Nmap Development mailing list archives

Re: [NSE + NSELib] Netbios and SMB [stable!]


From: Sven Klemm <sven () c3d2 de>
Date: Mon, 06 Oct 2008 22:21:39 +0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Ron wrote:
| David Fifield wrote:
|> On Mon, Oct 06, 2008 at 10:33:19AM +0200, Sven Klemm wrote:
|  >
|> What happens if the parity check fails? Some kind of catchable error
|> ("OpenSSL error")?
|>
|> David Fifield
|
| I think it should be an optional error, too, because when I calculate
| the key by hand, I'm not even calculating the parity bits, just making
| room for them.

Parity is apparently not checked by the EVP_Encrypt funtions. I
toggled the parity bits and encryption still worked and produced the
same result. There is a DES set_key function which checks for weak
keys and checks parity but this functionality does not seem to be
available separately. Do you think functions for setting and checking
are required or do you think one of them is sufficient?

Cheers,
Sven


- --
Sven Klemm
http://cthulhu.c3d2.de/~sven/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkjqc1MACgkQevlgTHEIT4bW6wCeNM44orEtMccDc1o1WS/rLn7a
GwkAnAuVO6GEXxff/jLEq70KYbBJ7Uty
=jEGs
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: