search for: hash_buff

Displaying 8 results from an estimated 8 matches for "hash_buff".

Did you mean: hash_buf
2004 Nov 10
0
[PATCH] NTLM update and crashfix
...cot-1.0-test52/src/auth/mech-ntlm.c 2004-11-10 16:45:53.000000000 +0300 @@ -42,10 +42,15 @@ lm_credentials_callback(const char *cred const unsigned char *client_response; unsigned char lm_response[LM_RESPONSE_SIZE]; unsigned char hash[LM_HASH_SIZE]; + unsigned int response_length; buffer_t *hash_buffer; int ret; - if (credentials == NULL) { + response_length = + ntlmssp_buffer_length(request->response, lm_response); + client_response = ntlmssp_buffer_data(request->response, lm_response); + + if ((credentials == NULL) || (response_length < LM_RESPONSE_SIZE)) { mech_auth_finish(a...
2004 Oct 29
1
[PATCH] yet another NTLM update
...rc/auth/mech-ntlm.c dovecot-1.0-test51/src/auth/mech-ntlm.c --- dovecot-1.0-test51.vanilla/src/auth/mech-ntlm.c 2004-10-13 04:41:48.000000000 +0400 +++ dovecot-1.0-test51/src/auth/mech-ntlm.c 2004-10-29 14:54:38.000000000 +0400 @@ -74,7 +74,11 @@ ntlm_credentials_callback(const char *cr buffer_t *hash_buffer; int ret; - if (credentials == NULL && !request->ntlm2_negotiated) { + response_length = + ntlmssp_buffer_length(request->response, ntlm_response); + client_response = ntlmssp_buffer_data(request->response, ntlm_response); + + if ((credentials == NULL && !request-&gt...
2004 Aug 09
1
[PATCH] RPA authentication mechanism
..._append_c(buf, 0); + + *size = buffer_get_used_size(buf); + return buffer_free_without_data(buf); +} + +static void +rpa_credentials_callback(const char *credentials, + struct auth_request *auth_request) +{ + struct rpa_auth_request *auth = + (struct rpa_auth_request *)auth_request; + buffer_t *hash_buffer; + + if (credentials == NULL) + return; + + auth->pwd_md5 = p_malloc(auth->pool, 16); + + hash_buffer = buffer_create_data(auth->pool, auth->pwd_md5, 16); + + hex_to_binary(credentials, hash_buffer); +} + +static int +mech_rpa_auth_phase1(struct auth_request *auth_request, + co...
2004 Sep 30
1
[PATCH] NTLM2 support
...t-1.0-test46/src/auth/mech-ntlm.c 2004-09-28 23:45:46.000000000 +0400 @@ -25,6 +25,7 @@ struct ntlm_auth_request { pool_t pool; /* requested: */ + int ntlm2_negotiated; const unsigned char *challenge; /* received: */ @@ -73,7 +74,7 @@ ntlm_credentials_callback(const char *cr buffer_t *hash_buffer; int ret; - if (credentials == NULL) { + if ((credentials == NULL) && !auth->ntlm2_negotiated) { passdb->lookup_credentials(auth_request, PASSDB_CREDENTIALS_LANMAN, lm_credentials_callback); @@ -105,8 +106,16 @@ ntlm_credentials_callback(const char *cr...
2012 Dec 21
0
File Attachments for previous bug report
...64(&msg); st->f_blocks = buffer_get_int64(&msg); -------------- next part -------------- --- sshconnect2.c.orig 2012-12-19 17:32:38.389551253 -0800 +++ sshconnect2.c 2012-12-19 17:35:55.170602684 -0800 @@ -1010,14 +1010,14 @@ &secret, &secret_len) != 0) fatal("%s: hash_buffer", __func__); - bzero(password, strlen(password)); - bzero(crypted, strlen(crypted)); + memset(password, 0, strlen(password)); + memset(crypted, 0, strlen(crypted)); xfree(password); xfree(crypted); if ((ret = BN_bin2bn(secret, secret_len, NULL)) == NULL) fatal("...
2012 Dec 20
4
Deprecated calls to bzero() and index() found in OpenSSH 6.1p1
...e equivalent memset() calls. The patch file is below in (diff -u) format: --- sshconnect2.c.orig 2012-12-19 17:32:38.389551253 -0800 +++ sshconnect2.c 2012-12-19 17:35:55.170602684 -0800 @@ -1010,14 +1010,14 @@ &secret, &secret_len) != 0) fatal("%s: hash_buffer", __func__); - bzero(password, strlen(password)); - bzero(crypted, strlen(crypted)); + memset(password, 0, strlen(password)); + memset(crypted, 0, strlen(crypted)); xfree(password); xfree(crypted); if ((ret = BN_bin2bn(secret, secret_len, N...
2011 Jan 06
3
Offline Deduplication for Btrfs V2
Just a quick update, I''ve dropped the hashing stuff in favor of doing a memcmp in the kernel to make sure the data is still the same. The thing that takes a while is reading the data up from disk, so doing a memcmp of the entire buffer isn''t that big of a deal, not to mention there''s a possiblity for malicious users if there is a problem with the hashing algorithms we
2011 Jan 05
52
Offline Deduplication for Btrfs
Here are patches to do offline deduplication for Btrfs. It works well for the cases it''s expected to, I''m looking for feedback on the ioctl interface and such, I''m well aware there are missing features for the userspace app (like being able to set a different blocksize). If this interface is acceptable I will flesh out the userspace app a little more, but I believe the