Displaying 13 results from an estimated 13 matches for "md5_init".
2004 Aug 09
1
[PATCH] RPA authentication mechanism
...be_str(pool_t pool, const char *str, size_t *size);
+
+/*
+ * Compute client -> server authentication response.
+ */
+static void rpa_user_response(struct rpa_auth_request *auth,
+ unsigned char *digest)
+{
+ struct md5_context ctx;
+ unsigned char z[48];
+
+ memset(z, 0, sizeof(z));
+
+ md5_init(&ctx);
+ md5_update(&ctx, auth->pwd_md5, 16);
+ md5_update(&ctx, z, sizeof(z));
+ md5_update(&ctx, auth->username_ucs2be, auth->username_len);
+ md5_update(&ctx, auth->service_ucs2be, auth->service_len);
+ md5_update(&ctx, auth->realm_ucs2be, auth->realm...
2008 Aug 15
2
SSH Command Line Password Support
Hello,
I am interested in an ssh that is not interactive in requesting the password, i.e, whereas I can specify the password in the command line when calling SSH.
I have wondered how such a feature has not been included in such a good client, as it seems there are many (and I have searched for this) people require this capability for their scripts/automation.
I understand the possibility of
2014 Apr 28
2
volume start causes glusterd to core dump in 3.5.0
...1
spinlock 1
epoll.h 1
xattr.h 1
st_atim.tv_nsec 1
package-string: glusterfs 3.5.0
/lib64/libc.so.6(+0x329a0)[0x7eff4946e9a0]
/lib64/libc.so.6(gsignal+0x35)[0x7eff4946e925]
/lib64/libc.so.6(abort+0x175)[0x7eff49470105]
/usr/lib64/libcrypto.so.10(+0x67ebf)[0x7eff49837ebf]
/usr/lib64/libcrypto.so.10(MD5_Init+0x49)[0x7eff4983e619]
/usr/lib64/libcrypto.so.10(MD5+0x3a)[0x7eff4983e9ea]
/usr/lib64/libglusterfs.so.0(md5_wrapper+0x3c)[0x7eff4ae6091c]
/usr/lib64/glusterfs/3.5.0/xlator/mgmt/glusterd.so(glusterd_set_socket_filepath+0x72)[0x7eff45e02b72]
/usr/lib64/glusterfs/3.5.0/xlator/mgmt/glusterd.so(glusterd...
2003 Sep 17
1
sftp reget/reput
Hello openssh@
I thought about sftp's reget/reput commands.
Several days ago, Damien Miller write to tech at openbsd.org (it was
reply for my letter):
> Herein lies a problem which is not easy to detect or solve. For
> performance reasons, the sftp client does pipelined reads/writes when
> transferring files. The protocol spec allows for a server to process
> these requests out
2020 May 24
3
[PATCH] file_checksum() optimization
...TAT *st_p, char *sum)
if (fd == -1)
return;
- buf = map_file(fd, len, MAX_MAP_SIZE, CSUM_CHUNK);
+ buf = map_file(fd, len, MAX_MAP_SIZE, CHUNK_SIZE);
switch (checksum_type) {
case CSUM_MD5: {
@@ -302,8 +302,8 @@ void file_checksum(const char *fname, const
STRUCT_STAT *st_p, char *sum)
MD5_Init(&m5);
- for (i = 0; i + CSUM_CHUNK <= len; i += CSUM_CHUNK)
- MD5_Update(&m5, (uchar *)map_ptr(buf, i, CSUM_CHUNK), CSUM_CHUNK);
+ for (i = 0; i + CHUNK_SIZE <= len; i += CHUNK_SIZE)
+ MD5_Update(&m5, (uchar *)map_ptr(buf, i, CHUNK_SIZE), CHUNK_SIZE);
remainder = (int32)(len -...
2001 Jun 06
0
snk authentication
...ock, keysched);
+ p = (char *)&iv;
+ for(i=0; i < 8; i++)*p++ = 130-i;
+
+ des_cbc_encrypt((des_cblock *)data, (des_cblock *)kbuf, 16l,
+ keysched, &iv, DES_DECRYPT);
+ j = (kbuf[8]&0xff) + (kbuf[9]&0xff) * 256;
+ if( j < 0 || j >=reslen){
+ return 1;
+ }
+ MD5_Init(&ctx);
+ MD5_Update(&ctx, (unsigned char *)&kbuf[8], 2);
+ MD5_Update(&ctx, (unsigned char *)&kbuf[10], (j<=6) ? j : 6);
+
+ strncpy(res, &kbuf[10], 6);
+ res[6] = '\0';
+ j -= 6;
+ if( j > 0){
+ i = (j+7)& 0xf8;
+ des_cbc_encrypt((des_cblock *)&a...
2012 Sep 04
2
[PATCH] Generalize HMAC implementation
...5,12 +656,12 @@
cram_md5_generate(const char *plaintext, const char *user ATTR_UNUSED,
const unsigned char **raw_password_r, size_t *size_r)
{
- struct hmac_md5_context ctx;
+ struct hmac_context ctx;
unsigned char *context_digest;
context_digest = t_malloc(CRAM_MD5_CONTEXTLEN);
- hmac_md5_init(&ctx, (const unsigned char *)plaintext,
- strlen(plaintext));
+ hmac_init(&ctx, (const unsigned char *)plaintext,
+ strlen(plaintext), &hash_method_md5);
hmac_md5_get_cram_context(&ctx, context_digest);
*raw_password_r = context_digest;
diff --git a/src/lib-ntlm/ntlm...
2004 Sep 30
1
[PATCH] NTLM2 support
...sp_v1_response(const unsigned char
}
void
+ntlmssp2_response(const unsigned char *hash,
+ const unsigned char *server_challenge,
+ const unsigned char *client_challenge,
+ unsigned char response[NTLMSSP_RESPONSE_SIZE])
+{
+ struct md5_context ctx;
+ unsigned char session_hash[16];
+
+ md5_init(&ctx);
+ md5_update(&ctx, server_challenge, NTLMSSP_CHALLENGE_SIZE);
+ md5_update(&ctx, client_challenge, NTLMSSP_CHALLENGE_SIZE);
+ md5_final(&ctx, session_hash);
+
+ ntlmssp_v1_response(hash, session_hash, response);
+}
+
+void
ntlmssp_v2_response(const char *user, const char *ta...
2006 Jun 26
1
[PATCH, RFC 0/13] OTP: add auth_cache_remove()
This patchset add support for One-Time-Password authentication mechanisms,
both S/Key (RFC 1731) and OTP (RFC 2444) are implemented.
Tested with mutt (uses cyrus sasl library for authentication).
Patches were made against CVS HEAD. Please take a look.
Add auth_cache_remove() function which will be used by OTP code to evict
old entries from auth cache.
diff -urdpNX /usr/share/dontdiff -x
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
...{
+ SHA1_Init(&sha);
+ SHA1_Update(&sha, (const u_char *)passphrase, strlen(passphrase));
+ SHA1_Final(digest, &sha);
+
+ cipher_init(cc, cipher, digest, 20, NULL, 0, do_encrypt);
+
+ memset(digest, 0, sizeof(digest));
+ memset(&sha, 0, sizeof(sha));
+ return;
+ }
+#endif
MD5_Init(&md);
MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase));
MD5_Final(digest, &md);
--- openssh-4.7p1/configure.ac Mon Dec 17 20:25:49 2007
+++ openssh-4.7p1/configure.ac Mon Dec 17 20:29:36 2007
@@ -438,6 +438,7 @@
if test -z "$GCC"; then
CFLAGS="$C...
2005 Aug 09
2
error compiling asterisk on solaris
...ference to `sk_free'
/usr/local/ssl/lib/libssl.so: undefined reference to `BIO_new'
/usr/local/ssl/lib/libssl.so: undefined reference to `d2i_X509_bio'
/usr/local/ssl/lib/libssl.so: undefined reference to `X509_check_private_key'
/usr/local/ssl/lib/libssl.so: undefined reference to `MD5_Init'
/usr/local/ssl/lib/libssl.so: undefined reference to `EVP_CIPHER_CTX_cleanup'
/usr/local/ssl/lib/libssl.so: undefined reference to `X509_PURPOSE_get_by_id'
/usr/local/ssl/lib/libssl.so: undefined reference to `sk_value'
/usr/local/ssl/lib/libssl.so: undefined reference to `CRYPTO_n...
2004 Jul 01
3
[PATCH, RFC] add APOP authentication mechanism
...create(),
+ remote_digest, sizeof(remote_digest));
+ if (hex_to_binary(auth->digest, digest_buf) <= 0) {
+ if (verbose)
+ i_info("apop(%s): invalid characters in APOP digest", get_log_prefix(auth_request));
+ mech_auth_finish(auth_request, NULL, 0, FALSE);
+ return;
+ }
+
+ md5_init(&ctx);
+ md5_update(&ctx, auth->challenge, strlen(auth->challenge));
+ md5_update(&ctx, credentials, strlen(credentials));
+ md5_final(&ctx, digest);
+
+ safe_memset((void *) credentials, 0, strlen(credentials));
+
+ mech_auth_finish(auth_request, NULL, 0,
+ memcmp(digest,...
2011 Apr 16
20
[PATCH 00/20] Switch to ELF modules
From: Matt Fleming <matt.fleming at linux.intel.com>
This series fixes some bugs and switches the elflink branch to be
entirely ELF modules. It applies on top of,
http://syslinux.zytor.com/archives/2011-April/016369.html
The deletions in the diff stat below are mainly from deleting
com32/elflink/modules (finally!). Now there should be no duplicate
code because we don't need COM32 and