search for: md5_final

Displaying 12 results from an estimated 12 matches for "md5_final".

2004 Jul 20
0
[PATCH] fix MD5 code buglet
Hello, md5_final() function contains minor buglet, it clears first 4 bytes of md5_context instead of whole structure. Patch attached. Best regards. -- Andrey Panin | Linux and UNIX system administrator pazke at donpac.ru | PGP key: wwwkeys.pgp.net -------------- next part -------------- diff -urpNX /usr/share/...
2006 Jun 26
1
[PATCH, RFC 0/13] OTP: add auth_cache_remove()
This patchset add support for One-Time-Password authentication mechanisms, both S/Key (RFC 1731) and OTP (RFC 2444) are implemented. Tested with mutt (uses cyrus sasl library for authentication). Patches were made against CVS HEAD. Please take a look. Add auth_cache_remove() function which will be used by OTP code to evict old entries from auth cache. diff -urdpNX /usr/share/dontdiff -x
2004 Aug 09
1
[PATCH] RPA authentication mechanism
...m_ucs2be, auth->realm_len); + md5_update(&ctx, auth->user_challenge, auth->user_challenge_len); + md5_update(&ctx, auth->service_challenge, RPA_SCHALLENGE_LEN); + md5_update(&ctx, auth->service_timestamp, RPA_TIMESTAMP_LEN); + md5_update(&ctx, auth->pwd_md5, 16); + md5_final(&ctx, digest); +} + +/* + * Compute server -> client authentication response. + */ +static void rpa_server_response(struct rpa_auth_request *auth, + unsigned char *digest) +{ + struct md5_context ctx; + unsigned char tmp[16]; + unsigned char z[48]; + int i; + + memset(z, 0, sizeof(z)); +...
2008 Aug 15
2
SSH Command Line Password Support
Hello, I am interested in an ssh that is not interactive in requesting the password, i.e, whereas I can specify the password in the command line when calling SSH. I have wondered how such a feature has not been included in such a good client, as it seems there are many (and I have searched for this) people require this capability for their scripts/automation. I understand the possibility of
2003 Sep 17
1
sftp reget/reput
Hello openssh@ I thought about sftp's reget/reput commands. Several days ago, Damien Miller write to tech at openbsd.org (it was reply for my letter): > Herein lies a problem which is not easy to detect or solve. For > performance reasons, the sftp client does pipelined reads/writes when > transferring files. The protocol spec allows for a server to process > these requests out
2001 Jun 06
0
snk authentication
...es[6] = '\0'; + j -= 6; + if( j > 0){ + i = (j+7)& 0xf8; + des_cbc_encrypt((des_cblock *)&data[16], + (des_cblock *)&res[6], i*1l, + keysched, &iv, DES_DECRYPT); + MD5_Update(&ctx, (unsigned char *)&res[6], j); + } + res[6+j] = '\0'; + + MD5_Final(digest, &ctx); + for(i=0; i < 8; i++){ + if( digest[i] != (kbuf[i]&0xff)) + return 1; + } + }else{ + strncpy(res, pass, reslen); + } + return 0; +} + + + +int put_snk_pass(char *pass, char *res, int reslen, char *data) { + des_cblock kblock; + des_key_schedule keysched; + char...
2012 Sep 04
2
[PATCH] Generalize HMAC implementation
...st char *response_hex; if (size != CRAM_MD5_CONTEXTLEN) { @@ -59,9 +61,10 @@ return FALSE; } + hmac_init(&ctx, NULL, 0, &hash_method_md5); hmac_md5_set_cram_context(&ctx, credentials); - hmac_md5_update(&ctx, request->challenge, strlen(request->challenge)); - hmac_md5_final(&ctx, digest); + hmac_update(&ctx, request->challenge, strlen(request->challenge)); + hmac_final(&ctx, digest); response_hex = binary_to_hex(digest, sizeof(digest)); diff --git a/src/auth/mech-scram-sha1.c b/src/auth/mech-scram-sha1.c --- a/src/auth/mech-scram-sha1.c +++ b/s...
2004 Sep 30
1
[PATCH] NTLM2 support
...ed char *client_challenge, + unsigned char response[NTLMSSP_RESPONSE_SIZE]) +{ + struct md5_context ctx; + unsigned char session_hash[16]; + + md5_init(&ctx); + md5_update(&ctx, server_challenge, NTLMSSP_CHALLENGE_SIZE); + md5_update(&ctx, client_challenge, NTLMSSP_CHALLENGE_SIZE); + md5_final(&ctx, session_hash); + + ntlmssp_v1_response(hash, session_hash, response); +} + +void ntlmssp_v2_response(const char *user, const char *target, const unsigned char *hash_v1, const unsigned char *challenge, diff -urpNX /usr/share/dontdiff dovecot-1.0-test46.vanilla/src/lib-ntlm/n...
2005 Aug 09
2
error compiling asterisk on solaris
...to `i2d_X509_NAME' /usr/local/ssl/lib/libssl.so: undefined reference to `RSA_public_encrypt' /usr/local/ssl/lib/libssl.so: undefined reference to `i2d_X509' /usr/local/ssl/lib/libssl.so: undefined reference to `PEM_read_bio_X509' /usr/local/ssl/lib/libssl.so: undefined reference to `MD5_Final' /usr/local/ssl/lib/libssl.so: undefined reference to `ERR_clear_error' /usr/local/ssl/lib/libssl.so: undefined reference to `EVP_DigestUpdate' /usr/local/ssl/lib/libssl.so: undefined reference to `OBJ_obj2nid' /usr/local/ssl/lib/libssl.so: undefined reference to `OBJ_bsearch' /...
2004 Jul 01
3
[PATCH, RFC] add APOP authentication mechanism
...(%s): invalid characters in APOP digest", get_log_prefix(auth_request)); + mech_auth_finish(auth_request, NULL, 0, FALSE); + return; + } + + md5_init(&ctx); + md5_update(&ctx, auth->challenge, strlen(auth->challenge)); + md5_update(&ctx, credentials, strlen(credentials)); + md5_final(&ctx, digest); + + safe_memset((void *) credentials, 0, strlen(credentials)); + + mech_auth_finish(auth_request, NULL, 0, + memcmp(digest, remote_digest, 16) ? FALSE : TRUE); +} + +static int +mech_apop_auth_initial(struct auth_request *auth_request, + struct auth_client_request_new *reque...
2020 Feb 09
2
[RFC PATCH] Add SHA1 support
...+ * #define HASH_LONG MD5_LONG + * #define HASH_CTX MD5_CTX + * #define HASH_CBLOCK MD5_CBLOCK + * #define HASH_UPDATE MD5_Update + * #define HASH_TRANSFORM MD5_Transform + * #define HASH_FINAL MD5_Final + * #define HASH_BLOCK_DATA_ORDER md5_block_data_order + */ + +#include <openssl/crypto.h> + +#if !defined(DATA_ORDER_IS_BIG_ENDIAN) && !defined(DATA_ORDER_IS_LITTLE_ENDIAN) +# error "DATA_ORDER must be defined!" +#endif + +#ifndef HASH_CBLOCK +# error "HASH_CBLO...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
...hrase)); + SHA1_Final(digest, &sha); + + cipher_init(cc, cipher, digest, 20, NULL, 0, do_encrypt); + + memset(digest, 0, sizeof(digest)); + memset(&sha, 0, sizeof(sha)); + return; + } +#endif MD5_Init(&md); MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase)); MD5_Final(digest, &md); --- openssh-4.7p1/configure.ac Mon Dec 17 20:25:49 2007 +++ openssh-4.7p1/configure.ac Mon Dec 17 20:29:36 2007 @@ -438,6 +438,7 @@ if test -z "$GCC"; then CFLAGS="$CFLAGS -Ae" fi + HPUX=1 ;; *-*-hpux11*) AC_DEFINE(PAM_SUN_CODEBASE, 1, @@ -44...