search for: random_fil

Displaying 7 results from an estimated 7 matches for "random_fil".

Did you mean: random_fill
2008 Jun 13
7
Rubyscript2exe undefined ''run'' method
...de Wx require ''random_frame.rb'' RUBYSCRIPT2EXE.bin = ["random.xrc"] RUBYSCRIPT2EXE.bin = ["random_frame.rb"] def random_process file = @file_path.split("\\") @file_path = file.join("\\\\") @file_path << "\\Random.txt" random_file = File.new(@file_path , "w") i = 0 max = @max_number.to_i b = 10 ** (@number_of_digits.to_i - 1) random_seed = 10 ** (@number_of_digits.to_i) g = 0 g_max =100 @progress_guage.set_value(0) while i < max a = rand(random_seed) if (a > b) then random_file.puts a i = i + 1...
2006 Mar 17
1
[PATCH] OpenSSL RNG initialization
...ifdef HAVE_GETRUSAGE + if (getrusage(RUSAGE_SELF, &ru) < 0) + i_fatal("getrusage() failed: %m"); + RAND_add((const void *)&ru, sizeof(ru), + (double)sizeof(ru) / 2); +#endif + + if (counter++ > 100) + i_fatal("could not get enough entropy"); + } +} + void random_fill(void *buf, size_t size) { if (RAND_bytes(buf, size) != 1) @@ -91,6 +127,8 @@ { unsigned int seed; + random_init_rng(); + random_fill(&seed, sizeof(seed)); srand(seed); }
2016 Dec 04
2
v2.2.27 released --- libressl
...L\s*)$/$1 && !defined (LIBRESSL_VERSION_NUMBER)/' ./src/lib-ssl-iostream/dovecot-openssl-common.c; Both configuration and compilation are OK. The test fails as follows: [...] test_load_v1_public_key .............................................. : ok Panic: file randgen.c: line 21 (random_fill): assertion failed: (init_refcount > 0) Error: Raw backtrace: 2 libdcrypt_openssl.so 0x0000000103413d24 default_fatal_finish + 36 -> 3 libdcrypt_openssl.so 0x0000000103413afd default_fatal_handler + 61 -> 4 libdcrypt_openssl.so 0x0000000103414069 i_panic + 169 -> 5 libdcrypt_openssl....
2004 Aug 09
1
[PATCH] RPA authentication mechanism
...uf, ASN1_APPLICATION); + buffer_append_asn1_length(buf, length); + buffer_append(buf, rpa_oid, sizeof(rpa_oid)); + + /* Protocol version */ + buffer_append_c(buf, 3); + buffer_append_c(buf, 0); + + /* Service challenge */ + auth->service_challenge = p_malloc(auth->pool, RPA_SCHALLENGE_LEN); + random_fill(auth->service_challenge, RPA_SCHALLENGE_LEN); + buffer_append_c(buf, RPA_SCHALLENGE_LEN); + buffer_append(buf, auth->service_challenge, RPA_SCHALLENGE_LEN); + + /* Timestamp, looks like clients accept anything we send */ + random_fill(timestamp, sizeof(timestamp)); + auth->service_timesta...
2012 Oct 02
2
[PATCH] Add SCRAM-SHA-1 password scheme
...am_server_first(struct scram_auth_request *request, + int iter, const char *salt) { unsigned char snonce[SCRAM_SERVER_NONCE_LEN+1]; string_t *str; @@ -84,12 +63,9 @@ snonce[sizeof(snonce)-1] = '\0'; request->snonce = p_strndup(request->pool, snonce, sizeof(snonce)); - random_fill(request->salt, sizeof(request->salt)); - - str = t_str_new(MAX_BASE64_ENCODED_SIZE(sizeof(request->salt))); - str_printfa(str, "r=%s%s,s=", request->cnonce, request->snonce); - base64_encode(request->salt, sizeof(request->salt), str); - str_printfa(str, ",i=%d&q...
2005 Feb 05
1
New user Q: dovecot-0.99-13 / UnixWare 7.1.0
Trying to get dovecot up and running. I managed to get everything compiled and linked correctly, but there seems to be some problem with either the auth process or communication between the main process and the auth process. When I try to login, I get: * OK dovecot ready. 1 login n9yty testing * OK Waiting for authentication process to respond.. And I keep getting the same message over and
2010 Apr 09
4
Patch: support URLAUTH, BURL, CATENATE
...mailbox); + + /* if hex key is bogus, set a new one */ + if (hex) { + const char *cp; + for (cp = hex; *cp; cp++) + if (!i_isxdigit(*cp)) + break; + if (*cp == '\0') + break; /* good hex */ + } + + /* if not present, set one -- fall through */ + case URLAUTH_KEYS_SET: + random_fill(new_key, sizeof new_key); + hex = binary_to_hex(new_key, sizeof new_key); + if (*mailbox) { + hash_table_insert(keys, (void *) mailbox, + (void *) hex); + modified = TRUE; + } /* else mailbox="" for foiling timing attacks */ + break; + case URLAUTH_KEYS_DELETE: + hex = has...