search for: blowfishs

Displaying 20 results from an estimated 522 matches for "blowfishs".

Did you mean: blowfish
2008 Jun 06
1
Need help with Decryption using blowfish CBC
Hello all, Hoping someone can help me out here. I''ve burned almost a week trying to figure out how to decrypt an image file that has been encrypted using Blowfish CBC. I found some code on the net and have modified as follows: require ''openssl'' require ''digest/sha1'' ivArr = [0x0D, 0x0E, 0x0A, 0x0D, 0x0F, 0x0A, 0x0C, 0x0E ]
2009 Sep 19
3
Blowfish crypt in rails app
HI Im creating a rails app using blowfish encryption and decryption, in my app i have included a gem crypt for doing a encryption and im trying to decrypt the result using blowfish.js is that possible to do that encryption via ruby gem and decryption via blowfish.js, i download the blowfish js from the url: http://dren.ch/js/blowfish.js Is it possible to implement encryption via ruby
2014 Feb 04
1
BLF-CRYPT passwords
I?m using the Dovecot Enterprise Edition on Centos 6.5, but Blowfish password hashes don?t seem to work. What can I do to enable Blowfish hashes for passwords? Maybe I don?t have my installation configured properly? Note that I really want to use the existing Blowfish hashes in my MySQL database for Dovecot Authentication. The hashes are generated by PHP crypt() that has Blowfish support
2010 Aug 05
1
[LLVMdev] possible miscompilation of openssl on x86-64
Hi folks, I'm playing with this version of OpenSSL: openssl-SNAP-20100804 On x86 using clang I can build it and run all tests successfully. On x86-64 using clang r110287 I get the error message below during "make test". Not sure if anyone has time to look into this but I'm probably not the right person to start debugging it... Thanks, John Regehr
2005 Mar 02
0
Ssh / sft /scp password problems, agent runs fine
Hi :-) When i use scp or sftp with password login, it dont com back fbeckman at zvadm6:/home/fbeckman $ scp /etc/hosts root at devil3:/var/tmp/ Password: hosts 100% 283KB 283.4KB/s 00:00 .... <sleep> ^CKilled by signal 2. fbeckman at zvadm6:/home/fbeckman $ Only Ctrl C helps Exsample 2: ssh devil3
2016 Jun 05
2
Blowfish hashed passwords
> I would love to know why your ubuntu 14.04 system doesn't support sha512-crypt. I just tried SHA512-CRYPT and it is supported on Ubuntu 14.04. I think I was thinking about DBMail instead of Dovecot. I could really use support for BLF-CRYPT since my current password hashes generated by PHP are using Blowfish encryption. Maybe, Dovecot could just add support for BLF-CRYPT by using the
2004 Oct 28
1
[Bug 946] scp slow file transfers, even with -1 -c blowfish
http://bugzilla.mindrot.org/show_bug.cgi?id=946 Summary: scp slow file transfers, even with -1 -c blowfish Product: Portable OpenSSH Version: 3.8.1p1 Platform: ix86 OS/Version: Cygwin on NT/2k Status: NEW Severity: major Priority: P2 Component: scp AssignedTo: openssh-bugs at mindrot.org
2016 Jun 03
3
Blowfish hashed passwords
(I subscribed to a daily digest for this list and can?t figure out how to reply to a reply.) Anyway, Aki Tuomi replied to my feature request saying: > We support in latest 2.2 release > > MD5 MD5-CRYPT SHA SHA1 SHA256 SHA512 SMD5 SSHA SSHA256 SSHA512 PLAIN > CLEAR CLEARTEXT PLAIN-TRUNC CRAM-MD5 SCRAM-SHA-1 HMAC-MD5 DIGEST-MD5 > PLAIN-MD4 PLAIN-MD5 LDAP-MD5 LANMAN NTLM OTP SKEY
2001 Feb 18
1
OpenSSH 2.3.0p1 protocol 2 problem with AIX
Hi, Connecting from RHL7 with OpenSSH 2.3.0p1 or 2.5.0p1 to OpenSSH 2.3.0p1 on AIX 4.3.1. Protocol 2 doesn't work if you specify 'Ciphers rijndael128-cbc' or Ciphers 'aes128-cbc'. sshd -d -d -d on the server shows _nothing_ about these connections. I'm not sure if rijndael has been left out from sshd somehow, but shouldn't the error message be a little more
2007 Jul 20
2
[Bug 1341] New: Support multiple blowfish key lengths
http://bugzilla.mindrot.org/show_bug.cgi?id=1341 Summary: Support multiple blowfish key lengths Product: Portable OpenSSH Version: 4.6p1 Platform: Other OS/Version: Other Status: NEW Severity: enhancement Priority: P2 Component: Miscellaneous AssignedTo: bitbucket at mindrot.org ReportedBy:
2007 Dec 05
0
Encryption using blowfish
I''m working on encrypting some data using blowfish. The previous implementation was done using php as follows. $key = ''some key''; $data = ''data to be encrypted'' $iv = pack(''H*'', substr($key, 0, 16)); $literak_key =", $key.$key.$key.substr($key,16),"; $cipher = mcrypt_module_open(MCRYPT_BLOWFISH, '''',
2016 Jul 21
2
Openssh use enumeration
I thought this was already addressed with the internal blowfish hash of "$2a$06$r3.juUaHZDlIbQaO2dS9FuYxL1W9M81R1Tc92PoSNmzvpEqLkLGrK" to where all passwords were checked against this to prevent timing analysis for user enumeration. On 20 July 2016 at 19:45, Darren Tucker <dtucker at zip.com.au> wrote: > On Tue, Jul 19, 2016 at 11:10 PM, C0r3dump3d <coredump at
2002 May 18
1
OpenSSH 3.2.2p1 sshd: fatal: xfree: NULL pointer given as argument
Server host config: Slackware 8.0 (custom boot scripts) glibc-2.2.3 gcc-2.95.3 Linux-2.4.18 Client host config: (same as server) Symptom: session disconnects with no message to client: ============================================================================= phil at antares:/home/phil 153> ssh -V OpenSSH_3.1p1, SSH protocols 1.5/2.0, OpenSSL 0x0090603f phil at antares:/home/phil 154>
2016 Jun 06
2
Blowfish hashed passwords
>> Maybe, Dovecot could just add support for BLF-CRYPT by using the open source implementation of Blowfish hashing found in https://github.com/php/php-src/tree/master/ext/standard <https://github.com/php/php-src/tree/master/ext/standard>. The implementation looks like a single function to generate the hash. I?m not much of a programmer, but it would seem to me that these .c/.h files
2000 Oct 14
1
Key exchange/selection badly broken in SNAP1014?
Hello all, It seems the overhaul on key exchange/selection broke it badly. I haven't managed to use any other encryption method than 3des and blowfish when connecting to SNAP -> SNAP. SNAP -> 2.2.0p1 will use arcfour etc. quite cleanly. How SNAP -> SNAP looks like: --- debug: Local version string SSH-2.0-OpenSSH_2.2.0p2 debug: send KEXINIT debug: done debug: wait KEXINIT debug:
2001 Sep 02
0
ssh failure at password query
dear sir, i encountered something very odd with openssh. when i try to connect to my sshd daemon, i get repeated password errors. this happens on all connections to my server. outbound connections to other ssh sites work with no problem. the remote site can connect to itself, but not to my site. i captured the output of the sshd -d -d -d -e -D command to provide you with some trace data. i
2018 Jul 06
1
support for Blowfish $2y$10$
Hello, does dovecot support bcrypt $2y$ version? (BLF-CRYPT - Blowfish crypt) doveadm pw -s BLF-CRYPT generates a {BLF-CRYPT}$2a$05$....... password. Does this mean that dovecote will not authenticate against a $2y$10$....... password? Thanks in advance, -Graham-
2000 Jan 27
0
[CVS] humbolt:/tinc/cipher/blowfish Makefile.am Makefile.in
Update of /home/CVS/tinc/cipher/blowfish In directory humbolt:/tmp/cvs-serv2778/cipher/blowfish Modified Files: Makefile.am Makefile.in Log Message: Include system.h and cipher/hmac/hmac.h in the distribution; the blowfish cipher is now in PKGDIR/libcipher_blowfish.so.0. - Tinc: Discussion list about the tinc VPN daemon Archive: http://mail.nl.linux.org/lists/ Tinc site:
2005 Jan 07
0
Missing functionality in Blowfish for crypt(3)
The blowfish crypt(3) mechanism supports the use of a "cost value" for password encryption. The cost value is encoded into the encrypted password that is stored in master.passwd. On OpenBSD, this cost value can be set in login.conf. FreeBSD does not currently support the cost value. The cost value is the base-2 logarithm of the number of rounds of encryption to use so
2016 Jun 06
2
Blowfish hashed passwords
> Changing your php app will probably be the easiest solution. Since I?m using Docker, the easiest solution for me is to find a linux distro that can run Dovecot well and supports BLF-CRYPT as well. What Linux distros support BLF-CRYPT and are well tested and secure? > On Jun 5, 2016, at 8:54 PM, Edgar Pettijohn <edgar at pettijohn-web.com> wrote: > > On 16-06-05 20:36:35, KT