Displaying 6 results from an estimated 6 matches for "sha1_fin".
Did you mean:
sha1_final
2000 Jul 02
2
``portability'' patch for OpenSSH S/Key support
More specifically, the hashing functions in most operating systems will
be provided by OpenSSL, rather than libc. OpenSSL does not have SHA1_End
but since it is used only for generating fake challenges, the impact of
changing it to SHA1_Final should be small.
A more general solution would be to have configure.in test for sha1.h,
openssl/sha.h, and SHA1_End. configure.in should also add auth-skey.o to
SSHDOBJS in Makefile if S/Key is enabled; my patch below does not cover
those issues. Perhaps another time.
If any GNU/Linux admins wa...
2012 Sep 17
9
[PATCH] Upgrade vtpmd to berlios version 0.7.4
...ed
-@@ -381,7 +382,7 @@ static int encode_message(int type, uint
- msg[0] = 0x00;
- get_random_bytes(&msg[1], SHA1_DIGEST_LENGTH);
- sha1_init(&ctx);
-- sha1_update(&ctx, "TCPA", 4);
-+ sha1_update(&ctx, (uint8_t *) "TCPA", 4);
- sha1_final(&ctx, &msg[1 + SHA1_DIGEST_LENGTH]);
- memset(&msg[1 + 2 * SHA1_DIGEST_LENGTH], 0x00,
- msg_len - data_len - 2 * SHA1_DIGEST_LENGTH - 2);
-@@ -429,7 +430,7 @@ static int decode_message(int type, uint
- mask_generation(&msg[1], SHA1_DIGEST_LENGTH,
- &...
2012 Nov 10
4
imap-login hanging when firewall blocks ssl handshaking
...ins = " zlib imap_zlib"
}
-----------------------------------
gdb's "bt full" gives various results depending on where in the loop, but they are they same from ssl23_accept on down.
(gdb) bt full
#0 0x00007fff92d19f63 in sha1_block_data_order ()
#1 0x00007fff92d1a4ae in SHA1_Final ()
#2 0x00007fff92d45430 in EVP_DigestFinal_ex ()
#3 0x00007fff92d17d7a in ssleay_rand_add ()
#4 0x00007fff974529be in ssl23_accept ()
#5 0x000000010cac0729 in ssl_handshake [inlined] () at /private/tmp/johnsone/dovecot-2.1.10/src/login-common/ssl-proxy-openssl.c:465
ret = -949939536
#6 0x0...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
...*cipher,
const char *passphrase, int do_encrypt)
{
+#ifdef OPENSSL_FIPS
+ SHA_CTX sha;
+#endif
MD5_CTX md;
- u_char digest[16];
+ u_char digest[20];
+#ifdef OPENSSL_FIPS
+ if (fips_mode) {
+ SHA1_Init(&sha);
+ SHA1_Update(&sha, (const u_char *)passphrase, strlen(passphrase));
+ SHA1_Final(digest, &sha);
+
+ cipher_init(cc, cipher, digest, 20, NULL, 0, do_encrypt);
+
+ memset(digest, 0, sizeof(digest));
+ memset(&sha, 0, sizeof(sha));
+ return;
+ }
+#endif
MD5_Init(&md);
MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase));
MD5_Final(digest, &a...
2005 Aug 09
2
error compiling asterisk on solaris
...ed reference to `SHA1_Update'
/usr/local/ssl/lib/libssl.so: undefined reference to `CRYPTO_lock'
/usr/local/ssl/lib/libssl.so: undefined reference to `DSA_verify'
/usr/local/ssl/lib/libssl.so: undefined reference to `sk_pop_free'
/usr/local/ssl/lib/libssl.so: undefined reference to `SHA1_Final'
/usr/local/ssl/lib/libssl.so: undefined reference to `BIO_puts'
/usr/local/ssl/lib/libssl.so: undefined reference to `X509_verify_cert_error_str ing'
/usr/local/ssl/lib/libssl.so: undefined reference to `BN_num_bits'
/usr/local/ssl/lib/...
2020 Feb 09
2
[RFC PATCH] Add SHA1 support
...l2c(ll,(s)); \
+ ll=(c)->h3; (void)HOST_l2c(ll,(s)); \
+ ll=(c)->h4; (void)HOST_l2c(ll,(s)); \
+ } while (0)
+
+#define HASH_UPDATE SHA1_Update
+#define HASH_TRANSFORM SHA1_Transform
+#define HASH_FINAL SHA1_Final
+#define HASH_INIT SHA1_Init
+#define HASH_BLOCK_DATA_ORDER sha1_block_data_order
+#define Xupdate(a,ix,ia,ib,ic,id) ( (a)=(ia^ib^ic^id), \
+ ix=(a)=ROTATE((a),1) \
+ )
+
+sta...