Hi Michael--

Check out this thread from earlier this month:

http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2008q4/000819.html

This week, I finally got around to testing this nocrypto
branch of dropbear, and it worked well for me.
(As the comment in options.h says, in order to have one
client that would run run to secure or insecure servers,
there's a bit of work left on the client side, but it appears
that the server side works well).

For my needs I had to go a step further and speed up the
key exchange   (since I'm running on a very slow platform
the Microblaze @ 62.5MHz).    I don't have anything
working there yet......I've just been hacking up the
kex code to remove the key validation checks and skip
the mp_exptmod() call (which appears to take *seconds* to
execute on the Microblaze).    Not a solution yet, but I'm
still working on it!

Steve


Michael Wiedmann wrote:
Michael Wiedmann wrote:
But the client dumps core before authentication is completed:

Additional information from gdb:

Program received signal SIGSEGV, Segmentation fault.
gen_new_keys () at common-kex.c:275
275                 C2S_keysize = ses.newkeys->trans_algo_crypt->keysize;
(gdb) where
#0  gen_new_keys () at common-kex.c:275
#1  0x00405ea0 in recv_msg_newkeys () at common-kex.c:167
#2  0x004084d6 in process_packet () at process-packet.c:111
#3  0x004049bf in session_loop (loophandler=0x409776 <cli_sessionloop>)
    at common-session.c:200
#4  0x00408a97 in main (argc=10, argv=0x6d3308) at cli-main.c:75
(gdb)

Michael





Reply via email to