Bugzilla – Attachment 121 Details for
Bug 138
Incorrect OpenSSL version requirment?
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
Patch for openssh 3.4p1, which corrects problems with blowfish + ssh1 + OpenSSL 0.9.5a
openssh-3.4p1-openssl095a-rob.patch (text/plain), 854 bytes, created by
Robert Halubek
on 2002-06-29 07:46:36 AEST
(
hide
)
Description:
Patch for openssh 3.4p1, which corrects problems with blowfish + ssh1 + OpenSSL 0.9.5a
Filename:
MIME Type:
Creator:
Robert Halubek
Created:
2002-06-29 07:46:36 AEST
Size:
854 bytes
patch
obsolete
>--- openssh-3.4p1/cipher.c.orig Sun Jun 23 23:21:31 2002 >+++ openssh-3.4p1/cipher.c Fri Jun 28 18:19:52 2002 >@@ -437,6 +437,18 @@ > } > } > >+#ifdef SSH_OLD_EVP >+static void bf_ssh1_init (EVP_CIPHER_CTX * ctx, const unsigned char *key, >+ const unsigned char *iv, int enc) >+{ >+ if (iv != NULL) >+ memcpy (&(ctx->oiv[0]), iv, 8); >+ memcpy (&(ctx->iv[0]), &(ctx->oiv[0]), 8); >+ if (key != NULL) >+ BF_set_key (&(ctx->c.bf_ks), EVP_CIPHER_CTX_key_length (ctx), >+ key); >+} >+#endif > static int (*orig_bf)(EVP_CIPHER_CTX *, u_char *, const u_char *, u_int) = NULL; > > static int >@@ -458,6 +470,9 @@ > memcpy(&ssh1_bf, EVP_bf_cbc(), sizeof(EVP_CIPHER)); > orig_bf = ssh1_bf.do_cipher; > ssh1_bf.nid = NID_undef; >+#ifdef SSH_OLD_EVP >+ ssh1_bf.init = bf_ssh1_init; >+#endif > ssh1_bf.do_cipher = bf_ssh1_cipher; > ssh1_bf.key_len = 32; > return (&ssh1_bf);
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 138
:
121
|
875