bugzilla-daemon at natsu.mindrot.org
2013-Dec-01 20:35 UTC
[Bug 2177] New: wrong sizeof() parameter following chacha20 commit
https://bugzilla.mindrot.org/show_bug.cgi?id=2177 Bug ID: 2177 Summary: wrong sizeof() parameter following chacha20 commit Product: Portable OpenSSH Version: -current Hardware: All OS: All Status: NEW Severity: minor Priority: P5 Component: sshd Assignee: unassigned-bugs at mindrot.org Reporter: loganaden at gmail.com Created attachment 2380 --> https://bugzilla.mindrot.org/attachment.cgi?id=2380&action=edit wrong sizeof() Following the recent chacha20 commit: from cipher.c: bzero(&cc->cp_ctx, sizeof(&cc->cp_ctx)); '&' should be omitted, in that case. -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at natsu.mindrot.org
2013-Dec-02 03:13 UTC
[Bug 2177] wrong sizeof() parameter following chacha20 commit
https://bugzilla.mindrot.org/show_bug.cgi?id=2177 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |djm at mindrot.org Blocks| |2130 Resolution|--- |FIXED --- Comment #1 from Damien Miller <djm at mindrot.org> --- applied - thanks. -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
bugzilla-daemon at mindrot.org
2015-Aug-11 13:02 UTC
[Bug 2177] wrong sizeof() parameter following chacha20 commit
https://bugzilla.mindrot.org/show_bug.cgi?id=2177 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |CLOSED --- Comment #2 from Damien Miller <djm at mindrot.org> --- Set all RESOLVED bugs to CLOSED with release of OpenSSH 7.1 -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
Maybe Matching Threads
- [Bug 2972] New: Add build-time option to use OpenSSL for ChaCha20-Poly1305
- ChaCha20 Rekey Frequency
- [Bug 3194] New: Please consider lowering chacha20-poly1305@openssh.com cipher priority on AES-NI capable CPU
- [EXTERNAL] Re: ChaCha20 Rekey Frequency
- ChaCha20 Rekey Frequency