Displaying 4 results from an estimated 4 matches for "buffer_get_data".
2004 Jul 09
1
passing remote ip to pam
...e.c
--- dovecot-0.99.10.6.deborig/src/imap-login/client-authenticate.c 2003-11-24 11:50:55.000000000 -0800
+++ dovecot-0.99.10.6/src/imap-login/client-authenticate.c 2004-07-08 18:21:19.000000000 -0700
@@ -140,7 +140,7 @@ static void login_callback(struct auth_r
case 0:
/* continue */
ptr = buffer_get_data(client->plain_login, &size);
- auth_continue_request(request, ptr, size);
+ auth_continue_request(request, ptr, size, &client->common.ip);
buffer_set_used_size(client->plain_login, 0);
break;
@@ -270,7 +270,8 @@ static void client_auth_input(void *cont
} else {
auth_c...
2004 Aug 06
2
OGG123 frozen under certain circumstances while listening at icecast
...n circumstances
here is the stack
#0 0x401f25d4 in __pthread_sigsuspend () from /lib/libpthread.so.0
#1 0xbffff94c in ?? ()
#2 0x401f2398 in __pthread_wait_for_restart_signal () from /lib/libpthread.so.0
#3 0x401eef0b in pthread_cond_wait@GLIBC_2.0 () from /lib/libpthread.so.0
#4 0x0804b0d3 in buffer_get_data (buf=0x8056d70, data=0x8082b70 "±ùñ`\004", nbytes=964) at buffer.c:542
#5 0x0804df6d in http_read (source=0x8055ab0, ptr=0x8080e00, size=1, nmemb=8500) at http_transport.c:280
#6 0x0804f5cd in vorbisfile_cb_read (ptr=0x8080e00, size=1, nmemb=8500, arg=0x8079658) at oggvorbis_format.c:25...
2012 Oct 02
2
[PATCH] Add SCRAM-SHA-1 password scheme
...nt iter;
+ const unsigned char *salt;
+ size_t salt_len;
+ unsigned char salted_password[SHA1_RESULTLEN];
+ unsigned char client_key[SHA1_RESULTLEN];
+ unsigned char stored_key[SHA1_RESULTLEN];
+
+ fields = t_strsplit(t_strndup(raw_password, size), ",");
+ iter = atoi(fields[0]);
+ salt = buffer_get_data(t_base64_decode_str(fields[1]), &salt_len);
+ str = t_str_new(strlen(fields[2]));
+
+ /* FIXME: credentials should be SASLprepped UTF8 data here */
+ Hi((const unsigned char *)plaintext, strlen(plaintext), salt, salt_len,
+ iter, salted_password);
+
+ /* Calculate ClientKey */
+ hmac_init(&a...
2010 Apr 09
4
Patch: support URLAUTH, BURL, CATENATE
...chanism
+void urlauth_urlauth_generate_internal(const char *rump,
+ const buffer_t *key,
+ string_t *urlauth)
+{
+ const void *key_data;
+ size_t key_len = 0;
+ unsigned char mac[EVP_MAX_MD_SIZE];
+ unsigned int mac_len = 0;
+
+ // compute HMAC-SHA1 of rump with key
+ key_data = buffer_get_data(key, &key_len);
+ i_assert(key_len > 0);
+ HMAC(EVP_sha1(), key_data, key_len, (const unsigned char *) rump,
+ strlen(rump), mac, &mac_len);
+
+ str_append(urlauth, URLAUTH_URLAUTH_INTERNAL_VERSION);
+ str_append(urlauth, binary_to_hex(mac, mac_len));
+}
+
+// validate all the part...