parent
ed491c8561
commit
2f10ab987c
@ -0,0 +1 @@
|
|||||||
|
# Calculate append=skip
|
@ -0,0 +1 @@
|
|||||||
|
# Calculate append=skip merge()!=
|
@ -0,0 +1,22 @@
|
|||||||
|
# Calculate format=diff merge(app-arch/dump)==0.4.46&&pkg(dev-libs/openssl)>=1.1
|
||||||
|
diff -Naur dump-0.4b46/common/transformation_ssl.c dump-0.4b46-new/common/transformation_ssl.c
|
||||||
|
--- dump-0.4b46/common/transformation_ssl.c 2016-06-08 07:01:45.000000000 +0200
|
||||||
|
+++ dump-0.4b46-new/common/transformation_ssl.c 2019-01-02 11:26:15.945017945 +0100
|
||||||
|
@@ -215,7 +215,7 @@
|
||||||
|
/* to be exposed to any attacker anyway. */
|
||||||
|
*saltlen = 16;
|
||||||
|
if (xform->enc == 1) {
|
||||||
|
- RAND_pseudo_bytes(salt, *saltlen);
|
||||||
|
+ RAND_bytes(salt, *saltlen);
|
||||||
|
}
|
||||||
|
memcpy(ivbuffer, salt, 16);
|
||||||
|
|
||||||
|
@@ -515,7 +515,7 @@
|
||||||
|
//EVP_CIPHER_CTX_rand_key(ctx, t->state.ssl.key);
|
||||||
|
//EVP_CIPHER_CTX_cleanup(ctx);
|
||||||
|
//EVP_CIPHER_CTX_free(ctx);
|
||||||
|
- RAND_bytes(t->state.ssl.key, t->state.ssl.cipher->key_len);
|
||||||
|
+ RAND_bytes(t->state.ssl.key, EVP_CIPHER_key_length(t->state.ssl.cipher));
|
||||||
|
} else {
|
||||||
|
// how do we get keys?
|
||||||
|
}
|
Loading…
Reference in new issue