search for: key_len

Displaying 20 results from an estimated 101 matches for "key_len".

2023 Jan 05
1
Does anyone know how to completely remove the Computer SID of a Demoted DC?
...oins, it will not get the SID entry it >> had before? >> > > > Samba-tool domain demote --remove-other-dead-server=DEAD_SERVER > > Rowland > tdb> open /var/lib/samba/private/secrets.tdb tdb> list hash=31 rec: hash=31 offset=0x0000ccc8 next=0x00000000 rec_len=116 key_len=20 data_len=68 full_hash=0x6344070e magic=0x26011999 hash=40 rec: hash=40 offset=0x0000cc48 next=0x00000000 rec_len=104 key_len=12 data_len=68 full_hash=0x2a4c7c2e magic=0x26011999 hash=81 rec: hash=81 offset=0x0000cb48 next=0x00000000 rec_len=48 key_len=28 data_len=5 full_hash=0x04693e9d magic=...
2023 Jan 05
1
Does anyone know how to completely remove the Computer SID of a Demoted DC?
...had before? >>> >> >> >> Samba-tool domain demote --remove-other-dead-server=DEAD_SERVER >> >> Rowland >> > tdb> open /var/lib/samba/private/secrets.tdb > tdb> list > hash=31 > rec: hash=31 offset=0x0000ccc8 next=0x00000000 rec_len=116 key_len=20 > data_len=68 full_hash=0x6344070e magic=0x26011999 > hash=40 > rec: hash=40 offset=0x0000cc48 next=0x00000000 rec_len=104 key_len=12 > data_len=68 full_hash=0x2a4c7c2e magic=0x26011999 > hash=81 > rec: hash=81 offset=0x0000cb48 next=0x00000000 rec_len=48 key_len=28 > dat...
2012 Sep 04
2
[PATCH] Generalize HMAC implementation
...Joshua Goodall <joshua at roughtrade.net> - * - * This software is released under the MIT license. - */ - -#include "lib.h" -#include "hmac-md5.h" -#include "safe-memset.h" - -void hmac_md5_init(struct hmac_md5_context *ctx, - const unsigned char *key, size_t key_len) -{ - int i; - unsigned char md5key[16]; - unsigned char k_ipad[64]; - unsigned char k_opad[64]; - - if (key_len > 64) { - md5_get_digest(key, key_len, md5key); - key = md5key; - key_len = 16; - } - - memcpy(k_ipad, key, key_len); - memset(k_ipad + key_len, 0, 64 - key_len); - memcpy(k_opad,...
2023 Jan 05
1
Does anyone know how to completely remove the Computer SID of a Demoted DC?
On 05/01/2023 10:20, Zombie Ryushu via samba wrote: > Does anyone know how to completely remove the Computer SID of a Demoted > DC? As in, another DC has taken it's place, the system is down and > offline, but if it rejoins, it will not get the SID entry it had before? > Samba-tool domain demote --remove-other-dead-server=DEAD_SERVER Rowland
2023 Jan 05
1
Does anyone know how to completely remove the Computer SID of a Demoted DC?
...gt;>> >>> Samba-tool domain demote --remove-other-dead-server=DEAD_SERVER >>> >>> Rowland >>> >> tdb> open /var/lib/samba/private/secrets.tdb >> tdb> list >> hash=31 >> rec: hash=31 offset=0x0000ccc8 next=0x00000000 rec_len=116 key_len=20 >> data_len=68 full_hash=0x6344070e magic=0x26011999 >> hash=40 >> rec: hash=40 offset=0x0000cc48 next=0x00000000 rec_len=104 key_len=12 >> data_len=68 full_hash=0x2a4c7c2e magic=0x26011999 >> hash=81 >> rec: hash=81 offset=0x0000cb48 next=0x00000000 rec_len...
2007 Mar 03
18
[Bug 1291] aes256-ctr, aes192-ctr, arcfour256 broken with OpenSSL 0.9.8e
http://bugzilla.mindrot.org/show_bug.cgi?id=1291 Summary: aes256-ctr, aes192-ctr, arcfour256 broken with OpenSSL 0.9.8e Product: Portable OpenSSH Version: 4.5p1 Platform: All OS/Version: All Status: NEW Severity: minor Priority: P2 Component: sshd AssignedTo: bitbucket at
2011 Sep 02
1
[PATCH 4/7] hivex: Add metadata length functions for nodes and values
...len); + errno = EFAULT; + return 0; + } + return ret; +} + char * hivex_node_name (hive_h *h, hive_node_h node) { @@ -1190,6 +1214,15 @@ hivex_node_get_value (hive_h *h, hive_node_h node, const char *key) } size_t +hivex_value_struct_length (hive_h *h, hive_value_h value) { + size_t key_len = hivex_value_key_len (h, value); + if (errno) + return 0; + /* -1 to avoid double-counting the first name character */ + return key_len + sizeof (struct ntreg_vk_record) - 1; +} + +size_t hivex_value_key_len (hive_h *h, hive_value_h value) { if (!IS_VALID_BLOCK (h, value) || !BLOCK_ID_E...
2011 Dec 08
1
Converting SSH2 keys for use in OpenSSH
...shCertEdb: EDB: Adding database: ssh.ldap debug: Connecting to myserver.intel.com, port 22... (SOCKS not used) debug: Ssh2: Entering event loop. debug: Ssh2Client: Creating transport protocol. debug: Ssh2Transport: Setting new keys and algorithms debug: Ssh2Transport: Allocating cipher: name: none, key_len: 16. debug: Ssh2Transport: Setting new keys and algorithms debug: Ssh2Transport: Allocating cipher: name: none, key_len: 16. debug: SshAuthMethodClient: Added "keyboard-interactive" to usable methods. debug: SshAuthMethodClient: Added "publickey" to usable methods. debug: SshAut...
2002 Mar 08
1
Problems with Solaris 8 and OpenSSH 3.1p1
...H_SSH_PIDDIR=\"/var/run\" -DSSH_RAND_HELPER=\"/usr/libexec/ssh-rand-helper\" -DHAVE_CONFIG_H -c cipher.c cipher.c: In function `cipher_init': cipher.c:200: void value not ignored as it ought to be cipher.c:206: warning: implicit declaration of function `EVP_CIPHER_CTX_set_key_length' cipher.c:210: void value not ignored as it ought to be cipher.c: In function `cipher_crypt': cipher.c:220: void value not ignored as it ought to be cipher.c: In function `cipher_cleanup': cipher.c:227: void value not ignored as it ought to be cipher.c: In function `ssh1_3des_init...
2006 Jul 18
13
RANDOM
I am pretty much new at this ROR game and had what I think to be a simple question. I have a set of Sponsors that I would like to be able to select one at random and display in the my html. I have already set up the DB, scaffolded, set index controller and all is working smoothly. I know that I can display them all by doing <% for sponsor in @sponsors %> <%= sponsor.name %>
2002 Mar 07
20
[Bug 138] Incorrect OpenSSL version requirment?
http://bugzilla.mindrot.org/show_bug.cgi?id=138 mouring at eviladmin.org changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |vjo at dulug.duke.edu ------- Additional Comments From mouring at eviladmin.org 2002-03-08 04:49 ------- *** Bug 139 has been
2014 Jan 13
0
Re: [PATCH 1/7] Add a minimal hive with "special" keys and values
...use the NT native API to create registry key and value that contain > + a zero character */ > + > +#include <ntdef.h> > +#include <stdio.h> > +#include <ddk/wdm.h> > +#include <windef.h> > + > +void create_key_value (PHANDLE handle, WCHAR* key, int key_len, WCHAR* val, int val_len) > +{ > + UNICODE_STRING key_name = { key_len, key_len, key }; > + UNICODE_STRING value_name = { val_len, val_len, val }; > + OBJECT_ATTRIBUTES key_obj; > + InitializeObjectAttributes (&key_obj, &key_name, > + OBJ_O...
2005 Sep 19
0
1.0alpha2: two asserts/cores
...n.c:229 (gdb) up 4 #4 0x000633bc in message_body_search_ctx (ctx=0xffbff3dc, input=0xb9ca0, part=0xb21d8) at message-body-search.c:395 395 i_stream_skip(input, part->physical_pos - input->v_offset); (gdb) print *ctx $1 = {pool = 0x0, key = 0x98f00 "MEETING", key_len = 7, charset = 0xa9788 "US-ASCII", unknown_charset = 0, search_header = 0} (gdb) print *input $2 = {v_offset = 1530, stream_errno = 0, mmaped = 0, closed = 0, seekable = 0, eof = 0, real_stream = 0xb9c78} (gdb) print *part $3 = {parent = 0xb2188, next = 0x0, children = 0xb2228, physic...
2014 Jan 10
14
[PATCH 1/7] Add a minimal hive with "special" keys and values
...ges/mkzero/mkzero.c @@ -0,0 +1,59 @@ +/* use the NT native API to create registry key and value that contain + a zero character */ + +#include <ntdef.h> +#include <stdio.h> +#include <ddk/wdm.h> +#include <windef.h> + +void create_key_value (PHANDLE handle, WCHAR* key, int key_len, WCHAR* val, int val_len) +{ + UNICODE_STRING key_name = { key_len, key_len, key }; + UNICODE_STRING value_name = { val_len, val_len, val }; + OBJECT_ATTRIBUTES key_obj; + InitializeObjectAttributes (&key_obj, &key_name, + OBJ_OPENIF | OBJ_CASE_INSENSITIVE,...
2019 Oct 14
0
[PATCH 02/25] crypto: virtio - deal with unsupported input sizes
...s(-) diff --git a/drivers/crypto/virtio/virtio_crypto_algs.c b/drivers/crypto/virtio/virtio_crypto_algs.c index 65ec10800137..82b316b2f537 100644 --- a/drivers/crypto/virtio/virtio_crypto_algs.c +++ b/drivers/crypto/virtio/virtio_crypto_algs.c @@ -105,8 +105,6 @@ virtio_crypto_alg_validate_key(int key_len, uint32_t *alg) *alg = VIRTIO_CRYPTO_CIPHER_AES_CBC; break; default: - pr_err("virtio_crypto: Unsupported key length: %d\n", - key_len); return -EINVAL; } return 0; @@ -489,6 +487,11 @@ static int virtio_crypto_ablkcipher_encrypt(struct ablkcipher_request *req) /* Use...
2019 Oct 24
0
[PATCH v2 02/27] crypto: virtio - deal with unsupported input sizes
...s(-) diff --git a/drivers/crypto/virtio/virtio_crypto_algs.c b/drivers/crypto/virtio/virtio_crypto_algs.c index 65ec10800137..82b316b2f537 100644 --- a/drivers/crypto/virtio/virtio_crypto_algs.c +++ b/drivers/crypto/virtio/virtio_crypto_algs.c @@ -105,8 +105,6 @@ virtio_crypto_alg_validate_key(int key_len, uint32_t *alg) *alg = VIRTIO_CRYPTO_CIPHER_AES_CBC; break; default: - pr_err("virtio_crypto: Unsupported key length: %d\n", - key_len); return -EINVAL; } return 0; @@ -489,6 +487,11 @@ static int virtio_crypto_ablkcipher_encrypt(struct ablkcipher_request *req) /* Use...
2019 Dec 10
0
[PATCH AUTOSEL 5.4 297/350] crypto: virtio - deal with unsupported input sizes
...-) diff --git a/drivers/crypto/virtio/virtio_crypto_algs.c b/drivers/crypto/virtio/virtio_crypto_algs.c index 42d19205166b0..673fb29fda53c 100644 --- a/drivers/crypto/virtio/virtio_crypto_algs.c +++ b/drivers/crypto/virtio/virtio_crypto_algs.c @@ -105,8 +105,6 @@ virtio_crypto_alg_validate_key(int key_len, uint32_t *alg) *alg = VIRTIO_CRYPTO_CIPHER_AES_CBC; break; default: - pr_err("virtio_crypto: Unsupported key length: %d\n", - key_len); return -EINVAL; } return 0; @@ -484,6 +482,11 @@ static int virtio_crypto_ablkcipher_encrypt(struct ablkcipher_request *req) /* Use...
2019 Dec 10
0
[PATCH AUTOSEL 4.19 154/177] crypto: virtio - deal with unsupported input sizes
...-) diff --git a/drivers/crypto/virtio/virtio_crypto_algs.c b/drivers/crypto/virtio/virtio_crypto_algs.c index 2c573d1aaa64f..523b712770ac5 100644 --- a/drivers/crypto/virtio/virtio_crypto_algs.c +++ b/drivers/crypto/virtio/virtio_crypto_algs.c @@ -117,8 +117,6 @@ virtio_crypto_alg_validate_key(int key_len, uint32_t *alg) *alg = VIRTIO_CRYPTO_CIPHER_AES_CBC; break; default: - pr_err("virtio_crypto: Unsupported key length: %d\n", - key_len); return -EINVAL; } return 0; @@ -498,6 +496,11 @@ static int virtio_crypto_ablkcipher_encrypt(struct ablkcipher_request *req) /* Use...
2019 Dec 10
0
[PATCH AUTOSEL 4.14 113/130] crypto: virtio - deal with unsupported input sizes
...-) diff --git a/drivers/crypto/virtio/virtio_crypto_algs.c b/drivers/crypto/virtio/virtio_crypto_algs.c index 5035b0dc1e40c..e2231a1a05a12 100644 --- a/drivers/crypto/virtio/virtio_crypto_algs.c +++ b/drivers/crypto/virtio/virtio_crypto_algs.c @@ -110,8 +110,6 @@ virtio_crypto_alg_validate_key(int key_len, uint32_t *alg) *alg = VIRTIO_CRYPTO_CIPHER_AES_CBC; break; default: - pr_err("virtio_crypto: Unsupported key length: %d\n", - key_len); return -EINVAL; } return 0; @@ -485,6 +483,11 @@ static int virtio_crypto_ablkcipher_encrypt(struct ablkcipher_request *req) /* Use...
2019 Dec 29
0
[PATCH 4.14 121/161] crypto: virtio - deal with unsupported input sizes
...s(-) diff --git a/drivers/crypto/virtio/virtio_crypto_algs.c b/drivers/crypto/virtio/virtio_crypto_algs.c index 5035b0dc1e40..e2231a1a05a1 100644 --- a/drivers/crypto/virtio/virtio_crypto_algs.c +++ b/drivers/crypto/virtio/virtio_crypto_algs.c @@ -110,8 +110,6 @@ virtio_crypto_alg_validate_key(int key_len, uint32_t *alg) *alg = VIRTIO_CRYPTO_CIPHER_AES_CBC; break; default: - pr_err("virtio_crypto: Unsupported key length: %d\n", - key_len); return -EINVAL; } return 0; @@ -485,6 +483,11 @@ static int virtio_crypto_ablkcipher_encrypt(struct ablkcipher_request *req) /* Use...