bugzilla-daemon at natsu.mindrot.org
2013-Dec-01 20:35 UTC
[Bug 2177] New: wrong sizeof() parameter following chacha20 commit
https://bugzilla.mindrot.org/show_bug.cgi?id=2177
Bug ID: 2177
Summary: wrong sizeof() parameter following chacha20 commit
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: minor
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
Reporter: loganaden at gmail.com
Created attachment 2380
--> https://bugzilla.mindrot.org/attachment.cgi?id=2380&action=edit
wrong sizeof()
Following the recent chacha20 commit:
from cipher.c:
bzero(&cc->cp_ctx, sizeof(&cc->cp_ctx));
'&' should be omitted, in that case.
--
You are receiving this mail because:
You are watching the assignee of the bug.
bugzilla-daemon at natsu.mindrot.org
2013-Dec-02 03:13 UTC
[Bug 2177] wrong sizeof() parameter following chacha20 commit
https://bugzilla.mindrot.org/show_bug.cgi?id=2177
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |djm at mindrot.org
Blocks| |2130
Resolution|--- |FIXED
--- Comment #1 from Damien Miller <djm at mindrot.org> ---
applied - thanks.
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
bugzilla-daemon at mindrot.org
2015-Aug-11 13:02 UTC
[Bug 2177] wrong sizeof() parameter following chacha20 commit
https://bugzilla.mindrot.org/show_bug.cgi?id=2177
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #2 from Damien Miller <djm at mindrot.org> ---
Set all RESOLVED bugs to CLOSED with release of OpenSSH 7.1
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
Apparently Analagous Threads
- [Bug 2972] New: Add build-time option to use OpenSSL for ChaCha20-Poly1305
- ChaCha20 Rekey Frequency
- [Bug 3194] New: Please consider lowering chacha20-poly1305@openssh.com cipher priority on AES-NI capable CPU
- [EXTERNAL] Re: ChaCha20 Rekey Frequency
- ChaCha20 Rekey Frequency