search for: key_size

Displaying 20 results from an estimated 28 matches for "key_size".

2014 Jun 16
1
[PATCH 1/1] rework printing for visual host key upper border
...SIZE_X * FLDSIZE_Y * sizeof(char)); @@ -587,11 +588,14 @@ key_fingerprint_randomart(u_char *dgst_raw, u_int dgst_raw_len, const Key *k) field[FLDSIZE_X / 2][FLDSIZE_Y / 2] = len - 1; field[x][y] = len; - /* fill in retval */ - snprintf(retval, FLDSIZE_X, "+--[%4s %4u]", key_type(k), key_size(k)); - p = strchr(retval, '\0'); + /* assemble key detail string */ + snprintf(key_details, FLDSIZE_X, "[%s %u]", key_type(k), key_size(k)); /* output upper border */ + *p++ = '+'; + for (i = 0; i < (FLDSIZE_X - strlen(key_details)) / 2; i++) + *p++ = '-';...
2014 Mar 20
2
[Bug 2215] New: Key fingerprint headline slightly broken with ED25519
...g The key fingerprint headline has unsymmetrical braces for ED25519 in 6.6p1: +--[ED25519 256--+ | ... | Seems like in key.c:561, snprintf aborts before being able to put the final ']'. Note, that there's an unnecessary ' ' in there because of ED25519's short key_size. Reducing the minimum field width for key_size(k) in snprintf from 4 to 3 should remove the unnecessary ' ' and make room for the missing ']'. -- You are receiving this mail because: You are watching the assignee of the bug.
2014 Jan 28
2
[PATCH 1/1] rework printing for visual host key upper border
...SIZE_X * FLDSIZE_Y * sizeof(char)); @@ -570,11 +571,14 @@ key_fingerprint_randomart(u_char *dgst_raw, u_int dgst_raw_len, const Key *k) field[FLDSIZE_X / 2][FLDSIZE_Y / 2] = len - 1; field[x][y] = len; - /* fill in retval */ - snprintf(retval, FLDSIZE_X, "+--[%4s %4u]", key_type(k), key_size(k)); - p = strchr(retval, '\0'); + /* assemble key detail string */ + snprintf(key_details, FLDSIZE_X, "[%s %u]", key_type(k), key_size(k)); /* output upper border */ + *p++ = '+'; + for (i = 0; i < (FLDSIZE_X - strlen(key_details)) / 2; i++) + *p++ = '-';...
2003 May 29
0
SSH key_copy
I am wondering why there is no utility for copying the Key structure in SSH. I am looking for something like this: key_copy(Key* dest, const Key* source); Do we have something like above? I noticed we have key_size, key_equals etc but no key_copy Thanks, Tushar _________________________________________________________________ MSN 8 helps eliminate e-mail viruses. Get 2 months FREE*. http://join.msn.com/?page=features/virus
2009 Feb 02
1
sieve 0.1.2 problem with address and :regex
...applied. Stack trace is: #0 0x003e4893 in regexec@@GLIBC_2.3.4 () from /lib/i686/nosegneg/libc.so.6 #1 0x08071289 in mcht_regex_match (mctx=0x896b3d0, val=0x896b728 "antlr.org", val_size=9, key=0x8974ffd "antlr.org|mailman.unixodbc.org|research.att.com|wireshark.org", key_size=61, key_index=0) at mcht-regex.c:256 #2 0x080847c9 in sieve_match_value (mctx=0x896b3d0, value=0x896b728 "antlr.org", val_size=9) at sieve-match.c:83 #3 0x080841c5 in sieve_address_match (addrp=0x8187a20, mctx=0x896b3d0, data=0x897f080 "antlr-interest-bounces at antlr.or...
2013 Dec 09
1
[Bug 2180] New: Improve the handling of the key comment field
...in/cvsweb/src/usr.bin/ssh/ssh-keygen.c ssh-keygen.c:259: do_convert_to_ssh2(struct passwd *pw, Key *k) [...]/* Comment + surrounds must fit into 72 chars (RFC 4716 sec 3.3) */ snprintf(comment, sizeof(comment), "%u-bit %s, converted by %s@%s from OpenSSH", key_size(k), key_type(k), pw->pw_name, hostname); keygen.c:504: do_convert_from_ssh2(struct passwd *pw, Key **k, int *private) Step to reproduce: ssh-keygen -t rsa -C "a pretty useful comment" -f mykey1 cat mykey1.pub ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDUeyrplNBmRK+1icSgoF/0eh...
2020 Sep 25
20
[RFC PATCH 00/19] vhost-user-rpmb (Replay Protected Memory Block)
Hi, This is an initial implementation of a vhost-user backend for the VirtIO RPMB device. The device is currently in the draft of the next VirtIO specification and describes block device which uses combination of a key, nonce, hashing and a persistent write counter to prevent replay attacks (hence Replay Protected Memory Block). It is implemented as a vhost-user device because we want to
2010 Dec 08
0
No subject
...urning an = error. + */ + icmsghdrp->status =3D HV_E_FAIL; + goto response_done; + } + + /* + * The windows host expects the key/value pair to be encoded + * in utf16. + */ + keylen =3D utf8s_to_utf16s(key_name, strlen(key_name), + (wchar_t *)kvp_data->data.key); + kvp_data->data.key_size =3D 2*(keylen + 1); /* utf16 encoding */ + valuelen =3D utf8s_to_utf16s(value, strlen(value), + (wchar_t *)kvp_data->data.value); + kvp_data->data.value_size =3D 2*(valuelen + 1); /* utf16 encoding = */ + + kvp_data->data.value_type =3D REG_SZ; /* all our values are = strings */ + icmsg...
2010 Dec 08
0
No subject
...urning an = error. + */ + icmsghdrp->status =3D HV_E_FAIL; + goto response_done; + } + + /* + * The windows host expects the key/value pair to be encoded + * in utf16. + */ + keylen =3D utf8s_to_utf16s(key_name, strlen(key_name), + (wchar_t *)kvp_data->data.key); + kvp_data->data.key_size =3D 2*(keylen + 1); /* utf16 encoding */ + valuelen =3D utf8s_to_utf16s(value, strlen(value), + (wchar_t *)kvp_data->data.value); + kvp_data->data.value_size =3D 2*(valuelen + 1); /* utf16 encoding = */ + + kvp_data->data.value_type =3D REG_SZ; /* all our values are = strings */ + icmsg...
2001 Mar 04
1
bubblebabble patch
...; } if (success) { + + char *digest_sha1, *digest_bubblebabble; + + digest_sha1 = key_fingerprint_ex(public,DIGEST_TYPE_SHA1,DIGEST_REPRESENTATION_HEX); + digest_bubblebabble = key_fingerprint_ex(public,DIGEST_TYPE_SHA1,DIGEST_REPRESENTATION_BUBBLEBABBLE); + printf("%d %s %s\n", key_size(public), key_fingerprint(public), comment); + printf("Alternative digests:\n"); + printf(" sha1 : %s\n",digest_sha1); + printf(" bubblebabble : %s\n",digest_bubblebabble); + key_free(public); xfree(comment); + xfree(digest_sha1); + xfree(digest_bubbl...
2010 Dec 17
0
[PATCH 3/4] Staging: hv: Implement key/value pair (KVP)
...by returning an error. + */ + icmsghdrp->status = HV_E_FAIL; + goto response_done; + } + + /* + * The windows host expects the key/value pair to be encoded + * in utf16. + */ + keylen = utf8s_to_utf16s(key_name, strlen(key_name), + (wchar_t *)kvp_data->data.key); + kvp_data->data.key_size = 2*(keylen + 1); /* utf16 encoding */ + valuelen = utf8s_to_utf16s(value, strlen(value), + (wchar_t *)kvp_data->data.value); + kvp_data->data.value_size = 2*(valuelen + 1); /* utf16 encoding */ + + kvp_data->data.value_type = REG_SZ; /* all our values are strings */ + icmsghdrp->sta...
2010 Dec 17
0
[PATCH 3/4] Staging: hv: Implement key/value pair (KVP)
...by returning an error. + */ + icmsghdrp->status = HV_E_FAIL; + goto response_done; + } + + /* + * The windows host expects the key/value pair to be encoded + * in utf16. + */ + keylen = utf8s_to_utf16s(key_name, strlen(key_name), + (wchar_t *)kvp_data->data.key); + kvp_data->data.key_size = 2*(keylen + 1); /* utf16 encoding */ + valuelen = utf8s_to_utf16s(value, strlen(value), + (wchar_t *)kvp_data->data.value); + kvp_data->data.value_size = 2*(valuelen + 1); /* utf16 encoding */ + + kvp_data->data.value_type = REG_SZ; /* all our values are strings */ + icmsghdrp->sta...
2010 Nov 22
1
[PATCH 3/3]: An implementation of HyperV KVP functionality
An implementation of key/value pair feature (KVP) for Linux on HyperV. In this version of the patch I have addressed all the comments I have received to date. I have also included the code for the user-level daemon here for your reference. Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com> -------------- next part -------------- An embedded and charset-unspecified text was
2010 Nov 22
1
[PATCH 3/3]: An implementation of HyperV KVP functionality
An implementation of key/value pair feature (KVP) for Linux on HyperV. In this version of the patch I have addressed all the comments I have received to date. I have also included the code for the user-level daemon here for your reference. Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com> -------------- next part -------------- An embedded and charset-unspecified text was
2005 May 19
1
ssh-keygen private keys export - new feature
...n) <= 0) { + fprintf(stderr, "key_to_blob failed\n"); + exit(1); + } + } + fprintf(stdout, "%s\n", + private?SSH_COM_PRIVATE_BEGIN:SSH_COM_PUBLIC_BEGIN); fprintf(stdout, "Comment: \"%u-bit %s, converted from OpenSSH by %s@%s\"\n", key_size(k), key_type(k), pw->pw_name, hostname); dump_base64(stdout, blob, len); - fprintf(stdout, "%s\n", SSH_COM_PUBLIC_END); + fprintf(stdout, "%s\n", + private?SSH_COM_PRIVATE_END:SSH_COM_PUBLIC_END); key_free(k); xfree(blob); exit(0); @@ -216,7 +326,6 @@...
2019 Apr 11
4
Understanding Problem with rsa min key length 1024
Hello, Sometime ago min rsa key length was increased to 1024 bit and i have a little understanding problem with this. I hope somebody with some crypto-experience can enlighten me. To make that clear, that is not about allowing lower keys in general. Personally i would tend to use even longer keys(2048bit+). However Due nature of RSA-algorithm in case of 1024bit this might result in a key
2010 Nov 11
4
[PATCH]: An implementation of HyperV KVP functionality
I am enclosing a patch that implements the KVP (Key Value Pair) functionality for Linux guests on HyperV. This functionality allows Microsoft Management stack to query information from the guest. This functionality is implemented in two parts: (a) A kernel component that communicates with the host and (b) A user level daemon that implements data gathering. The attached patch (kvp.patch) implements
2010 Nov 11
4
[PATCH]: An implementation of HyperV KVP functionality
I am enclosing a patch that implements the KVP (Key Value Pair) functionality for Linux guests on HyperV. This functionality allows Microsoft Management stack to query information from the guest. This functionality is implemented in two parts: (a) A kernel component that communicates with the host and (b) A user level daemon that implements data gathering. The attached patch (kvp.patch) implements
2020 Apr 13
0
[PATCH 1/2] mm, treewide: Rename kzfree() to kfree_sensitive()
...ve(desc); free_tfm: crypto_free_shash(tfm); diff --git a/crypto/adiantum.c b/crypto/adiantum.c index cf2b9f4103dd..b7824e214961 100644 --- a/crypto/adiantum.c +++ b/crypto/adiantum.c @@ -177,7 +177,7 @@ static int adiantum_setkey(struct crypto_skcipher *tfm, const u8 *key, keyp += NHPOLY1305_KEY_SIZE; WARN_ON(keyp != &data->derived_keys[ARRAY_SIZE(data->derived_keys)]); out: - kzfree(data); + kfree_sensitive(data); return err; } diff --git a/crypto/ahash.c b/crypto/ahash.c index 68a0f0cb75c4..d9d65d1cc669 100644 --- a/crypto/ahash.c +++ b/crypto/ahash.c @@ -183,7 +183,7 @@ sta...
2004 Jan 01
1
[PATCH] Add winbind-backed NTLMSSP support to Cyrus-SASL
...thentication routines per section 2.10 of - * draft-leach-cifs-v1-spec-02 - */ -static void E(unsigned char *out, unsigned char *K, unsigned Klen, - unsigned char *D, unsigned Dlen) - -{ - unsigned k, d; - des_cblock K64; - des_key_schedule ks; - unsigned char *Dp; -#define KEY_SIZE 7 -#define BLOCK_SIZE 8 - - for (k = 0; k < Klen; k += KEY_SIZE, K += KEY_SIZE) { - /* convert 56-bit key to 64-bit */ - K64[0] = K[0]; - K64[1] = ((K[0] << 7) & 0xFF) | (K[1] >> 1); - K64[2] = ((K[1] << 6) & 0xFF) | (K[2] >> 2); - K64[3] = ((K[2] << 5)...