search for: evp_digestupd

Displaying 10 results from an estimated 10 matches for "evp_digestupd".

2005 Oct 12
1
Binary compatibility problem in OpenSSH from OpenSSL mailing list
Hello All, There seems to be a binary compatibility problem with OpenSSL and OpenSSH 4.2p1. The details can be found at http://www.mail-archive.com/openssl-users at openssl.org/msg41869.html . The discussion is closed with pointing a problem in key.c in OpenSSH and corresponding thread is at http://www.mail-archive.com/openssl-users at openssl.org/msg41878.html I would like to know the
2008 May 16
0
cfservd crashing on 7.0
....so.5 #1 0x28323112 in SHA1_Update () from /lib/libcrypto.so.5 #2 0x283114fe in EVP_sha512 () from /lib/libcrypto.so.5 #3 0x2952e080 in ?? () #4 0x28391cf4 in ?? () from /lib/libcrypto.so.5 #5 0xffffff6b in ?? () #6 0x28311b65 in EVP_DigestInit_ex () from /lib/libcrypto.so.5 #7 0x2831161f in EVP_DigestUpdate () from /lib/libcrypto.so.5 #8 0x282f38ef in RAND_SSLeay () from /lib/libcrypto.so.5 #9 0xbf8f5d20 in ?? () #10 0x28391cf4 in ?? () from /lib/libcrypto.so.5 #11 0xffffff6b in ?? () #12 0x000001c2 in ?? () #13 0x00000100 in ?? () #14 0xbf8f5d38 in ?? () #15 0x2836aad0 in RSA_version () from /li...
2001 Mar 04
1
bubblebabble patch
...+ md = EVP_sha1(); + break; + default: + fatal("key_fingerprint_raw: bad digest type %d", dgst_type); + } + + EVP_DigestInit(&ctx, md); + EVP_DigestUpdate(&ctx, blob, len); + EVP_DigestFinal(&ctx, retval, NULL); + + *dgst_raw_length = md->md_size; + + memset(blob, 0, len); + xfree(blob); + } else + fatal("key_fingerprint_raw: blob is null"); + + return retval; +} + +...
2018 Nov 08
2
[PATCH] Fix configure check for EVP_CIPHER_CTX_set_iv
On Mon, 5 Nov 2018, Darren Tucker wrote: > On 5 November 2018 at 16:41, Michael Forney <mforney at mforney.org> wrote: > > > This causes EVP_CIPHER_CTX_set_iv to get replaced unnecessarily (or > > a duplicate symbol error if linking statically). > > > > Applied, thanks. should this go on the V_7_9 branch too? > >
2005 Aug 09
2
error compiling asterisk on solaris
...erence to `i2d_X509' /usr/local/ssl/lib/libssl.so: undefined reference to `PEM_read_bio_X509' /usr/local/ssl/lib/libssl.so: undefined reference to `MD5_Final' /usr/local/ssl/lib/libssl.so: undefined reference to `ERR_clear_error' /usr/local/ssl/lib/libssl.so: undefined reference to `EVP_DigestUpdate' /usr/local/ssl/lib/libssl.so: undefined reference to `OBJ_obj2nid' /usr/local/ssl/lib/libssl.so: undefined reference to `OBJ_bsearch' /usr/local/ssl/lib/libssl.so: undefined reference to `sk_delete' /usr/local/ssl/lib/libssl.so: undefined reference to `RAND_bytes' /usr/local...
2012 May 05
5
[PATCH] Optionally, allow distros to use openssl for MD5 verification
..._byte *tmp = _malloca(bytes_needed); +#else + const FLAC__bool usealloca = (bytes_needed < 4032); + FLAC__byte *tmp = usealloca ? alloca(bytes_needed) : safe_malloc_(bytes_needed); +#endif + format_input_(tmp, signal, channels, samples, bytes_per_sample); + const FLAC__bool retval = (EVP_DigestUpdate(ctx, tmp , bytes_needed) == 1); +#if defined(_MSC_VER) + _freea(tmp) +#else + if(!usealloca) free(tmp); +#endif + return retval; +#else if(ctx->capacity < bytes_needed) { FLAC__byte *tmp = realloc(ctx->internal_buf, bytes_needed); if(0 == tmp) { @@ -418,4 +454,6 @@ FL...
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
...serverhostkeyblob, sbloblen); + buffer_put_string(&b, client_dh_pub, CURVE25519_PUBKEY_SIZE); + buffer_put_string(&b, server_dh_pub, CURVE25519_PUBKEY_SIZE); + buffer_put_bignum2(&b, shared_secret); + +#ifdef DEBUG_KEX + buffer_dump(&b); +#endif + EVP_DigestInit(&md, evp_md); + EVP_DigestUpdate(&md, buffer_ptr(&b), buffer_len(&b)); + EVP_DigestFinal(&md, digest, NULL); + + buffer_free(&b); + +#ifdef DEBUG_KEX + dump_digest("hash", digest, EVP_MD_size(evp_md)); +#endif + *hash = digest; + *hashlen = EVP_MD_size(evp_md); +} diff --git a/kexc25519c.c b/kexc25...
2011 Sep 02
1
problems building openssh-5.8p1 on qnx
...king checking if programs using OpenSSL functions will link... yes checking for RSA_generate_key_ex... yes checking for DSA_generate_parameters_ex... yes checking for BN_is_prime_ex... yes checking for RSA_get_default_method... yes checking whether OpenSSL has crippled AES support... no checking if EVP_DigestUpdate returns an int... yes checking for crypt in -lcrypt... no checking for SHA256_Update... yes checking for EVP_sha256... yes checking whether OpenSSL has complete ECC support... yes checking for ia_openinfo in -liaf... no checking whether OpenSSL's PRNG is internally seeded... configure: WARNI...
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches? --- Scott Neugroschl | XYPRO Technology Corporation 4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |
2020 Feb 09
2
[RFC PATCH] Add SHA1 support
...TS, NULL); + +#define mdlib_new_ctx() EVP_MD_CTX_new() +#define mdlib_free_ctx(_ctx) EVP_MD_CTX_free(_ctx) + +#define mdlib_init_md5(_ctx) EVP_DigestInit_ex(_ctx, EVP_md5(), NULL) +#define mdlib_init_sha1(_ctx) EVP_DigestInit_ex(_ctx, EVP_sha1(), NULL) + +#define mdlib_update(_ctx, _buf, _len) EVP_DigestUpdate(_ctx, _buf, _len) +#define mdlib_finalize(_ctx, _out) EVP_DigestFinal_ex(_ctx, _out, NULL) + +#else + +#include "lib/sha1.h" + +struct md_lib_ctx { + int mode; + union { + md_context md5; + SHA_CTX sha1; + }; +}; + void md5_begin(md_context *ctx); void md5_update(md_context *ctx, c...