Displaying 11 results from an estimated 11 matches for "evp_sha1".
2004 Oct 17
0
OpenSSH 3.9.1 fix for IRIX 5.3 cc
...--- mac.c.orig 2004-10-17 12:39:46.000000000 +0200
+++ mac.c 2004-10-17 12:41:04.000000000 +0200
@@ -39,12 +39,12 @@
const EVP_MD * (*mdfunc)(void);
int truncatebits; /* truncate digest if != 0 */
} macs[] = {
- { "hmac-sha1", EVP_sha1, 0, },
- { "hmac-sha1-96", EVP_sha1, 96 },
- { "hmac-md5", EVP_md5, 0 },
- { "hmac-md5-96", EVP_md5, 96 },
- { "hmac-ripemd160", EVP_ripemd160, 0 },
- { "hmac-ripemd...
2007 Jan 08
0
How to remove group1 and group14 from OpenSSH..
...EX_SHA256,
KEX_MAX
};
IN kex.c
static void
choose_kex(Kex *k, char *client, char *server)
{
k->name = match_list(client, server, NULL);
if (k->name == NULL)
fatal("no kex alg");
if (strcmp(k->name, KEX_DH1) == 0) {
k->kex_type = KEX_DH_GRP1_SHA1;
k->evp_md = EVP_sha1();
} else if (strcmp(k->name, KEX_DH14) == 0) {
k->kex_type = KEX_DH_GRP14_SHA1;
k->evp_md = EVP_sha1();
} else if (strcmp(k->name, KEX_DHGEX_SHA1) == 0) {
k->kex_type = KEX_DH_GEX_SHA1;
k->evp_md = EVP_sha1();
} else if (strcmp(k->name, KEX_DHGEX_SHA256) == 0) {...
2014 Jul 15
2
missing HAVE_EVP_RIPEMD160 breaks ssh client
...by algorithm number */
const struct ssh_digest digests[] = {
{ SSH_DIGEST_MD5, "MD5", 16, EVP_md5 },
#ifdef HAVE_EVP_RIPEMD160 /* XXX replace with local if missing */
{ SSH_DIGEST_RIPEMD160, "RIPEMD160", 20, EVP_ripemd160 },
#endif
{ SSH_DIGEST_SHA1, "SHA1", 20, EVP_sha1 },
...
Would it be worth to use enum instead of defined constants for the digest type?
--- a/digest.h
+++ b/digest.h
@@ -22,13 +22,17 @@
#define SSH_DIGEST_MAX_LENGTH 64
/* Digest algorithms */
-#define SSH_DIGEST_MD5 0
-#define SSH_DIGEST_RIPEMD160 1
-#define SSH_DIGEST_SHA1...
2000 Jun 21
1
SSH 2.2.0
Yo All!
I have been playing with SSH 2.2.0 from www.ssh.com. I can not
connect to openssh 2.2.1p1 using Ver 2 protocol from ssh Ver 2.2.0.
Ver 1 works fine.
See below for the debug output from both ends
If I force hmac-md5 (-m hmac-md5) from the sender it works!
The other 3 choices fail: hmac-sha1; hmac-md5-96; and none.
I have no problem connecting to this openssh host (hobbes) from
2013 Oct 10
3
FIPS 140-2 patch for openssh 6.3.p1
Hi,
Is FIPS 140-2 patch for openssh 6.3.p1 available somewhere or do I have to
make one using
http://www.openssl.com/export/openssh/openssh-6.0p1.fips-revised.patch ?
Regards,
Manish
2001 Mar 04
1
bubblebabble patch
...+ retval = xmalloc(EVP_MAX_MD_SIZE);
+
+ switch (dgst_type) {
+ case DIGEST_TYPE_MD5:
+ md = EVP_md5();
+ break;
+ case DIGEST_TYPE_SHA1:
+ md = EVP_sha1();
+ break;
+ default:
+ fatal("key_fingerprint_raw: bad digest
type %d", dgst_type);
+ }
+
+ EVP_DigestInit(&ctx, md);
+ EVP_DigestUpdate(&ctx, blob, len);
+...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
....h"
+#include "fips.h"
#include "umac.h"
@@ -54,15 +55,16 @@
int truncatebits; /* truncate digest if != 0 */
int key_len; /* just for UMAC */
int len; /* just for UMAC */
+ int fips_allowed;
} macs[] = {
- { "hmac-sha1", SSH_EVP, EVP_sha1, 0, -1, -1 },
- { "hmac-sha1-96", SSH_EVP, EVP_sha1, 96, -1, -1 },
- { "hmac-md5", SSH_EVP, EVP_md5, 0, -1, -1 },
- { "hmac-md5-96", SSH_EVP, EVP_md5, 96, -1, -1 },
- { "hmac-ripemd160", SSH_EVP, EVP_ripemd160, 0, -1, -1 },
- { "hmac-ripemd160 at op...
2005 Aug 09
2
error compiling asterisk on solaris
...erence to `DH_compute_key'
/usr/local/ssl/lib/libssl.so: undefined reference to `CRYPTO_add_lock'
/usr/local/ssl/lib/libssl.so: undefined reference to `COMP_CTX_free'
/usr/local/ssl/lib/libssl.so: undefined reference to `sk_push'
/usr/local/ssl/lib/libssl.so: undefined reference to `EVP_sha1'
/usr/local/ssl/lib/libssl.so: undefined reference to `BIO_ctrl'
/usr/local/ssl/lib/libssl.so: undefined reference to `X509_STORE_CTX_init'
/usr/local/ssl/lib/libssl.so: undefined reference to `i2d_DHparams'
/usr/local/ssl/lib/libssl.so: undefined reference to `RSA_private_decrypt...
2020 Feb 09
2
[RFC PATCH] Add SHA1 support
...initialize() OPENSSL_init_crypto(OPENSSL_INIT_ADD_ALL_DIGESTS, NULL);
+
+#define mdlib_new_ctx() EVP_MD_CTX_new()
+#define mdlib_free_ctx(_ctx) EVP_MD_CTX_free(_ctx)
+
+#define mdlib_init_md5(_ctx) EVP_DigestInit_ex(_ctx, EVP_md5(), NULL)
+#define mdlib_init_sha1(_ctx) EVP_DigestInit_ex(_ctx, EVP_sha1(), NULL)
+
+#define mdlib_update(_ctx, _buf, _len) EVP_DigestUpdate(_ctx, _buf, _len)
+#define mdlib_finalize(_ctx, _out) EVP_DigestFinal_ex(_ctx, _out, NULL)
+
+#else
+
+#include "lib/sha1.h"
+
+struct md_lib_ctx {
+ int mode;
+ union {
+ md_context md5;
+ SHA_CTX sha1;
+ };
+};
+
voi...
2006 Nov 15
11
OpenSSH Certkey (PKI)
...++ kex.c 15 Nov 2006 14:14:33 -0000
@@ -312,6 +312,9 @@
} else if (strcmp(k->name, KEX_DHGEX_SHA256) == 0) {
k->kex_type = KEX_DH_GEX_SHA256;
k->evp_md = evp_ssh_sha256();
+ } else if (strcmp(k->name, KEX_DHGEX_CERT) == 0) {
+ k->kex_type = KEX_DH_GEX_CERT;
+ k->evp_md = EVP_sha1();
} else
fatal("bad kex alg %s", k->name);
}
Index: kex.h
===================================================================
RCS file: /cvs/src/usr.bin/ssh/kex.h,v
retrieving revision 1.44
diff -u -r1.44 kex.h
--- kex.h 3 Aug 2006 03:34:42 -0000 1.44
+++ kex.h 15 Nov 2006 14:14...
2010 Apr 09
4
Patch: support URLAUTH, BURL, CATENATE
...const buffer_t *key,
+ string_t *urlauth)
+{
+ const void *key_data;
+ size_t key_len = 0;
+ unsigned char mac[EVP_MAX_MD_SIZE];
+ unsigned int mac_len = 0;
+
+ // compute HMAC-SHA1 of rump with key
+ key_data = buffer_get_data(key, &key_len);
+ i_assert(key_len > 0);
+ HMAC(EVP_sha1(), key_data, key_len, (const unsigned char *) rump,
+ strlen(rump), mac, &mac_len);
+
+ str_append(urlauth, URLAUTH_URLAUTH_INTERNAL_VERSION);
+ str_append(urlauth, binary_to_hex(mac, mac_len));
+}
+
+// validate all the parts of the URL
+bool urlauth_url_validate(const struct imap_url_pa...