Displaying 3 results from an estimated 3 matches for "hex2bin".
Did you mean:
ex_bin
2014 Apr 02
1
Openssh KDF testing
...int id, u_int need, u_char *hash, u_int hashlen,
BIGNUM *shared_secret)
Now, the input which is provided to us is
K(share_secret) as an array of characters.
H(Hash) as an array of characters.
Session_id as an array of characters
Now, first I converted hash and session_id in binary form using hex2bin
function.
For shared secret, the bignum structure is like
struct bignum_st
{
BN_ULONG *d; /* Pointer to an array of 'BN_BITS2' bit chunks. */
int top; /* Index of last used d +1. */
/* The next are internal book keeping for bn_expand. */
int dm...
2023 Aug 29
1
Classic Upgrade changes domain SID
On Mon, 2023-08-28 at 23:46 +0200, Peter Koch via samba wrote:
> Hi Andrew and Roland,
>
> I spent some hours today to debug the problem by
> adding lots of printf-statements into the samba4
> source.
>
> Here are my findings:
> - upgrade.py calls passdb.get_global_sam_sid()
> - get_global_sam_sid() calls pdb_generate_sam_sid()
> - pdb_generate_sam_sid() calls
2008 Sep 30
1
Problem compiling tinc-1.0.8 on gcc-2.95
...++ tinc-1.0.8.my/src/protocol_key.c Thu Sep 25 11:56:40 2008
@@ -75,8 +75,8 @@
return false;
}
- n->status.validkey = false;
- n->status.waitingforkey = false;
+ n->status.st.validkey = false;
+ n->status.st.waitingforkey = false;
/* Tell the others */
@@ -210,8 +210,8 @@
hex2bin(from->key, from->key, from->keylength);
from->key[from->keylength] = '\0';
- from->status.validkey = true;
- from->status.waitingforkey = false;
+ from->status.st.validkey = true;
+ from->status.st.waitingforkey = false;
from->sent_seqno = 0;
/* Check...