[Bug 2913] Reading PEM keys might fail if they decrypt to garbage with zero-length passprahse with new OpenSSL 1.1.0i
    bugzilla-daemon at bugzilla.mindrot.org 
    bugzilla-daemon at bugzilla.mindrot.org
       
    Wed Oct  3 21:09:36 AEST 2018
    
    
  
https://bugzilla.mindrot.org/show_bug.cgi?id=2913
Jakub Jelen <jjelen at redhat.com> changed:
           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #3183|0                           |1
        is obsolete|                            |
--- Comment #1 from Jakub Jelen <jjelen at redhat.com> ---
Created attachment 3184
  --> https://bugzilla.mindrot.org/attachment.cgi?id=3184&action=edit
patch v2
Ok, the solution is a bit more complicated. We need to shield also the
zero-lenght passphrases and otherwise pass the passprase from userdata.
With the attached patch I am able to decrypt existing keys as well as
these broken ones without any issues.
-- 
You are receiving this mail because:
You are watching the assignee of the bug.
    
    
More information about the openssh-bugs
mailing list