Displaying 20 results from an estimated 101 matches for "key_len".
2023 Jan 05
1
Does anyone know how to completely remove the Computer SID of a Demoted DC?
...oins, it will not get the SID entry it
>> had before?
>>
>
>
> Samba-tool domain demote --remove-other-dead-server=DEAD_SERVER
>
> Rowland
>
tdb> open /var/lib/samba/private/secrets.tdb
tdb> list
hash=31
rec: hash=31 offset=0x0000ccc8 next=0x00000000 rec_len=116 key_len=20
data_len=68 full_hash=0x6344070e magic=0x26011999
hash=40
rec: hash=40 offset=0x0000cc48 next=0x00000000 rec_len=104 key_len=12
data_len=68 full_hash=0x2a4c7c2e magic=0x26011999
hash=81
rec: hash=81 offset=0x0000cb48 next=0x00000000 rec_len=48 key_len=28
data_len=5 full_hash=0x04693e9d magic=...
2023 Jan 05
1
Does anyone know how to completely remove the Computer SID of a Demoted DC?
...had before?
>>>
>>
>>
>> Samba-tool domain demote --remove-other-dead-server=DEAD_SERVER
>>
>> Rowland
>>
> tdb> open /var/lib/samba/private/secrets.tdb
> tdb> list
> hash=31
> rec: hash=31 offset=0x0000ccc8 next=0x00000000 rec_len=116 key_len=20
> data_len=68 full_hash=0x6344070e magic=0x26011999
> hash=40
> rec: hash=40 offset=0x0000cc48 next=0x00000000 rec_len=104 key_len=12
> data_len=68 full_hash=0x2a4c7c2e magic=0x26011999
> hash=81
> rec: hash=81 offset=0x0000cb48 next=0x00000000 rec_len=48 key_len=28
> dat...
2012 Sep 04
2
[PATCH] Generalize HMAC implementation
...Joshua Goodall <joshua at roughtrade.net>
- *
- * This software is released under the MIT license.
- */
-
-#include "lib.h"
-#include "hmac-md5.h"
-#include "safe-memset.h"
-
-void hmac_md5_init(struct hmac_md5_context *ctx,
- const unsigned char *key, size_t key_len)
-{
- int i;
- unsigned char md5key[16];
- unsigned char k_ipad[64];
- unsigned char k_opad[64];
-
- if (key_len > 64) {
- md5_get_digest(key, key_len, md5key);
- key = md5key;
- key_len = 16;
- }
-
- memcpy(k_ipad, key, key_len);
- memset(k_ipad + key_len, 0, 64 - key_len);
- memcpy(k_opad,...
2023 Jan 05
1
Does anyone know how to completely remove the Computer SID of a Demoted DC?
On 05/01/2023 10:20, Zombie Ryushu via samba wrote:
> Does anyone know how to completely remove the Computer SID of a Demoted
> DC? As in, another DC has taken it's place, the system is down and
> offline, but if it rejoins, it will not get the SID entry it had before?
>
Samba-tool domain demote --remove-other-dead-server=DEAD_SERVER
Rowland
2023 Jan 05
1
Does anyone know how to completely remove the Computer SID of a Demoted DC?
...gt;>>
>>> Samba-tool domain demote --remove-other-dead-server=DEAD_SERVER
>>>
>>> Rowland
>>>
>> tdb> open /var/lib/samba/private/secrets.tdb
>> tdb> list
>> hash=31
>> rec: hash=31 offset=0x0000ccc8 next=0x00000000 rec_len=116 key_len=20
>> data_len=68 full_hash=0x6344070e magic=0x26011999
>> hash=40
>> rec: hash=40 offset=0x0000cc48 next=0x00000000 rec_len=104 key_len=12
>> data_len=68 full_hash=0x2a4c7c2e magic=0x26011999
>> hash=81
>> rec: hash=81 offset=0x0000cb48 next=0x00000000 rec_len...
2007 Mar 03
18
[Bug 1291] aes256-ctr, aes192-ctr, arcfour256 broken with OpenSSL 0.9.8e
http://bugzilla.mindrot.org/show_bug.cgi?id=1291
Summary: aes256-ctr, aes192-ctr, arcfour256 broken with OpenSSL
0.9.8e
Product: Portable OpenSSH
Version: 4.5p1
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: sshd
AssignedTo: bitbucket at
2011 Sep 02
1
[PATCH 4/7] hivex: Add metadata length functions for nodes and values
...len);
+ errno = EFAULT;
+ return 0;
+ }
+ return ret;
+}
+
char *
hivex_node_name (hive_h *h, hive_node_h node)
{
@@ -1190,6 +1214,15 @@ hivex_node_get_value (hive_h *h, hive_node_h node, const char *key)
}
size_t
+hivex_value_struct_length (hive_h *h, hive_value_h value) {
+ size_t key_len = hivex_value_key_len (h, value);
+ if (errno)
+ return 0;
+ /* -1 to avoid double-counting the first name character */
+ return key_len + sizeof (struct ntreg_vk_record) - 1;
+}
+
+size_t
hivex_value_key_len (hive_h *h, hive_value_h value)
{
if (!IS_VALID_BLOCK (h, value) || !BLOCK_ID_E...
2011 Dec 08
1
Converting SSH2 keys for use in OpenSSH
...shCertEdb: EDB: Adding database: ssh.ldap
debug: Connecting to myserver.intel.com, port 22... (SOCKS not used)
debug: Ssh2: Entering event loop.
debug: Ssh2Client: Creating transport protocol.
debug: Ssh2Transport: Setting new keys and algorithms
debug: Ssh2Transport: Allocating cipher: name: none, key_len: 16.
debug: Ssh2Transport: Setting new keys and algorithms
debug: Ssh2Transport: Allocating cipher: name: none, key_len: 16.
debug: SshAuthMethodClient: Added "keyboard-interactive" to usable methods.
debug: SshAuthMethodClient: Added "publickey" to usable methods.
debug: SshAut...
2002 Mar 08
1
Problems with Solaris 8 and OpenSSH 3.1p1
...H_SSH_PIDDIR=\"/var/run\"
-DSSH_RAND_HELPER=\"/usr/libexec/ssh-rand-helper\" -DHAVE_CONFIG_H -c
cipher.c
cipher.c: In function `cipher_init':
cipher.c:200: void value not ignored as it ought to be
cipher.c:206: warning: implicit declaration of function
`EVP_CIPHER_CTX_set_key_length'
cipher.c:210: void value not ignored as it ought to be
cipher.c: In function `cipher_crypt':
cipher.c:220: void value not ignored as it ought to be
cipher.c: In function `cipher_cleanup':
cipher.c:227: void value not ignored as it ought to be
cipher.c: In function `ssh1_3des_init...
2006 Jul 18
13
RANDOM
I am pretty much new at this ROR game and had what I think to be a
simple question.
I have a set of Sponsors that I would like to be able to select one at
random and display in the my html. I have already set up the DB,
scaffolded, set index controller and all is working smoothly.
I know that I can display them all by doing
<% for sponsor in @sponsors %>
<%= sponsor.name %>
2002 Mar 07
20
[Bug 138] Incorrect OpenSSL version requirment?
http://bugzilla.mindrot.org/show_bug.cgi?id=138
mouring at eviladmin.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |vjo at dulug.duke.edu
------- Additional Comments From mouring at eviladmin.org 2002-03-08 04:49 -------
*** Bug 139 has been
2014 Jan 13
0
Re: [PATCH 1/7] Add a minimal hive with "special" keys and values
...use the NT native API to create registry key and value that contain
> + a zero character */
> +
> +#include <ntdef.h>
> +#include <stdio.h>
> +#include <ddk/wdm.h>
> +#include <windef.h>
> +
> +void create_key_value (PHANDLE handle, WCHAR* key, int key_len, WCHAR* val, int val_len)
> +{
> + UNICODE_STRING key_name = { key_len, key_len, key };
> + UNICODE_STRING value_name = { val_len, val_len, val };
> + OBJECT_ATTRIBUTES key_obj;
> + InitializeObjectAttributes (&key_obj, &key_name,
> + OBJ_O...
2005 Sep 19
0
1.0alpha2: two asserts/cores
...n.c:229
(gdb) up 4
#4 0x000633bc in message_body_search_ctx (ctx=0xffbff3dc, input=0xb9ca0,
part=0xb21d8) at message-body-search.c:395
395 i_stream_skip(input, part->physical_pos - input->v_offset);
(gdb) print *ctx
$1 = {pool = 0x0, key = 0x98f00 "MEETING", key_len = 7,
charset = 0xa9788 "US-ASCII", unknown_charset = 0, search_header = 0}
(gdb) print *input
$2 = {v_offset = 1530, stream_errno = 0, mmaped = 0, closed = 0, seekable = 0,
eof = 0, real_stream = 0xb9c78}
(gdb) print *part
$3 = {parent = 0xb2188, next = 0x0, children = 0xb2228, physic...
2014 Jan 10
14
[PATCH 1/7] Add a minimal hive with "special" keys and values
...ges/mkzero/mkzero.c
@@ -0,0 +1,59 @@
+/* use the NT native API to create registry key and value that contain
+ a zero character */
+
+#include <ntdef.h>
+#include <stdio.h>
+#include <ddk/wdm.h>
+#include <windef.h>
+
+void create_key_value (PHANDLE handle, WCHAR* key, int key_len, WCHAR* val, int val_len)
+{
+ UNICODE_STRING key_name = { key_len, key_len, key };
+ UNICODE_STRING value_name = { val_len, val_len, val };
+ OBJECT_ATTRIBUTES key_obj;
+ InitializeObjectAttributes (&key_obj, &key_name,
+ OBJ_OPENIF | OBJ_CASE_INSENSITIVE,...
2019 Oct 14
0
[PATCH 02/25] crypto: virtio - deal with unsupported input sizes
...s(-)
diff --git a/drivers/crypto/virtio/virtio_crypto_algs.c b/drivers/crypto/virtio/virtio_crypto_algs.c
index 65ec10800137..82b316b2f537 100644
--- a/drivers/crypto/virtio/virtio_crypto_algs.c
+++ b/drivers/crypto/virtio/virtio_crypto_algs.c
@@ -105,8 +105,6 @@ virtio_crypto_alg_validate_key(int key_len, uint32_t *alg)
*alg = VIRTIO_CRYPTO_CIPHER_AES_CBC;
break;
default:
- pr_err("virtio_crypto: Unsupported key length: %d\n",
- key_len);
return -EINVAL;
}
return 0;
@@ -489,6 +487,11 @@ static int virtio_crypto_ablkcipher_encrypt(struct ablkcipher_request *req)
/* Use...
2019 Oct 24
0
[PATCH v2 02/27] crypto: virtio - deal with unsupported input sizes
...s(-)
diff --git a/drivers/crypto/virtio/virtio_crypto_algs.c b/drivers/crypto/virtio/virtio_crypto_algs.c
index 65ec10800137..82b316b2f537 100644
--- a/drivers/crypto/virtio/virtio_crypto_algs.c
+++ b/drivers/crypto/virtio/virtio_crypto_algs.c
@@ -105,8 +105,6 @@ virtio_crypto_alg_validate_key(int key_len, uint32_t *alg)
*alg = VIRTIO_CRYPTO_CIPHER_AES_CBC;
break;
default:
- pr_err("virtio_crypto: Unsupported key length: %d\n",
- key_len);
return -EINVAL;
}
return 0;
@@ -489,6 +487,11 @@ static int virtio_crypto_ablkcipher_encrypt(struct ablkcipher_request *req)
/* Use...
2019 Dec 10
0
[PATCH AUTOSEL 5.4 297/350] crypto: virtio - deal with unsupported input sizes
...-)
diff --git a/drivers/crypto/virtio/virtio_crypto_algs.c b/drivers/crypto/virtio/virtio_crypto_algs.c
index 42d19205166b0..673fb29fda53c 100644
--- a/drivers/crypto/virtio/virtio_crypto_algs.c
+++ b/drivers/crypto/virtio/virtio_crypto_algs.c
@@ -105,8 +105,6 @@ virtio_crypto_alg_validate_key(int key_len, uint32_t *alg)
*alg = VIRTIO_CRYPTO_CIPHER_AES_CBC;
break;
default:
- pr_err("virtio_crypto: Unsupported key length: %d\n",
- key_len);
return -EINVAL;
}
return 0;
@@ -484,6 +482,11 @@ static int virtio_crypto_ablkcipher_encrypt(struct ablkcipher_request *req)
/* Use...
2019 Dec 10
0
[PATCH AUTOSEL 4.19 154/177] crypto: virtio - deal with unsupported input sizes
...-)
diff --git a/drivers/crypto/virtio/virtio_crypto_algs.c b/drivers/crypto/virtio/virtio_crypto_algs.c
index 2c573d1aaa64f..523b712770ac5 100644
--- a/drivers/crypto/virtio/virtio_crypto_algs.c
+++ b/drivers/crypto/virtio/virtio_crypto_algs.c
@@ -117,8 +117,6 @@ virtio_crypto_alg_validate_key(int key_len, uint32_t *alg)
*alg = VIRTIO_CRYPTO_CIPHER_AES_CBC;
break;
default:
- pr_err("virtio_crypto: Unsupported key length: %d\n",
- key_len);
return -EINVAL;
}
return 0;
@@ -498,6 +496,11 @@ static int virtio_crypto_ablkcipher_encrypt(struct ablkcipher_request *req)
/* Use...
2019 Dec 10
0
[PATCH AUTOSEL 4.14 113/130] crypto: virtio - deal with unsupported input sizes
...-)
diff --git a/drivers/crypto/virtio/virtio_crypto_algs.c b/drivers/crypto/virtio/virtio_crypto_algs.c
index 5035b0dc1e40c..e2231a1a05a12 100644
--- a/drivers/crypto/virtio/virtio_crypto_algs.c
+++ b/drivers/crypto/virtio/virtio_crypto_algs.c
@@ -110,8 +110,6 @@ virtio_crypto_alg_validate_key(int key_len, uint32_t *alg)
*alg = VIRTIO_CRYPTO_CIPHER_AES_CBC;
break;
default:
- pr_err("virtio_crypto: Unsupported key length: %d\n",
- key_len);
return -EINVAL;
}
return 0;
@@ -485,6 +483,11 @@ static int virtio_crypto_ablkcipher_encrypt(struct ablkcipher_request *req)
/* Use...
2019 Dec 29
0
[PATCH 4.14 121/161] crypto: virtio - deal with unsupported input sizes
...s(-)
diff --git a/drivers/crypto/virtio/virtio_crypto_algs.c b/drivers/crypto/virtio/virtio_crypto_algs.c
index 5035b0dc1e40..e2231a1a05a1 100644
--- a/drivers/crypto/virtio/virtio_crypto_algs.c
+++ b/drivers/crypto/virtio/virtio_crypto_algs.c
@@ -110,8 +110,6 @@ virtio_crypto_alg_validate_key(int key_len, uint32_t *alg)
*alg = VIRTIO_CRYPTO_CIPHER_AES_CBC;
break;
default:
- pr_err("virtio_crypto: Unsupported key length: %d\n",
- key_len);
return -EINVAL;
}
return 0;
@@ -485,6 +483,11 @@ static int virtio_crypto_ablkcipher_encrypt(struct ablkcipher_request *req)
/* Use...