Bugzilla – Attachment 1380 Details for
Bug 1390
RekeyLimit max value is too restrictive
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
patch against 4.7p1
parse-rekey.patch (text/plain), 1.18 KB, created by
Jan Pechanec
on 2007-11-10 04:14:01 AEDT
(
hide
)
Description:
patch against 4.7p1
Filename:
MIME Type:
Creator:
Jan Pechanec
Created:
2007-11-10 04:14:01 AEDT
Size:
1.18 KB
patch
obsolete
>--- openssh-4.7p1/readconf.c Mon Oct 22 20:02:09 2007 >+++ tmp/openssh-4.7p1/readconf.c Fri Nov 9 17:52:45 2007 >@@ -498,7 +498,6 @@ > goto parse_int; > > case oRekeyLimit: >- intptr = &options->rekey_limit; > arg = strdelim(&s); > if (!arg || *arg == '\0') > fatal("%.200s line %d: Missing argument.", filename, linenum); >@@ -526,14 +525,14 @@ > } > val64 *= scale; > /* detect integer wrap and too-large limits */ >- if ((val64 / scale) != orig || val64 > INT_MAX) >+ if ((val64 / scale) != orig || val64 > UINT_MAX) > fatal("%.200s line %d: RekeyLimit too large", > filename, linenum); > if (val64 < 16) > fatal("%.200s line %d: RekeyLimit too small", > filename, linenum); >- if (*activep && *intptr == -1) >- *intptr = (int)val64; >+ if (*activep && options->rekey_limit == -1) >+ options->rekey_limit = (u_int32_t)val64; > break; > > case oIdentityFile: >--- openssh-4.7p1/readconf.h Sat Aug 5 04:39:40 2006 >+++ tmp/openssh-4.7p1/readconf.h Fri Nov 9 17:50:27 2007 >@@ -100,7 +100,7 @@ > int clear_forwardings; > > int enable_ssh_keysign; >- int rekey_limit; >+ u_int32_t rekey_limit; > int no_host_authentication_for_localhost; > int identities_only; > int server_alive_interval;
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 1390
:
1380
|
1381