RSA_verify question on OpenSSH Client w/ OpenSSL0.9.6a
foo foo
foomail123 at yahoo.com
Thu Apr 25 16:14:53 EST 2002
While I hear many suggestions to move to newer
release,
can someone shed light on a solution to the
problem as immediate help !?
Can someone who has knowledge of this section of
code please suggestion some pointers/solutions ?
In snippet below, 'siglen' is 128 (per debugger)
but RSA_size(..) returns 1 !
BTW, the system the client is running on is
NetBSD1.4.2
--- foo foo <foomail123 at yahoo.com> wrote:
> Using OpenSSH 2.3.1 client and OpenSSL 0.9.6a
>
> When trying to ssh to OpenSSH server of
> higher versions SSH-1.99-OpenSSH_2.5.2p2 or such,
>
> I see error in RSA key exchange:
> RSA_verify(..)routine.
>
> I see:
>
> error at:int RSA_verify(int dtype, unsigned char *m,
> unsigned int m_len,
> unsigned char *sigbuf, unsigned int siglen,
> RSA *rsa)
> {
> int i,ret=0,sigtype;
> unsigned char *p,*s;
> X509_SIG *sig=NULL;
>
> if (siglen != (unsigned int)RSA_size(rsa))
> {
>
>
RSAerr(RSA_F_RSA_VERIFY,RSA_R_WRONG_SIGNATURE_LENGTH);
> return(0);
> }
>
>
> debugger output:
>
> Breakpoint 1, RSA_verify (dtype=64,
> m=0x199d380 "mBá\tPð»ð\tÊWz\227\226ë\a0ÿ[ÓUU",
> m_len=20,
> sigbuf=0x1990300
>
"\0205:\t\026\217ɼÒÝ\206b#¹ÏnGê\177¤ì\002U*P^9\0213Á]úÀf\225¬:ìm\005\215\225³ìn¥ßïë\205¡\205Ó'Â\220óå,e#½\2150\025K\emã\022Wn\177[@â\fQ÷4w3gÍyXÚäÕ\024\b\2222Ëý?èF[p¬nêÈré(Îå\017õ\214\177\220;qIÄZ,.Bv\026$Rû",
> siglen=128, rsa=0x198b700) at
> bsd/tools/openssl/crypto/rsa/rsa_sign.c:147
> 147 if (siglen != (unsigned
> int)RSA_size(rsa))
> (gdb) x/40x
> 0x198b7a0: 0x00000041 0x00000000
> 0x00008000 0x00000000
> 0x198b7b0: 0x00000000 0x00000000
> 0x00000000 0x00008000
> 0x198b7c0: 0xe5b83d65 0x00000001
> 0x5555686d 0x61632d6d
> 0x198b7d0: 0x64352d39 0x36005555
> 0x00000000 0x00000000
> 0x198b7e0: 0x00000000 0x00000000
> 0x00000000 0x00000000
> 0x198b7f0: 0x00000000 0x00000000
> 0xfeefdead 0x0198b778
> 0x198b800: 0x0186ed14 0x00000000
> 0x0199d2a0 0x0199d280
> 0x198b810: 0x00000000 0x0199d360
> 0x0199d380 0x00000001
> 0x198b820: 0x0198b780 0x00000000
> 0x00000000 0x00000000
> 0x198b830: 0x00000000 0x00000000
> 0x00000000 0x00000000
> (gdb) p *rsa
> $3 = {pad = 0, version = 0, meth = 0x195bb1c, n =
> 0x199d480, e = 0x199d3c0,
> d = 0x0, p = 0x0, q = 0x0, dmp1 = 0x0, dmq1 = 0x0,
> iqmp = 0x0, ex_data = {
> sk = 0x0, dummy = 1848469362}, references = 1,
> flags = 6,
> _method_mod_n = 0x0, _method_mod_p = 0x0,
> _method_mod_q = 0x0,
> bignum_data = 0x0, blinding = 0x0}
> (gdb) x/40x 0x199d480
> 0x199d480: 0x0199d4a0 0x00000001
> 0x00000001 0x00000000
> 0x199d490: 0x00000001 0x55550000
> 0xef025555 0x00000008
> 0x199d4a0: 0x00000023 0xffffffff
> 0x555535d2 0x55550000
> 0x199d4b0: 0x55550000 0x00000000
> 0xfeefdead 0x0199d3d8
> 0x199d4c0: 0x0186ed14 0x8bcb35d2
> 0x00000000 0x00000000
> 0x199d4d0: 0x55550000 0x00000000
> 0xfeefdead 0x0199d4f8
> 0x199d4e0: 0x00000000 0x00000000
> 0x00000000 0x00000000
> 0x199d4f0: 0x00000000 0x00000000
> 0xfeefdead 0x0199d518
> 0x199d500: 0x00000000 0x00000000
> 0x00000000 0x00000000
> 0x199d510: 0x00000000 0x00000000
> 0xfeefdead 0x0199d538
> (gdb)
>
>
> Does anyone know issues with OpenSSL or OpenSSH
> above versions ? Is there any compatiblity issue ?
>
> Can someone share their knowledge ?
>
> Thank you,
>
>
>
>
>
>
> __________________________________________________
> Do You Yahoo!?
> Yahoo! Games - play chess, backgammon, pool and more
> http://games.yahoo.com/
> _______________________________________________
> openssh-unix-dev at mindrot.org mailing list
>
http://www.mindrot.org/mailman/listinfo/openssh-unix-dev
__________________________________________________
Do You Yahoo!?
Yahoo! Games - play chess, backgammon, pool and more
http://games.yahoo.com/
More information about the openssh-unix-dev
mailing list