Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1964608 Details for
Bug 2203241
The rekey with different KEX algorithm fails with the recent patches moving to OpenSSL 3.0 API
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
reproducer using libssh
file_2203241.txt (text/plain), 2.11 KB, created by
Jakub Jelen
on 2023-05-15 09:00:15 UTC
(
hide
)
Description:
reproducer using libssh
Filename:
MIME Type:
Creator:
Jakub Jelen
Created:
2023-05-15 09:00:15 UTC
Size:
2.11 KB
patch
obsolete
>/* >build with >$ gcc -lssh rekey.c -o rekey > >Assumes localhost ssh server (openssh) with your name to accept your public key > */ >#include <libssh/libssh.h> >#include <string.h> > >int main(int argc, char **argv) >{ > int verbosity = 4; > const char *kex1 = "diffie-hellman-group14-sha256,curve25519-sha256,ecdh-sha2-nistp256"; > const char *kex2 = "diffie-hellman-group18-sha512,diffie-hellman-group16-sha512,ecdh-sha2-nistp521"; > ssh_channel channel; > char data[256]; > ssh_session ssh; > int rc, i; > uint64_t bytes = 2048; /* 2KB (more than the authentication phase) */ > int rbytes, wbytes, total = 0; > > ssh = ssh_new(); > > ssh_options_set(ssh, SSH_OPTIONS_LOG_VERBOSITY, &verbosity); > ssh_options_set(ssh, SSH_OPTIONS_HOST, "localhost"); > > /* Use short digest for initial key exchange */ > rc = ssh_options_set(ssh, SSH_OPTIONS_KEY_EXCHANGE, kex1); > if (rc != SSH_OK) { > return 1; > } > rc = ssh_options_set(ssh, SSH_OPTIONS_REKEY_DATA, &bytes); > if (rc != SSH_OK) { > return 1; > } > rc = ssh_connect(ssh); > if (rc != SSH_OK) { > return 1; > } > ssh_userauth_none(ssh, NULL); > ssh_userauth_list(ssh, NULL); > > rc = ssh_userauth_publickey_auto(ssh, NULL, NULL); > if (rc != SSH_AUTH_SUCCESS) { > return 1; > } > rc = ssh_options_set(ssh, SSH_OPTIONS_KEY_EXCHANGE, kex2); > if (rc != SSH_OK) { > return 1; > } > > channel = ssh_channel_new(ssh); > if (channel == NULL) { > return 1; > } > > rc = ssh_channel_open_session(channel); > if (rc < 0) { > return 1; > } > > rc = ssh_channel_request_exec(channel, "dd if=/dev/urandom bs=2K count=1; sleep 10; dd if=/dev/urandom bs=2K count=1;"); > if (rc < 0) { > return 1; > } > > do { > /* ignore the read data */ > rbytes = ssh_channel_read(channel, data, sizeof(data), 0); > } while (rbytes > 0); > > if (rbytes < 0) { > return -1; > } > > ssh_channel_send_eof(channel); > ssh_channel_close(channel); > ssh_channel_free(channel); > ssh_disconnect(ssh); > return 0; >}
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 2203241
: 1964608