[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #4779 [Tor Relay]: AES broken since 0.2.3.9-alpha on CentOS 6
#4779: AES broken since 0.2.3.9-alpha on CentOS 6
-----------------------+----------------------------------------------------
Reporter: Pascal | Owner:
Type: defect | Status: new
Priority: major | Milestone: Tor: 0.2.3.x-final
Component: Tor Relay | Version: Tor: 0.2.3.9-alpha
Keywords: aes | Parent:
Points: | Actualpoints:
-----------------------+----------------------------------------------------
Comment(by nickm):
Interesting. I wonder if this computer has aesni instructions. Some of the
patches there look like they could be doing odd things with intel
instructions. I guess the next step is to try to figure out ways to test
whether Centos's openssl is behaving right. One option would be to cook
up a stress test for using AES_ctr128_encrypt() with small or unusual
values for the data length, and make sure it gives the right output. If
this is a bug in the underlying AES_ctr128_encrypt() implementation, that
should turn it up.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4779#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs