[Pkg-gnutls-commits] r601 - in /packages/libgcrypt11/branches/lenny-1.4.1/debian: changelog patches/20_HMAC-SHA-384.diff

ametzler at users.alioth.debian.org ametzler at users.alioth.debian.org
Sat Nov 8 09:32:21 UTC 2008


Author: ametzler
Date: Sat Nov  8 09:32:21 2008
New Revision: 601

URL: http://svn.debian.org/wsvn/pkg-gnutls/?sc=1&rev=601
Log:
Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes.

Added:
    packages/libgcrypt11/branches/lenny-1.4.1/debian/patches/20_HMAC-SHA-384.diff
Modified:
    packages/libgcrypt11/branches/lenny-1.4.1/debian/changelog

Modified: packages/libgcrypt11/branches/lenny-1.4.1/debian/changelog
URL: http://svn.debian.org/wsvn/pkg-gnutls/packages/libgcrypt11/branches/lenny-1.4.1/debian/changelog?rev=601&op=diff
==============================================================================
--- packages/libgcrypt11/branches/lenny-1.4.1/debian/changelog (original)
+++ packages/libgcrypt11/branches/lenny-1.4.1/debian/changelog Sat Nov  8 09:32:21 2008
@@ -1,6 +1,8 @@
 libgcrypt11 (1.4.1-2) unstable; urgency=low
 
   * Add Simon Josefsson to uploaders.
+  * [20_HMAC-SHA-384.diff] Fixed HMAC for SHA-384 and SHA-512 with keys
+    longer than 64 bytes.
 
  -- Andreas Metzler <ametzler at debian.org>  Sat, 08 Nov 2008 09:22:02 +0100
 

Added: packages/libgcrypt11/branches/lenny-1.4.1/debian/patches/20_HMAC-SHA-384.diff
URL: http://svn.debian.org/wsvn/pkg-gnutls/packages/libgcrypt11/branches/lenny-1.4.1/debian/patches/20_HMAC-SHA-384.diff?rev=601&op=file
==============================================================================
--- packages/libgcrypt11/branches/lenny-1.4.1/debian/patches/20_HMAC-SHA-384.diff (added)
+++ packages/libgcrypt11/branches/lenny-1.4.1/debian/patches/20_HMAC-SHA-384.diff Sat Nov  8 09:32:21 2008
@@ -1,0 +1,103 @@
+From pkg-gnutls-maint-bounces+ametzler=debian.org at lists.alioth.debian.org Wed Nov  5 20:40:25 2008
+From: Werner Koch <wk at gnupg.org>
+To: pkg-gnutls-maint at lists.alioth.debian.org
+Date: Wed, 05 Nov 2008 20:38:27 +0100
+Message-ID: <87tzamq7yk.fsf at wheatstone.g10code.de>
+MIME-Version: 1.0
+Content-Type: multipart/mixed;
+	boundary="=lynch-SHA-espionage-Comirex-asset-world-domination-tempest-M-14=Sund"
+Subject: [Werner Koch] Important fix for HMAC-SHA-384/512
+Status: RO
+Content-Length: 2660
+Lines: 89
+
+--=lynch-SHA-espionage-Comirex-asset-world-domination-tempest-M-14=Sund
+Content-Type: message/rfc822
+Content-Disposition: inline
+
+From: Werner Koch <wk at gnupg.org>
+To: gcrypt-devel at gnupg.org
+Subject: Important fix for HMAC-SHA-384/512
+Organisation: g10 Code GmbH
+OpenPGP: id=5B0358A2; url=finger:wk at g10code.com
+Mail-Followup-To: gcrypt-devel at gnupg.org
+Date: Wed, 05 Nov 2008 19:47:21 +0100
+Gnus-Warning: This is a duplicate of message <87iqr2row6.fsf at wheatstone.g10code.de>
+Message-ID: <87iqr2row6.fsf at wheatstone.g10code.de>
+User-Agent: Gnus/5.110007 (No Gnus v0.7)
+X-BeenThere: gcrypt-devel at gnupg.org
+X-Sender-Host: lists.gnupg.org
+
+Hi!
+
+a bug has in found in the HMAC computation when using a key size of 64
+to 128 bytes with SHA-384 or SHA-512.  The result is a wrong HMAC value.
+Given that such key seizes are not very common, it should not give any
+real world problems but it needs to be fixed anyway.
+
+The fix below is for libgcrypt 1.4.3 but it should apply to all 1.4
+versions.
+
+
+Salam-Shalom,
+
+   Werner
+
+
+
+ * Fixed HMAC for SHA-384 and SHA-512 with keys longer than 64 bytes.
+
+--- libgcrypt-1.4.1/cipher/md.c.orig	2007-08-13 18:46:51.000000000 +0200
++++ libgcrypt-1.4.1/cipher/md.c	2008-11-08 10:14:27.000000000 +0100
+@@ -791,7 +791,7 @@
+   if ( !algo )
+     return GPG_ERR_DIGEST_ALGO; /* i.e. no algo enabled */
+ 
+-  if ( keylen > 64 ) 
++  if ( keylen > hd->ctx->macpads_Bsize ) 
+     {
+       helpkey = gcry_malloc_secure ( md_digest_length( algo ) );
+       if ( !helpkey )
+@@ -799,7 +799,7 @@
+       gcry_md_hash_buffer ( algo, helpkey, key, keylen );
+       key = helpkey;
+       keylen = md_digest_length( algo );
+-      assert ( keylen <= 64 );
++      assert ( keylen <= hd->ctx->macpads_Bsize );
+     }
+ 
+   memset ( hd->ctx->macpads, 0, 2*(hd->ctx->macpads_Bsize) );
+
+
+
+-- 
+Die Gedanken sind frei.  Auschnahme regelt ein Bundeschgesetz.
+
+
+_______________________________________________
+Gcrypt-devel mailing list
+Gcrypt-devel at gnupg.org
+http://lists.gnupg.org/mailman/listinfo/gcrypt-devel
+
+
+--=lynch-SHA-espionage-Comirex-asset-world-domination-tempest-M-14=Sund
+
+
+
+-- 
+Die Gedanken sind frei.  Auschnahme regelt ein Bundeschgesetz.
+
+--=lynch-SHA-espionage-Comirex-asset-world-domination-tempest-M-14=Sund
+Content-Type: text/plain; charset="us-ascii"
+MIME-Version: 1.0
+Content-Transfer-Encoding: 7bit
+Content-Disposition: inline
+
+-- 
+Pkg-gnutls-maint mailing list
+Pkg-gnutls-maint at lists.alioth.debian.org
+http://lists.alioth.debian.org/mailman/listinfo/pkg-gnutls-maint
+--=lynch-SHA-espionage-Comirex-asset-world-domination-tempest-M-14=Sund--
+
+
+




More information about the Pkg-gnutls-commits mailing list