IF YOU WOULD LIKE TO GET AN ACCOUNT, please write an
email to Administrator. User accounts are meant only to access repo
and report issues and/or generate pull requests.
This is a purpose-specific Git hosting for
BaseALT
projects. Thank you for your understanding!
Только зарегистрированные пользователи имеют доступ к сервису!
Для получения аккаунта, обратитесь к администратору.
require top-quality entropy. We don't want to waste system enropy
generating challenges (which simply need to be unpredictable, not
secret) or when generating UUIDs.
Rework generate_random_buffer() to use /dev/urandom less often, only
to seed the existing RC4 based PRNG. (With an exception to ensure we
don't waste this setup cost for very small entropy requests).
Perhaps we should be using heimdal's code for this instead?
This should drasticly reduce our entropy use, particularly in the
build farm (automated Samba build on hosts without much other source
of entropy).
Andrew Bartlett
been working on for at least half a year now. Contains the following
improvements:
* proper layering (finally!) for the registry library. Distinction is
now made between 'real' backends (local, remote, wine, etc) and
the low-level hive backends (regf, creg, ldb, ...) that are only used
by the local registry backend
* tests for all important hive and registry operations
* re-enable RPC-WINREG tests (still needs more work though, as
some return values aren't checked yet)
* write support for REGF files
* dir backend now supports setting/reading values, creating keys
* support for storing security descriptors
* remove CREG backend as it was incomplete, didn't match the data model
and wasn't used at all anyway
* support for parsing ADM files as used by the policy editor (see lib/policy)
* support for parsing PREG files (format used by .POL files)
* new streaming interface for registry diffs (improves speed and memory usage
for regdiff/regpatch significantly)
... and fixes a large number of bugs in the registry code
from MMC Active Directory Users and Computers).
Windows sets a 14 UCS2 char buffer as the password in this case.
We need to allow random buffers to be accepted as complex passwords,
even if they don't have ASCII upper or lower case characters. (If
half the bytes are > 127, then it's likely a random buffer).
Also make the test match the documented windows behaviour of '3 of the
4 classes: upper, lower, digit, special'.
Andrew Bartlett