Displaying 7 results from an estimated 7 matches for "hex_to_binary".
2009 Nov 14
1
2.0.alpha3: imap-login segfault in hex_to_binary
Dovecot-2.0.alpha3's imap-login segfaulted with this backtrace:
0 hex_to_binary
1 master_send_request
2 anvil_input
3 io_loop_handler_run
4 io_loop_run
5 master_service_run
6 main
7 start
Looks to me like auth_client_get_cookie() returned NULL in master_send_request().
2004 Nov 10
0
[PATCH] NTLM update and crashfix
Hello,
attached patch allows LM authentication for older (Win9x) clients
which do not pass NTLM response in type 3 message. It also fixes
crash in dovecot-auth (empty credentials could be passed to
hex_to_binary function if NTLM2 was negotiated).
Please consider applying.
Best regards.
--
Andrey Panin | Linux and UNIX system administrator
pazke at donpac.ru | PGP key: wwwkeys.pgp.net
-------------- next part --------------
diff -urdpNX /usr/share/dontdiff -x debian dovecot-1.0-test52.vanilla/src/auth...
2004 Oct 29
1
[PATCH] yet another NTLM update
...+ if ((credentials == NULL && !request->ntlm2_negotiated) || !response_length) {
passdb->lookup_credentials(auth_request,
PASSDB_CREDENTIALS_LANMAN,
lm_credentials_callback);
@@ -85,9 +89,6 @@ ntlm_credentials_callback(const char *cr
hash, sizeof(hash));
hex_to_binary(credentials, hash_buffer);
- response_length =
- ntlmssp_buffer_length(request->response, ntlm_response);
- client_response = ntlmssp_buffer_data(request->response, ntlm_response);
if (response_length > NTLMSSP_RESPONSE_SIZE) {
unsigned char ntlm_v2_response[NTLMSSP_V2_RESPONSE_S...
2006 Jun 26
2
[PATCH, RFC 3/13] OTP: parity table
Add OTP parity table.
diff -urdpNX /usr/share/dontdiff -x Makefile dovecot.vanilla/src/lib-otp/otp-parity.c dovecot/src/lib-otp/otp-parity.c
--- dovecot.vanilla/src/lib-otp/otp-parity.c 1970-01-01 03:00:00.000000000 +0300
+++ dovecot/src/lib-otp/otp-parity.c 2006-06-23 13:44:31.161891112 +0400
@@ -0,0 +1,29 @@
+/*
+ * OTP parity table.
+ *
+ * Copyright (c) 2006 Andrey Panin <pazke at
2004 Jul 01
3
[PATCH, RFC] add APOP authentication mechanism
...uct apop_auth_request *auth =
+ (struct apop_auth_request *)auth_request;
+ buffer_t *digest_buf;
+ unsigned char remote_digest[16];
+ unsigned char digest[16];
+ struct md5_context ctx;
+
+ digest_buf = buffer_create_data(pool_datastack_create(),
+ remote_digest, sizeof(remote_digest));
+ if (hex_to_binary(auth->digest, digest_buf) <= 0) {
+ if (verbose)
+ i_info("apop(%s): invalid characters in APOP digest", get_log_prefix(auth_request));
+ mech_auth_finish(auth_request, NULL, 0, FALSE);
+ return;
+ }
+
+ md5_init(&ctx);
+ md5_update(&ctx, auth->challenge, strlen(auth...
2004 Aug 09
1
[PATCH] RPA authentication mechanism
...request *auth_request)
+{
+ struct rpa_auth_request *auth =
+ (struct rpa_auth_request *)auth_request;
+ buffer_t *hash_buffer;
+
+ if (credentials == NULL)
+ return;
+
+ auth->pwd_md5 = p_malloc(auth->pool, 16);
+
+ hash_buffer = buffer_create_data(auth->pool, auth->pwd_md5, 16);
+
+ hex_to_binary(credentials, hash_buffer);
+}
+
+static int
+mech_rpa_auth_phase1(struct auth_request *auth_request,
+ const unsigned char *data, size_t data_size,
+ mech_callback_t *callback)
+{
+ struct rpa_auth_request *auth =
+ (struct rpa_auth_request *)auth_request;
+ struct auth_client_request_...
2010 Apr 09
4
Patch: support URLAUTH, BURL, CATENATE
...x);
+ modified = TRUE;
+ } /* else mailbox="" for foiling timing attacks */
+ break;
+ case URLAUTH_KEYS_DELETE:
+ hex = hash_table_lookup(keys, (void *) mailbox);
+ if (hex) {
+ hash_table_remove(keys, (void *) mailbox);
+ modified = TRUE;
+ }
+ break;
+ }
+
+ if (out_key)
+ hex_to_binary(hex, out_key);
+
+ /* write the keys */
+ if (modified) {
+ lseek(fd, 0, SEEK_SET);
+ ftruncate(fd, 0);
+ urlauth_keys_write(fd, keys);
+ }
+
+ /* clean up */
+ close(fd);
+ hash_table_destroy(&keys);
+ pool_unref(&pool);
+
+ return TRUE;
+}
+
+void urlauth_keys_init(void)
+{
+ random_in...