search for: 3072

Displaying 20 results from an estimated 306 matches for "3072".

Did you mean: 3002
2017 Oct 20
1
[PATCH v1 01/27] x86/crypto: Adapt assembly for PIE support
...$16,r2 ## E; \ >> shrl $16,r4 ## E; \ >> movzbl r4 ## L,r7 ## E; \ >> movzbl r4 ## H,r4 ## E; \ >> xorl OFFSET(r8),ra ## E; \ >> xorl OFFSET+4(r8),rb ## E; \ >> - xorl TAB+3072(,r4,4),r5 ## E;\ >> - xorl TAB+2048(,r7,4),r6 ## E;\ >> + round_xor(TAB+3072, r4, r5 ## E)\ >> + round_xor(TAB+2048, r7, r6 ## E)\ >> movzbl r1 ## L,r7 ## E; \ >> movzbl r1 ## H,r4 ## E; \ >> - movl TAB+1024(,r4,4...
2017 Oct 20
1
[PATCH v1 01/27] x86/crypto: Adapt assembly for PIE support
...$16,r2 ## E; \ >> shrl $16,r4 ## E; \ >> movzbl r4 ## L,r7 ## E; \ >> movzbl r4 ## H,r4 ## E; \ >> xorl OFFSET(r8),ra ## E; \ >> xorl OFFSET+4(r8),rb ## E; \ >> - xorl TAB+3072(,r4,4),r5 ## E;\ >> - xorl TAB+2048(,r7,4),r6 ## E;\ >> + round_xor(TAB+3072, r4, r5 ## E)\ >> + round_xor(TAB+2048, r7, r6 ## E)\ >> movzbl r1 ## L,r7 ## E; \ >> movzbl r1 ## H,r4 ## E; \ >> - movl TAB+1024(,r4,4...
2011 Jan 05
1
Blind Transfer not working - 1.4.38
...--- (12 headers 0 lines) --- Call 7c5d5a603b2aaaa803fd7e451de826e4 at x.x.x.x got a SIP call transfer from caller: (REFER)! SIP transfer to extension 504 at pack-local by PACK501 at domain.co.uk <--- Transmitting (NAT) to x.x.x.x:52753 ---> SIP/2.0 202 Accepted Via: SIP/2.0/UDP 192.168.1.105:3072;branch=z9hG4bK-sgoqylu125ma;received=x.x.x.x;rport=52753 From: <sip:PACK501 at 192.168.1.105:3072;line=guuuyf05>;tag=xck40ix9vp To: "<incoming mobile number>" <sip:<incoming mobile number>@x.x.x.x>;tag=as4d0dbc04 Call-ID: 7c5d5a603b2aaaa803fd7e451de826e4 at x.x.x.x...
2020 Jul 24
2
Openssl 3
Anyone trying openssl 3 against openssh? -- Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca Yahweh, Queen & country!Never Satan President Republic!Beware AntiChrist rising! https://www.empire.kred/ROOTNK?t=94a1f39b Put more trust in nobility of character than in an oath. -Solon
2019 Oct 21
0
CEBA-2019:3072 CentOS 7 systemd BugFix Update
CentOS Errata and Bugfix Advisory 2019:3072 Upstream details at : https://access.redhat.com/errata/RHBA-2019:3072 The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 091e43eec1fb5f78b0a0c83e9b488cd1b3ab0d6e7f1788881f98d92f73f91b97 libgudev1-219-67.el7_7.2.i686.rpm 52d...
2008 Mar 14
1
Rsync Failed 3072
I m getting bug for incremental backup from my server Error:Rsync Failed 3072
2017 Oct 20
0
[PATCH v1 01/27] x86/crypto: Adapt assembly for PIE support
...w r4 ## X,r2 ## X; \ > - movl TAB(,r6,4),r6 ## E; \ > + round_mov(TAB, r6, r6 ## E) \ > roll $16,r2 ## E; \ > shrl $16,r4 ## E; \ > movzbl r4 ## L,r7 ## E; \ > movzbl r4 ## H,r4 ## E; \ > xorl OFFSET(r8),ra ## E; \ > xorl OFFSET+4(r8),rb ## E; \ > - xorl TAB+3072(,r4,4),r5 ## E;\ > - xorl TAB+2048(,r7,4),r6 ## E;\ > + round_xor(TAB+3072, r4, r5 ## E)\ > + round_xor(TAB+2048, r7, r6 ## E)\ > movzbl r1 ## L,r7 ## E; \ > movzbl r1 ## H,r4 ## E; \ > - movl TAB+1024(,r4,4),r4 ## E;\ > + round_mov(TAB+1024, r4, r4 ## E)\ > movw r3 ##...
2013 Jul 16
0
Help with decyphering DND status
...any other way to see exactly what asterisk is sending to the phone? When I look at the SIP trace logs on the handset when switch dnd on and off on another handset I see this sort of thing: Received from udp:192.168.6.9:5060 at 16/7/2013 11:56:14:422 (693 bytes): NOTIFY sip:41720 at 192.168.6.120:3072;line=d241fk25 SIP/2.0 Via: SIP/2.0/UDP 192.168.6.9:5060;branch=z9hG4bK56d306e4;rport Max-Forwards: 70 From: <sip:41712 at 192.168.6.9;>;tag=as149ada79 To: <sip:41720 at 192.168.6.9>;tag=tyybvtkyiy Contact: <sip:41712 at 192.168.6.9:5060> Call-ID: 455FE451B390010B19F8CAE0BE485B25-j...
2007 Oct 05
1
Very slow file copy performance over a WAN (HELP)
Hi, I've noticed that over a WAN (T1) I'm getting incredibly slow file copy performance. Using smbclient on a linux machine on one size of the WAN, As you can imagine, this makes all of our file shares unusable over the WAN. It's not an issue with WAN performance, because using scp to transfer the same file, I get speeds of ~145k/s. A tcpdump of the file copy of ~2MB file that actually
2013 Sep 10
4
[Bug 1647] Implement FIPS 186-3 for DSA keys
...nt #2 from mackyle at gmail.com --- RFC 6668 [1] (2012-07) updated RFC 4253 adding the SHA-256 data integrity algorithm as a new recommended algorithm. FIPS 186-4 [2] (2013-07) section 4.2 includes the same DSA parameters as FIPS 186-3: L = 1024, N = 160 L = 2048, N = 224 L = 2048, N = 256 L = 3072, N = 256 And it would seem that the L=2048,N=256 L=3072,N=256 selections are now possible while remaining standards compliant. It appears that OpenSSH has added support for SHA-256 and SHA-512 in version 5.9p1 (2011-09). [1] http://tools.ietf.org/html/rfc6668 [2] http://nvlpubs.nist.gov/nistpubs...
2013 Sep 10
4
[Bug 1647] Implement FIPS 186-3 for DSA keys
...nt #2 from mackyle at gmail.com --- RFC 6668 [1] (2012-07) updated RFC 4253 adding the SHA-256 data integrity algorithm as a new recommended algorithm. FIPS 186-4 [2] (2013-07) section 4.2 includes the same DSA parameters as FIPS 186-3: L = 1024, N = 160 L = 2048, N = 224 L = 2048, N = 256 L = 3072, N = 256 And it would seem that the L=2048,N=256 L=3072,N=256 selections are now possible while remaining standards compliant. It appears that OpenSSH has added support for SHA-256 and SHA-512 in version 5.9p1 (2011-09). [1] http://tools.ietf.org/html/rfc6668 [2] http://nvlpubs.nist.gov/nistpubs...
2003 Jul 30
3
FreeBSD not-so-stable
I have a FreeBSD 4.8-Release machine that I upgraded from a 4.5 or 4.4 machine. It works just great for about 9 days, then processes will not die. It starts to become a problem when I can't kill processes, restart services, connections hang, and I can't reboot or shutdown, I have to do a hard reset. I can't really find anything in the logs to indicate what is giving me
2002 Jun 06
1
parameter of htb
...-s -d qdisc show dev eth0 qdisc htb 1 dev eth0 r2q 10 default 12 direct_packets_stat 0 Sent 34210198 bytes 23370 pkts(dropped 0 overlimits 35534) !!!!first question: what is meaning of "r2q" and "direct_packets_stat" tc -s -d class dev eth0 class htb 1:11 root prio 0 quantum 3072 rate 240kbit ceil 800kbit burst 2kb/8 mpu 0b cburst 2636b/8 mpu 0b level 0 Sent 0 bytes 0 pkts(dropped 0 overlimits 0) lended:0 borrowed:0 giants:0 tokens:54612 ctokens 20992 class htb 1:10 root prio 0 quantum 3072 rate 240kbit ceil 800kbit burst 2kb/8 mpu 0b cburst 2636b/8 mpu 0b leve...
2013 Sep 10
1
ssh-keygen -t dsa limited to 1024?
...PS 186-4 [1] (2013-07) section 4.2 state: 4.2 Selection of Parameter Sizes and Hash Functions for DSA This Standard specifies the following choices for the pair L and N (the bit lengths of p and q, respectively): L = 1024, N = 160 L = 2048, N = 224 L = 2048, N = 256 L = 3072, N = 256 Federal Government entities shall generate digital signatures using use one or more of these choices. I see there is bug 1647 [2] about this. However, RFC 6668 [3] (2012-07) added SHA-256 to the recommended list of data integrity functions for SSH making the L=2048,N=256 and L=3072...
2014 Jan 20
3
VMware restricting to 3GB RAM
Hi, I am running VMware player on CentOS 5.4 and its working fine. However it does not allow me to increase the RAM more than 3GB. ?It keeps throwing error stating- "Requested memory size is greater than allowed maximum of 3072 MB. Could not initiate memory hot plug."? I understand from few threads that 32bit OS has this kind of limitation but I am able to understand why I am seeing this issue when I am using 64bit OS and VMware player is also for 64bit.? Regards Hersh
2012 Sep 06
2
C6 VM text install not recognizing LV
Hi, I am trying to install a C6 VM on C6 using the text installer using: # virt-install -n C6_1 -r 3072 --os-variant=rhel6 -l \ ftp://ftp.nluug.nl/site/centos.org/CentOS/6.3/os/x86_64/ --disk \ path=/dev/VG1/vm_c6_1 -w network:default --nographics \ -x "console=ttyS0" --autostart /dev/VG1/vm_c6_1 has been successfully created. The installation starts but once I get to the disk partitioning...
2013 Sep 10
0
[Bug 1647] Implement FIPS 186-3 for DSA keys
...[1] (2012-07) updated RFC 4253 adding the SHA-256 data > integrity algorithm as a new recommended algorithm. > > FIPS 186-4 [2] (2013-07) section 4.2 includes the same DSA parameters > as FIPS 186-3: > > L = 1024, N = 160 > L = 2048, N = 224 > L = 2048, N = 256 > L = 3072, N = 256 > > And it would seem that the L=2048,N=256 L=3072,N=256 selections are now > possible while remaining standards compliant. SHA-1 is not allowed in digital signatures per NIST SP 800-131A after December 31, 2013. The problem is in the way that ssh-dss is specified in RFC 4253 t...
2017 Oct 11
1
[PATCH v1 01/27] x86/crypto: Adapt assembly for PIE support
...E;\ + round_mov(TAB+1024, r5, r5 ## E)\ movw r4 ## X,r2 ## X; \ - movl TAB(,r6,4),r6 ## E; \ + round_mov(TAB, r6, r6 ## E) \ roll $16,r2 ## E; \ shrl $16,r4 ## E; \ movzbl r4 ## L,r7 ## E; \ movzbl r4 ## H,r4 ## E; \ xorl OFFSET(r8),ra ## E; \ xorl OFFSET+4(r8),rb ## E; \ - xorl TAB+3072(,r4,4),r5 ## E;\ - xorl TAB+2048(,r7,4),r6 ## E;\ + round_xor(TAB+3072, r4, r5 ## E)\ + round_xor(TAB+2048, r7, r6 ## E)\ movzbl r1 ## L,r7 ## E; \ movzbl r1 ## H,r4 ## E; \ - movl TAB+1024(,r4,4),r4 ## E;\ + round_mov(TAB+1024, r4, r4 ## E)\ movw r3 ## X,r1 ## X; \ roll $16,r1 ## E; \ s...
2024 Jan 26
1
enable strong KexAlgorithms, Ciphers and MACs in /etc/ssh/sshd_config file on RHEL 8.x Linux OS
On 25.01.24 14:09, Kaushal Shriyan wrote: > I am running the below servers on Red Hat Enterprise Linux release 8.7 > How do I enable strong KexAlgorithms, Ciphers and MACs On RHEL 8, you need to be aware that there are "crypto policies" modifying sshd's behaviour, and it would likely be the *preferred* method to inject your intended config changes *there* (unless they
2024 Jan 27
2
enable strong KexAlgorithms, Ciphers and MACs in /etc/ssh/sshd_config file on RHEL 8.x Linux OS
...libssh.org -- [info] default key exchange since OpenSSH 6.4 (kex) diffie-hellman-group16-sha512 -- [info] available since OpenSSH 7.3, Dropbear SSH 2016.73 (kex) diffie-hellman-group18-sha512 -- [info] available since OpenSSH 7.3 (kex) diffie-hellman-group-exchange-sha256 (3072-bit) -- [info] available since OpenSSH 4.4 (kex) diffie-hellman-group-exchange-sha256 (3072-bit) -- [info] OpenSSH's GEX fallback mechanism was triggered during testing. Very old SSH clients will still be able to create connections using a 2048-bit modulus, though modern clients will use 3072....