search for: hex_to_binary

Displaying 7 results from an estimated 7 matches for "hex_to_binary".

2009 Nov 14
1
2.0.alpha3: imap-login segfault in hex_to_binary
Dovecot-2.0.alpha3's imap-login segfaulted with this backtrace: 0 hex_to_binary 1 master_send_request 2 anvil_input 3 io_loop_handler_run 4 io_loop_run 5 master_service_run 6 main 7 start Looks to me like auth_client_get_cookie() returned NULL in master_send_request().
2004 Nov 10
0
[PATCH] NTLM update and crashfix
Hello, attached patch allows LM authentication for older (Win9x) clients which do not pass NTLM response in type 3 message. It also fixes crash in dovecot-auth (empty credentials could be passed to hex_to_binary function if NTLM2 was negotiated). Please consider applying. Best regards. -- Andrey Panin | Linux and UNIX system administrator pazke at donpac.ru | PGP key: wwwkeys.pgp.net -------------- next part -------------- diff -urdpNX /usr/share/dontdiff -x debian dovecot-1.0-test52.vanilla/src/auth...
2004 Oct 29
1
[PATCH] yet another NTLM update
...+ if ((credentials == NULL && !request->ntlm2_negotiated) || !response_length) { passdb->lookup_credentials(auth_request, PASSDB_CREDENTIALS_LANMAN, lm_credentials_callback); @@ -85,9 +89,6 @@ ntlm_credentials_callback(const char *cr hash, sizeof(hash)); hex_to_binary(credentials, hash_buffer); - response_length = - ntlmssp_buffer_length(request->response, ntlm_response); - client_response = ntlmssp_buffer_data(request->response, ntlm_response); if (response_length > NTLMSSP_RESPONSE_SIZE) { unsigned char ntlm_v2_response[NTLMSSP_V2_RESPONSE_S...
2006 Jun 26
2
[PATCH, RFC 3/13] OTP: parity table
Add OTP parity table. diff -urdpNX /usr/share/dontdiff -x Makefile dovecot.vanilla/src/lib-otp/otp-parity.c dovecot/src/lib-otp/otp-parity.c --- dovecot.vanilla/src/lib-otp/otp-parity.c 1970-01-01 03:00:00.000000000 +0300 +++ dovecot/src/lib-otp/otp-parity.c 2006-06-23 13:44:31.161891112 +0400 @@ -0,0 +1,29 @@ +/* + * OTP parity table. + * + * Copyright (c) 2006 Andrey Panin <pazke at
2004 Jul 01
3
[PATCH, RFC] add APOP authentication mechanism
...uct apop_auth_request *auth = + (struct apop_auth_request *)auth_request; + buffer_t *digest_buf; + unsigned char remote_digest[16]; + unsigned char digest[16]; + struct md5_context ctx; + + digest_buf = buffer_create_data(pool_datastack_create(), + remote_digest, sizeof(remote_digest)); + if (hex_to_binary(auth->digest, digest_buf) <= 0) { + if (verbose) + i_info("apop(%s): invalid characters in APOP digest", get_log_prefix(auth_request)); + mech_auth_finish(auth_request, NULL, 0, FALSE); + return; + } + + md5_init(&ctx); + md5_update(&ctx, auth->challenge, strlen(auth...
2004 Aug 09
1
[PATCH] RPA authentication mechanism
...request *auth_request) +{ + struct rpa_auth_request *auth = + (struct rpa_auth_request *)auth_request; + buffer_t *hash_buffer; + + if (credentials == NULL) + return; + + auth->pwd_md5 = p_malloc(auth->pool, 16); + + hash_buffer = buffer_create_data(auth->pool, auth->pwd_md5, 16); + + hex_to_binary(credentials, hash_buffer); +} + +static int +mech_rpa_auth_phase1(struct auth_request *auth_request, + const unsigned char *data, size_t data_size, + mech_callback_t *callback) +{ + struct rpa_auth_request *auth = + (struct rpa_auth_request *)auth_request; + struct auth_client_request_...
2010 Apr 09
4
Patch: support URLAUTH, BURL, CATENATE
...x); + modified = TRUE; + } /* else mailbox="" for foiling timing attacks */ + break; + case URLAUTH_KEYS_DELETE: + hex = hash_table_lookup(keys, (void *) mailbox); + if (hex) { + hash_table_remove(keys, (void *) mailbox); + modified = TRUE; + } + break; + } + + if (out_key) + hex_to_binary(hex, out_key); + + /* write the keys */ + if (modified) { + lseek(fd, 0, SEEK_SET); + ftruncate(fd, 0); + urlauth_keys_write(fd, keys); + } + + /* clean up */ + close(fd); + hash_table_destroy(&keys); + pool_unref(&pool); + + return TRUE; +} + +void urlauth_keys_init(void) +{ + random_in...