Displaying 8 results from an estimated 8 matches for "gnutls_rnd".
2018 May 29
2
Re: [libvirt] virRandomBits - not very random
...ionally compile based on GNUTLS
> support? Why
> don't we have gnutls required?
That's exactly what I'm suggesting in my patches [1]. gnutls is widely
available (including Linux, Windows, *BSD, Mac Os X). However, before
doing that we need to fix virRandomBits() to actually call gnutls_rnd().
1: https://www.redhat.com/archives/libvir-list/2018-May/msg02077.html
Michal
2018 May 30
2
Re: [libvirt] virRandomBits - not very random
...t? Why
>>> don't we have gnutls required?
>>
>> That's exactly what I'm suggesting in my patches [1]. gnutls is widely
>> available (including Linux, Windows, *BSD, Mac Os X). However, before
>> doing that we need to fix virRandomBits() to actually call gnutls_rnd().
>>
>> 1: https://www.redhat.com/archives/libvir-list/2018-May/msg02077.html
>>
>
>I have this faint recollection of one of the CI platform builds failing
>because something in the gnutls* family didn't exist there when I was
>making the changes to add the domain...
2018 Jun 01
2
Re: [libvirt] virRandomBits - not very random
...nutls required?
>> > >
>> > > That's exactly what I'm suggesting in my patches [1]. gnutls is widely
>> > > available (including Linux, Windows, *BSD, Mac Os X). However, before
>> > > doing that we need to fix virRandomBits() to actually call gnutls_rnd().
>> > >
>> > > 1: https://www.redhat.com/archives/libvir-list/2018-May/msg02077.html
>> > >
>> >
>> > I have this faint recollection of one of the CI platform builds failing
>> > because something in the gnutls* family didn't exis...
2023 Jan 09
1
Does samba provide a fuzzing mode that uses deterministic NTLMSSP_Challenge?
Hi,
Recently I want to fuzz samba systematically (instead of functional fuzzing like OSS-Fuzz/samba). However, the fuzzer acts like smbclient and needs to establish a connection with the samba server via NTLM authentication. The NTLMSSP_Challenge sent by the server is not deterministic, which can render the fuzzing based on previously captured traffic futile. Does samba provide a fuzzing mode
2018 May 29
0
Re: [libvirt] virRandomBits - not very random
...TLS
>> support? Why
>> don't we have gnutls required?
>
> That's exactly what I'm suggesting in my patches [1]. gnutls is widely
> available (including Linux, Windows, *BSD, Mac Os X). However, before
> doing that we need to fix virRandomBits() to actually call gnutls_rnd().
>
> 1: https://www.redhat.com/archives/libvir-list/2018-May/msg02077.html
>
I have this faint recollection of one of the CI platform builds failing
because something in the gnutls* family didn't exist there when I was
making the changes to add the domain master secret code.... A...
2018 Jun 01
0
Re: [libvirt] virRandomBits - not very random
...#39;t we have gnutls required?
> > >
> > > That's exactly what I'm suggesting in my patches [1]. gnutls is widely
> > > available (including Linux, Windows, *BSD, Mac Os X). However, before
> > > doing that we need to fix virRandomBits() to actually call gnutls_rnd().
> > >
> > > 1: https://www.redhat.com/archives/libvir-list/2018-May/msg02077.html
> > >
> >
> > I have this faint recollection of one of the CI platform builds failing
> > because something in the gnutls* family didn't exist there when I was
&g...
2018 Jun 01
0
Re: [libvirt] virRandomBits - not very random
...; > > >
> > > > > That's exactly what I'm suggesting in my patches [1]. gnutls is widely
> > > > > available (including Linux, Windows, *BSD, Mac Os X). However, before
> > > > > doing that we need to fix virRandomBits() to actually call gnutls_rnd().
> > > > >
> > > > > 1: https://www.redhat.com/archives/libvir-list/2018-May/msg02077.html
> > > > >
> > > >
> > > > I have this faint recollection of one of the CI platform builds failing
> > > > because something i...
2018 May 25
2
Re: virRandomBits - not very random
On 05/25/2018 09:17 AM, Michal Privoznik wrote:
>>> We should probably seed it with data from /dev/urandom, and/or the new
>>> Linux getrandom() syscall (or BSD equivalent).
>
> I'm not quite sure that right after reboot there's going to be enough
> entropy. Every service that's starting wants some random bits. But it's
> probably better than what we