH
Version: 7.1p1
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
2006 Aug 30
0
[PATCH] Cygwin: Add SeTcbPrivilege to sshd_server user
Hi,
the below patch adds a Windows NT user right to the sshd_server user
which will be important in an upcoming version of Cygwin. I have a
preliminary implementation which solves the problem that native Windows
processes don't recognize the user name correctly, if the user has
logged in using public key authentication. The new mechanism requires
the SeTcbPrivilege for the user which
2004 Aug 22
0
app_mp3 with bri-stuff.0.1.0RC4a does not work
Hi there,
app_mp3 still does not work with the latest bri-stuff patch and the
zaphfc driver. Here in my place it only works with the patch attached.
For me it seems the bri-stuff worsens the asterisk timing... has anybody
else made experiences with it?
Deti
-------------- next part --------------
Index: app_mp3.c
===================================================================
RCS file:
2023 Feb 24
1
[PATCH 0/1] ZSTD compression support for OpenSSH
I added ZSTD support to OpenSSH roughly three years ago and I've been
playing with it ever since.
The nice part is that ZSTD achieves reasonable compression (like zlib)
but consumes little CPU so it is unlikely that compression becomes the
bottle neck of a transfer. The compression overhead (CPU) is negligible
even when uncompressed data is tunneled over the SSH connection (SOCKS
proxy, port
2020 Mar 24
4
ZSTD compression support for OpenSSH
I hacked zstd support into OpenSSH a while ago and just started to clean
it up in the recent days. The cleanup includes configuration support
among other things that I did not have.
During testing I noticed the following differences compared to zlib:
- highly interactive shell output (as in refreshed at a _very_ high
rate) may result in higher bandwidth compared to zlib. Since zstd is
quicker
2020 Apr 26
2
[PATCH] Fix line-wrapping typo in comment
---
sshbuf.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/sshbuf.h b/sshbuf.h
index 78e32264..4b71405a 100644
--- a/sshbuf.h
+++ b/sshbuf.h
@@ -140,7 +140,7 @@ int sshbuf_allocate(struct sshbuf *buf, size_t len);
/*
* Reserve len bytes in buf.
* Returns 0 on success and a pointer to the first reserved byte via the
- * optional dpp parameter or a negative * SSH_ERR_*
2015 Mar 24
5
[Bug 2371] New: make check fails when using --without-openssl on AIX
https://bugzilla.mindrot.org/show_bug.cgi?id=2371
Bug ID: 2371
Summary: make check fails when using --without-openssl on AIX
Product: Portable OpenSSH
Version: 6.9p1
Hardware: Other
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: Build system
Assignee:
2015 Mar 24
5
[Bug 2371] New: make check fails when using --without-openssl on AIX
https://bugzilla.mindrot.org/show_bug.cgi?id=2371
Bug ID: 2371
Summary: make check fails when using --without-openssl on AIX
Product: Portable OpenSSH
Version: 6.9p1
Hardware: Other
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: Build system
Assignee:
2014 Aug 26
1
Call for testing: OpenSSH 6.7
Good news/Bad News
The test race in RHEL 3.4 seems to be gone ... but another ec.h failure ...
Using http://www.mindrot.org/openssh_snap/openssh-SNAP-20140827.tar.gz
OS Build_Target CC
OpenSSL BUILD TEST
============== =========================== ================
============= ====== =================
*RHEL 3.4 i386-redhat-linux gcc