Displaying 10 results from an estimated 10 matches for "evp_digestupdate".
2005 Oct 12
1
Binary compatibility problem in OpenSSH from OpenSSL mailing list
Hello All,
There seems to be a binary compatibility problem with OpenSSL and OpenSSH
4.2p1. The details can be found at
http://www.mail-archive.com/openssl-users at openssl.org/msg41869.html . The
discussion is closed with pointing a problem in key.c in OpenSSH and
corresponding thread is at
http://www.mail-archive.com/openssl-users at openssl.org/msg41878.html
I would like to know the
2008 May 16
0
cfservd crashing on 7.0
....so.5
#1 0x28323112 in SHA1_Update () from /lib/libcrypto.so.5
#2 0x283114fe in EVP_sha512 () from /lib/libcrypto.so.5
#3 0x2952e080 in ?? ()
#4 0x28391cf4 in ?? () from /lib/libcrypto.so.5
#5 0xffffff6b in ?? ()
#6 0x28311b65 in EVP_DigestInit_ex () from /lib/libcrypto.so.5
#7 0x2831161f in EVP_DigestUpdate () from /lib/libcrypto.so.5
#8 0x282f38ef in RAND_SSLeay () from /lib/libcrypto.so.5
#9 0xbf8f5d20 in ?? ()
#10 0x28391cf4 in ?? () from /lib/libcrypto.so.5
#11 0xffffff6b in ?? ()
#12 0x000001c2 in ?? ()
#13 0x00000100 in ?? ()
#14 0xbf8f5d38 in ?? ()
#15 0x2836aad0 in RSA_version () from /lib/l...
2001 Mar 04
1
bubblebabble patch
...+ md = EVP_sha1();
+ break;
+ default:
+ fatal("key_fingerprint_raw: bad digest
type %d", dgst_type);
+ }
+
+ EVP_DigestInit(&ctx, md);
+ EVP_DigestUpdate(&ctx, blob, len);
+ EVP_DigestFinal(&ctx, retval, NULL);
+
+ *dgst_raw_length = md->md_size;
+
+ memset(blob, 0, len);
+ xfree(blob);
+ } else
+ fatal("key_fingerprint_raw: blob is null");
+
+ return retval;
+}
+
+cha...
2018 Nov 08
2
[PATCH] Fix configure check for EVP_CIPHER_CTX_set_iv
On Mon, 5 Nov 2018, Darren Tucker wrote:
> On 5 November 2018 at 16:41, Michael Forney <mforney at mforney.org> wrote:
>
> > This causes EVP_CIPHER_CTX_set_iv to get replaced unnecessarily (or
> > a duplicate symbol error if linking statically).
> >
>
> Applied, thanks.
should this go on the V_7_9 branch too?
> >
2005 Aug 09
2
error compiling asterisk on solaris
...erence to `i2d_X509'
/usr/local/ssl/lib/libssl.so: undefined reference to `PEM_read_bio_X509'
/usr/local/ssl/lib/libssl.so: undefined reference to `MD5_Final'
/usr/local/ssl/lib/libssl.so: undefined reference to `ERR_clear_error'
/usr/local/ssl/lib/libssl.so: undefined reference to `EVP_DigestUpdate'
/usr/local/ssl/lib/libssl.so: undefined reference to `OBJ_obj2nid'
/usr/local/ssl/lib/libssl.so: undefined reference to `OBJ_bsearch'
/usr/local/ssl/lib/libssl.so: undefined reference to `sk_delete'
/usr/local/ssl/lib/libssl.so: undefined reference to `RAND_bytes'
/usr/local/ss...
2012 May 05
5
[PATCH] Optionally, allow distros to use openssl for MD5 verification
..._byte *tmp = _malloca(bytes_needed);
+#else
+ const FLAC__bool usealloca = (bytes_needed < 4032);
+ FLAC__byte *tmp = usealloca ? alloca(bytes_needed) : safe_malloc_(bytes_needed);
+#endif
+ format_input_(tmp, signal, channels, samples, bytes_per_sample);
+ const FLAC__bool retval = (EVP_DigestUpdate(ctx, tmp , bytes_needed) == 1);
+#if defined(_MSC_VER)
+ _freea(tmp)
+#else
+ if(!usealloca) free(tmp);
+#endif
+ return retval;
+#else
if(ctx->capacity < bytes_needed) {
FLAC__byte *tmp = realloc(ctx->internal_buf, bytes_needed);
if(0 == tmp) {
@@ -418,4 +454,6 @@ FLAC_...
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
...serverhostkeyblob, sbloblen);
+ buffer_put_string(&b, client_dh_pub, CURVE25519_PUBKEY_SIZE);
+ buffer_put_string(&b, server_dh_pub, CURVE25519_PUBKEY_SIZE);
+ buffer_put_bignum2(&b, shared_secret);
+
+#ifdef DEBUG_KEX
+ buffer_dump(&b);
+#endif
+ EVP_DigestInit(&md, evp_md);
+ EVP_DigestUpdate(&md, buffer_ptr(&b), buffer_len(&b));
+ EVP_DigestFinal(&md, digest, NULL);
+
+ buffer_free(&b);
+
+#ifdef DEBUG_KEX
+ dump_digest("hash", digest, EVP_MD_size(evp_md));
+#endif
+ *hash = digest;
+ *hashlen = EVP_MD_size(evp_md);
+}
diff --git a/kexc25519c.c b/kexc25519...
2011 Sep 02
1
problems building openssh-5.8p1 on qnx
...king
checking if programs using OpenSSL functions will link... yes
checking for RSA_generate_key_ex... yes
checking for DSA_generate_parameters_ex... yes
checking for BN_is_prime_ex... yes
checking for RSA_get_default_method... yes
checking whether OpenSSL has crippled AES support... no
checking if EVP_DigestUpdate returns an int... yes
checking for crypt in -lcrypt... no
checking for SHA256_Update... yes
checking for EVP_sha256... yes
checking whether OpenSSL has complete ECC support... yes
checking for ia_openinfo in -liaf... no
checking whether OpenSSL's PRNG is internally seeded... configure: WARNING:...
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |
2020 Feb 09
2
[RFC PATCH] Add SHA1 support
...TS, NULL);
+
+#define mdlib_new_ctx() EVP_MD_CTX_new()
+#define mdlib_free_ctx(_ctx) EVP_MD_CTX_free(_ctx)
+
+#define mdlib_init_md5(_ctx) EVP_DigestInit_ex(_ctx, EVP_md5(), NULL)
+#define mdlib_init_sha1(_ctx) EVP_DigestInit_ex(_ctx, EVP_sha1(), NULL)
+
+#define mdlib_update(_ctx, _buf, _len) EVP_DigestUpdate(_ctx, _buf, _len)
+#define mdlib_finalize(_ctx, _out) EVP_DigestFinal_ex(_ctx, _out, NULL)
+
+#else
+
+#include "lib/sha1.h"
+
+struct md_lib_ctx {
+ int mode;
+ union {
+ md_context md5;
+ SHA_CTX sha1;
+ };
+};
+
void md5_begin(md_context *ctx);
void md5_update(md_context *ctx, cons...