Displaying 18 results from an estimated 18 matches for "md5_ctx".
2005 Mar 15
1
SMB signing broken? 3.0.7 -> 3.0.8
Hi all.
I originally suspected this problem was with netbios (which I have
disabled by default) and Jerry has helped me out a bit with but I've
been doing some more digging and I think the problem lies back further
than I expected.
I was trying to upgrade from 3.0.7 to 3.0.11 so I've recompiled all
versions back from 3.0.11 and the problem first occured in 3.0.8. The
issue is with
2020 May 01
4
Request: tools::md5sum should accept connections and finally in-memory objects
...MD5 message digest for LEN bytes beginning at BUFFER. The
result is always in little endian byte order, so that a byte-wise
output yields to the wanted ASCII representation of the message
digest. */
static void *
md5_buffer (const char *buffer, size_t len, void *resblock)
{
struct md5_ctx ctx;
/* Initialize the computation context. */
md5_init_ctx (&ctx);
/* Process whole buffer but last len % 64 bytes. */
md5_process_bytes (buffer, len, &ctx);
/* Put result in desired memory area. */
return md5_finish_ctx (&ctx, resblock);
}
#endif
---
2) How ca...
2004 Jan 07
3
Samba 3.0.2pre1 Available for Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This is a preview release of the Samba 3.0.2 code base and
is provided for testing only. This release is *not* intended
for production servers. However, there have been several bug
fixes since 3.0.1 that we feel are important to make available
to the Samba community for wider testing.
Common bugs fixed in this preview release include:
o
2004 Jan 07
3
Samba 3.0.2pre1 Available for Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This is a preview release of the Samba 3.0.2 code base and
is provided for testing only. This release is *not* intended
for production servers. However, there have been several bug
fixes since 3.0.1 that we feel are important to make available
to the Samba community for wider testing.
Common bugs fixed in this preview release include:
o
2008 Aug 15
2
SSH Command Line Password Support
Hello,
I am interested in an ssh that is not interactive in requesting the password, i.e, whereas I can specify the password in the command line when calling SSH.
I have wondered how such a feature has not been included in such a good client, as it seems there are many (and I have searched for this) people require this capability for their scripts/automation.
I understand the possibility of
2020 May 01
0
Request: tools::md5sum should accept connections and finally in-memory objects
...ning at BUFFER. The
> result is always in little endian byte order, so that a byte-wise
> output yields to the wanted ASCII representation of the message
> digest. */
> static void *
> md5_buffer (const char *buffer, size_t len, void *resblock)
> {
> struct md5_ctx ctx;
>
> /* Initialize the computation context. */
> md5_init_ctx (&ctx);
>
> /* Process whole buffer but last len % 64 bytes. */
> md5_process_bytes (buffer, len, &ctx);
>
> /* Put result in desired memory area. */
> return md5_finis...
2020 May 01
0
Request: tools::md5sum should accept connections and finally in-memory objects
...bytes beginning at BUFFER. The
> result is always in little endian byte order, so that a byte-wise
> output yields to the wanted ASCII representation of the message
> digest. */
> static void *
> md5_buffer (const char *buffer, size_t len, void *resblock)
> {
> struct md5_ctx ctx;
>
> /* Initialize the computation context. */
> md5_init_ctx (&ctx);
>
> /* Process whole buffer but last len % 64 bytes. */
> md5_process_bytes (buffer, len, &ctx);
>
> /* Put result in desired memory area. */
> return md5_finish_ctx (&ctx, r...
2003 Sep 17
1
sftp reget/reput
Hello openssh@
I thought about sftp's reget/reput commands.
Several days ago, Damien Miller write to tech at openbsd.org (it was
reply for my letter):
> Herein lies a problem which is not easy to detect or solve. For
> performance reasons, the sftp client does pipelined reads/writes when
> transferring files. The protocol spec allows for a server to process
> these requests out
2007 Aug 21
1
ssh-agent security
...0 -0500
+++ openssh-4.6p1-agentmod2/ssh-agent.c 2007-08-20 19:56:38.000000000 -0400
@@ -134,6 +134,9 @@
/* Default lifetime (0 == forever) */
static int lifetime = 0;
+static int run_inform = 0;
+char inform_cmd[MAXPATHLEN];
+
static void
close_socket(SocketEntry *e)
{
@@ -247,6 +250,28 @@
MD5_CTX md;
Key *key;
+#if defined(SO_PEERCRED)
+ if (AUTH_CONNECTION == e->type) {
+ struct ucred cred;
+ socklen_t len = sizeof(cred);
+ char inform_cmdline[MAXPATHLEN];
+
+ if (run_inform && getsockopt(e->fd, SOL_SOCKET, SO_PEERCRED, &cred, &len) >= 0) {
+ int ret;
+
+...
2020 May 01
1
Request: tools::md5sum should accept connections and finally in-memory objects
...?The
>> ??result is always in little endian byte order, so that a byte-wise
>> ??output yields to the wanted ASCII representation of the message
>> ??digest. ?*/
>> static void *
>> md5_buffer (const char *buffer, size_t len, void *resblock)
>> {
>> ?struct md5_ctx ctx;
>>
>> ?/* Initialize the computation context. ?*/
>> ?md5_init_ctx (&ctx);
>>
>> ?/* Process whole buffer but last len % 64 bytes. ?*/
>> ?md5_process_bytes (buffer, len, &ctx);
>>
>> ?/* Put result in desired memory area. ?*/
>> ?r...
2001 Jun 06
0
snk authentication
...39;)
+ buf[i] = '3';
+ strcpy(rbuf, buf);
+ return(0);
+}
+
+/* Get the DES key from the specified data. */
+
+int get_snk_pass(char *pass, char *res, int reslen, char *data) {
+ des_cblock kblock;
+ des_key_schedule keysched;
+ char kbuf[16];
+ des_cblock iv;
+ int i, j;
+ char *p;
+ MD5_CTX ctx;
+ unsigned char digest[16];
+
+ if(data[0] ){
+ des_string_to_key(pass, &kblock);
+ des_set_key((des_cblock *)kblock, keysched);
+ p = (char *)&iv;
+ for(i=0; i < 8; i++)*p++ = 130-i;
+
+ des_cbc_encrypt((des_cblock *)data, (des_cblock *)kbuf, 16l,
+ keysched, &i...
2017 Jul 01
0
[PATCH] Add new hash.c32 module
...inux_version();
+ if (sv->filesystem != SYSLINUX_FS_ISOLINUX) {
+ return unrockridge(name);
+ } else {
+ return name;
+ }
+}
+
+static uint8_t *md5_file(const char *filename)
+{
+ int src_fd, count;
+ uint8_t in_buf[4096];
+ static uint8_t hash_value[16*2+1];
+ static unsigned char hash[16];
+ MD5_CTX context;
+
+ src_fd = open(filename, O_RDONLY);
+ if (src_fd < 0) {
+ src_fd = open(unrockridge_iso(filename), O_RDONLY);
+ }
+ if (src_fd < 0) {
+ return NULL;
+ }
+
+ MD5Init(&context);
+ while ((count = read(src_fd, in_buf, 4096)) > 0) {
+ MD5Update(&context, in_buf, count);...
2006 Jun 26
1
[PATCH, RFC 0/13] OTP: add auth_cache_remove()
This patchset add support for One-Time-Password authentication mechanisms,
both S/Key (RFC 1731) and OTP (RFC 2444) are implemented.
Tested with mutt (uses cyrus sasl library for authentication).
Patches were made against CVS HEAD. Please take a look.
Add auth_cache_remove() function which will be used by OTP code to evict
old entries from auth cache.
diff -urdpNX /usr/share/dontdiff -x
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
...(c == NULL || c->number != SSH_CIPHER_SSH2) {
debug("bad cipher %s [%s]", p, names);
xfree(cipher_list);
@@ -291,9 +300,25 @@
cipher_set_key_string(CipherContext *cc, Cipher *cipher,
const char *passphrase, int do_encrypt)
{
+#ifdef OPENSSL_FIPS
+ SHA_CTX sha;
+#endif
MD5_CTX md;
- u_char digest[16];
+ u_char digest[20];
+#ifdef OPENSSL_FIPS
+ if (fips_mode) {
+ SHA1_Init(&sha);
+ SHA1_Update(&sha, (const u_char *)passphrase, strlen(passphrase));
+ SHA1_Final(digest, &sha);
+
+ cipher_init(cc, cipher, digest, 20, NULL, 0, do_encrypt);
+
+ memset(dige...
2020 May 22
2
[PATCH] Optimized assembler version of md5_process() for x86-64
...ion
+ *
+ * Author: Marc Bevand, 2004
+ *
+ * This code was placed in the public domain by the author. The original
+ * publication can be found at:
+ *
+ * https://www.zorinaq.com/papers/md5-amd64.html
+ */
+/*
+ * No modifications were made aside from changing the function and file names.
+ * The MD5_CTX structure as expected here (from OpenSSL) is binary compatible
+ * with the md_context used by rsync, for the fields accessed.
+ *
+ * Benchmarks (in MB/s) C ASM
+ * - Intel Atom D2700 302 334
+ * - Intel i7-7700hq 351 376
+ * - AMD ThreadRipper 2950x...
2011 Apr 16
20
[PATCH 00/20] Switch to ELF modules
From: Matt Fleming <matt.fleming at linux.intel.com>
This series fixes some bugs and switches the elflink branch to be
entirely ELF modules. It applies on top of,
http://syslinux.zytor.com/archives/2011-April/016369.html
The deletions in the diff stat below are mainly from deleting
com32/elflink/modules (finally!). Now there should be no duplicate
code because we don't need COM32 and
2006 Nov 17
1
gjournal on 6.x wont build
Hi all,
I was intending on trying out gjournal on a new disk i've added in my
desktop. I had a look to see what the most recent patch provided by
Pawel and found
http://people.freebsd.org/~pjd/patches/gjournal6_20061024.patch
I created the directories as per Pawel's original post
(http://lists.freebsd.org/pipermail/freebsd-fs/2006-June/001962.html)
and the patch succeeded with no failed
2020 Feb 09
2
[RFC PATCH] Add SHA1 support
...l (data) byte order, implemented externally.
+ * HASH_MAKE_STRING
+ * macro converting context variables to an ASCII hash string.
+ *
+ * MD5 example:
+ *
+ * #define DATA_ORDER_IS_LITTLE_ENDIAN
+ *
+ * #define HASH_LONG MD5_LONG
+ * #define HASH_CTX MD5_CTX
+ * #define HASH_CBLOCK MD5_CBLOCK
+ * #define HASH_UPDATE MD5_Update
+ * #define HASH_TRANSFORM MD5_Transform
+ * #define HASH_FINAL MD5_Final
+ * #define HASH_BLOCK_DATA_ORDER md5_block_data_order
+ */
+
+#include <openss...