[11417] in Kerberos-V5-bugs
[krbdev.mit.edu #6665] SVN Commit
daemon@ATHENA.MIT.EDU (Tom Yu via RT)
Mon Feb 22 19:25:54 2010
Mail-followup-to: rt@krbdev.mit.edu
mail-copies-to: never
From: "Tom Yu via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-6665@krbdev.mit.edu>
Message-ID: <rt-6665-32514.8.80881432054842@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #6665'":;"'AdminCc of krbdev.mit.edu Ticket #6665'":;@MIT.EDU
Date: Mon, 22 Feb 2010 19:25:52 -0500 (EST)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
pull up r23734 from trunk
------------------------------------------------------------------------
r23734 | ghudson | 2010-02-18 13:04:47 -0500 (Thu, 18 Feb 2010) | 17 lines
ticket: 6665
subject: Fix cipher state chaining in OpenSSL back end
target_version: 1.8
tags: pullup
Make cipher state chaining work in the OpenSSL back end for des, des3,
and arcfour enc providers. Subtleties:
* DES and DES3 have checks to avoid clobbering ivec with uninitialized
data if there is no data to encrypt.
* Arcfour saves the OpenSSL cipher context across calls. To protect
against a caller improperly copying the state (which happens to work
with other enc providers), a loopback pointer is used, as in GSSAPI.
* EVP_EncryptFinal_ex is unnecessary with stream ciphers and would
interfere with cipher state chaining if it did anything, so just
remove it.
http://src.mit.edu/fisheye/changelog/krb5/?cs=23746
Commit By: tlyu
Revision: 23746
Changed Files:
U branches/krb5-1-8/src/lib/crypto/openssl/enc_provider/des.c
U branches/krb5-1-8/src/lib/crypto/openssl/enc_provider/des3.c
U branches/krb5-1-8/src/lib/crypto/openssl/enc_provider/rc4.c
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs