[Bug 1291] aes256-ctr, aes192-ctr,	arcfour256 broken with OpenSSL 0.9.8e
    bugzilla-daemon at mindrot.org 
    bugzilla-daemon at mindrot.org
       
    Mon Mar  5 09:32:03 EST 2007
    
    
  
http://bugzilla.mindrot.org/show_bug.cgi?id=1291
------- Comment #8 from djm at mindrot.org  2007-03-05 09:31 -------
(From update of attachment 1246)
>Index: openbsd-compat/openssl-compat.h
>===================================================================
>RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/openbsd-compat/openssl-compat.h,v
>retrieving revision 1.6
>diff -u -p -r1.6 openssl-compat.h
>--- openbsd-compat/openssl-compat.h	22 Feb 2006 11:24:47 -0000	1.6
>+++ openbsd-compat/openssl-compat.h	4 Mar 2007 03:31:09 -0000
>@@ -46,6 +46,11 @@ extern const EVP_CIPHER *evp_acss(void);
> # endif
> #endif
> 
>+/* OpenSSL 0.9.8e returns cipher key len not context key len */
>+#if (OPENSSL_VERSION_NUMBER == 0x0090805fL)
>+# define EVP_CIPHER_CTX_key_length(c) ((c)->key_len)
>+#endif
Two question:
1. should there be a #undef here?
2. Have OpenSSL acknowledged that this is a bug? If not, perhaps this
needs to run of a configure test?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
    
    
More information about the openssh-bugs
mailing list