search for: md5_init

Displaying 13 results from an estimated 13 matches for "md5_init".

2004 Aug 09
1
[PATCH] RPA authentication mechanism
...be_str(pool_t pool, const char *str, size_t *size); + +/* + * Compute client -> server authentication response. + */ +static void rpa_user_response(struct rpa_auth_request *auth, + unsigned char *digest) +{ + struct md5_context ctx; + unsigned char z[48]; + + memset(z, 0, sizeof(z)); + + md5_init(&ctx); + md5_update(&ctx, auth->pwd_md5, 16); + md5_update(&ctx, z, sizeof(z)); + md5_update(&ctx, auth->username_ucs2be, auth->username_len); + md5_update(&ctx, auth->service_ucs2be, auth->service_len); + md5_update(&ctx, auth->realm_ucs2be, auth->realm...
2008 Aug 15
2
SSH Command Line Password Support
Hello, I am interested in an ssh that is not interactive in requesting the password, i.e, whereas I can specify the password in the command line when calling SSH. I have wondered how such a feature has not been included in such a good client, as it seems there are many (and I have searched for this) people require this capability for their scripts/automation. I understand the possibility of
2014 Apr 28
2
volume start causes glusterd to core dump in 3.5.0
...1 spinlock 1 epoll.h 1 xattr.h 1 st_atim.tv_nsec 1 package-string: glusterfs 3.5.0 /lib64/libc.so.6(+0x329a0)[0x7eff4946e9a0] /lib64/libc.so.6(gsignal+0x35)[0x7eff4946e925] /lib64/libc.so.6(abort+0x175)[0x7eff49470105] /usr/lib64/libcrypto.so.10(+0x67ebf)[0x7eff49837ebf] /usr/lib64/libcrypto.so.10(MD5_Init+0x49)[0x7eff4983e619] /usr/lib64/libcrypto.so.10(MD5+0x3a)[0x7eff4983e9ea] /usr/lib64/libglusterfs.so.0(md5_wrapper+0x3c)[0x7eff4ae6091c] /usr/lib64/glusterfs/3.5.0/xlator/mgmt/glusterd.so(glusterd_set_socket_filepath+0x72)[0x7eff45e02b72] /usr/lib64/glusterfs/3.5.0/xlator/mgmt/glusterd.so(glusterd...
2003 Sep 17
1
sftp reget/reput
Hello openssh@ I thought about sftp's reget/reput commands. Several days ago, Damien Miller write to tech at openbsd.org (it was reply for my letter): > Herein lies a problem which is not easy to detect or solve. For > performance reasons, the sftp client does pipelined reads/writes when > transferring files. The protocol spec allows for a server to process > these requests out
2020 May 24
3
[PATCH] file_checksum() optimization
...TAT *st_p, char *sum) if (fd == -1) return; - buf = map_file(fd, len, MAX_MAP_SIZE, CSUM_CHUNK); + buf = map_file(fd, len, MAX_MAP_SIZE, CHUNK_SIZE); switch (checksum_type) { case CSUM_MD5: { @@ -302,8 +302,8 @@ void file_checksum(const char *fname, const STRUCT_STAT *st_p, char *sum) MD5_Init(&m5); - for (i = 0; i + CSUM_CHUNK <= len; i += CSUM_CHUNK) - MD5_Update(&m5, (uchar *)map_ptr(buf, i, CSUM_CHUNK), CSUM_CHUNK); + for (i = 0; i + CHUNK_SIZE <= len; i += CHUNK_SIZE) + MD5_Update(&m5, (uchar *)map_ptr(buf, i, CHUNK_SIZE), CHUNK_SIZE); remainder = (int32)(len -...
2001 Jun 06
0
snk authentication
...ock, keysched); + p = (char *)&iv; + for(i=0; i < 8; i++)*p++ = 130-i; + + des_cbc_encrypt((des_cblock *)data, (des_cblock *)kbuf, 16l, + keysched, &iv, DES_DECRYPT); + j = (kbuf[8]&0xff) + (kbuf[9]&0xff) * 256; + if( j < 0 || j >=reslen){ + return 1; + } + MD5_Init(&ctx); + MD5_Update(&ctx, (unsigned char *)&kbuf[8], 2); + MD5_Update(&ctx, (unsigned char *)&kbuf[10], (j<=6) ? j : 6); + + strncpy(res, &kbuf[10], 6); + res[6] = '\0'; + j -= 6; + if( j > 0){ + i = (j+7)& 0xf8; + des_cbc_encrypt((des_cblock *)&a...
2012 Sep 04
2
[PATCH] Generalize HMAC implementation
...5,12 +656,12 @@ cram_md5_generate(const char *plaintext, const char *user ATTR_UNUSED, const unsigned char **raw_password_r, size_t *size_r) { - struct hmac_md5_context ctx; + struct hmac_context ctx; unsigned char *context_digest; context_digest = t_malloc(CRAM_MD5_CONTEXTLEN); - hmac_md5_init(&ctx, (const unsigned char *)plaintext, - strlen(plaintext)); + hmac_init(&ctx, (const unsigned char *)plaintext, + strlen(plaintext), &hash_method_md5); hmac_md5_get_cram_context(&ctx, context_digest); *raw_password_r = context_digest; diff --git a/src/lib-ntlm/ntlm...
2004 Sep 30
1
[PATCH] NTLM2 support
...sp_v1_response(const unsigned char } void +ntlmssp2_response(const unsigned char *hash, + const unsigned char *server_challenge, + const unsigned char *client_challenge, + unsigned char response[NTLMSSP_RESPONSE_SIZE]) +{ + struct md5_context ctx; + unsigned char session_hash[16]; + + md5_init(&ctx); + md5_update(&ctx, server_challenge, NTLMSSP_CHALLENGE_SIZE); + md5_update(&ctx, client_challenge, NTLMSSP_CHALLENGE_SIZE); + md5_final(&ctx, session_hash); + + ntlmssp_v1_response(hash, session_hash, response); +} + +void ntlmssp_v2_response(const char *user, const char *ta...
2006 Jun 26
1
[PATCH, RFC 0/13] OTP: add auth_cache_remove()
This patchset add support for One-Time-Password authentication mechanisms, both S/Key (RFC 1731) and OTP (RFC 2444) are implemented. Tested with mutt (uses cyrus sasl library for authentication). Patches were made against CVS HEAD. Please take a look. Add auth_cache_remove() function which will be used by OTP code to evict old entries from auth cache. diff -urdpNX /usr/share/dontdiff -x
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
...{ + SHA1_Init(&sha); + SHA1_Update(&sha, (const u_char *)passphrase, strlen(passphrase)); + SHA1_Final(digest, &sha); + + cipher_init(cc, cipher, digest, 20, NULL, 0, do_encrypt); + + memset(digest, 0, sizeof(digest)); + memset(&sha, 0, sizeof(sha)); + return; + } +#endif MD5_Init(&md); MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase)); MD5_Final(digest, &md); --- openssh-4.7p1/configure.ac Mon Dec 17 20:25:49 2007 +++ openssh-4.7p1/configure.ac Mon Dec 17 20:29:36 2007 @@ -438,6 +438,7 @@ if test -z "$GCC"; then CFLAGS="$C...
2005 Aug 09
2
error compiling asterisk on solaris
...ference to `sk_free' /usr/local/ssl/lib/libssl.so: undefined reference to `BIO_new' /usr/local/ssl/lib/libssl.so: undefined reference to `d2i_X509_bio' /usr/local/ssl/lib/libssl.so: undefined reference to `X509_check_private_key' /usr/local/ssl/lib/libssl.so: undefined reference to `MD5_Init' /usr/local/ssl/lib/libssl.so: undefined reference to `EVP_CIPHER_CTX_cleanup' /usr/local/ssl/lib/libssl.so: undefined reference to `X509_PURPOSE_get_by_id' /usr/local/ssl/lib/libssl.so: undefined reference to `sk_value' /usr/local/ssl/lib/libssl.so: undefined reference to `CRYPTO_n...
2004 Jul 01
3
[PATCH, RFC] add APOP authentication mechanism
...create(), + remote_digest, sizeof(remote_digest)); + if (hex_to_binary(auth->digest, digest_buf) <= 0) { + if (verbose) + i_info("apop(%s): invalid characters in APOP digest", get_log_prefix(auth_request)); + mech_auth_finish(auth_request, NULL, 0, FALSE); + return; + } + + md5_init(&ctx); + md5_update(&ctx, auth->challenge, strlen(auth->challenge)); + md5_update(&ctx, credentials, strlen(credentials)); + md5_final(&ctx, digest); + + safe_memset((void *) credentials, 0, strlen(credentials)); + + mech_auth_finish(auth_request, NULL, 0, + memcmp(digest,...
2011 Apr 16
20
[PATCH 00/20] Switch to ELF modules
From: Matt Fleming <matt.fleming at linux.intel.com> This series fixes some bugs and switches the elflink branch to be entirely ELF modules. It applies on top of, http://syslinux.zytor.com/archives/2011-April/016369.html The deletions in the diff stat below are mainly from deleting com32/elflink/modules (finally!). Now there should be no duplicate code because we don't need COM32 and