Hi
as openssl removed support of md2, nmap-5.21 (latest stable) needs to be
patched.
hth André
PS: If its discourage sending patches like this to the list, please let
me know. I thought that they might help some folks. I don't expect them
to be included in the book.
--- nmap-5.21/nse_openssl.cc 2010-03-28 17:18:02 -0400
+++ nmap-5.21/nse_openssl.cc.new 2010-10-29 11:34:08 -0400
@@ -8,7 +8,6 @@
#include <openssl/crypto.h>
#include <openssl/bn.h>
#include <openssl/rand.h>
-#include <openssl/md2.h>
#include <openssl/md4.h>
#include <openssl/md5.h>
#include <openssl/sha.h>
@@ -219,16 +218,6 @@
return 1;
}
-static int l_md2(lua_State *L) /** md2(string s) */
-{
- size_t len;
- const unsigned char *s = (unsigned char *) luaL_checklstring( L, 1, &len );
- unsigned char digest[16];
-
- lua_pushlstring( L, (char *) MD2( s, len, digest ), 16 );
- return 1;
-}
-
static int l_md4(lua_State *L) /** md4(string s) */
{
size_t len;
@@ -515,7 +504,6 @@
{ "bignum_mod_exp", l_bignum_mod_exp },
{ "rand_bytes", l_rand_bytes },
{ "rand_pseudo_bytes", l_rand_pseudo_bytes },
- { "md2", l_md2 },
{ "md4", l_md4 },
{ "md5", l_md5 },
{ "sha1", l_sha1 },
--
http://linuxfromscratch.org/mailman/listinfo/blfs-support
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page