Okay, I've learned that there is another bug in the sha-256
implementation in pycrypto:

http://sourceforge.net/tracker/index.php?func=detail&aid=1740198&group_id=20937&atid=120937

This bug report, along with patch that fixes it (below) and instructions
for how to test the bug and the fix have been sitting in pycrypto bug
tracker since June of this year.

This is further evidence, in my humble opinion, that pycrypto is
unmaintained and that its use should be deprecated.

Hopefully such a deprecation will result in either a new maintainer
stepping up to take over from AMK, or a new library (possibly the Python
standard library itself) taking over pycrypto's functions.

Regards,

Zooko


--- SHA256.c 2005-06-14 00:14:57.000000000 +0000
+++ SHA256.c 2007-06-20 08:00:53.000000000 +0000
@@ -140,7 +140,7 @@
* then compress. Then we can fall back to
padding zeros and length
* encoding like normal.
*/
- if (md->curlen >= 56) {
+ if (md->curlen > 56) {
for (; md->curlen < 64;)
md->buf[md->curlen++] = 0;
sha_compress(md);

-- 
Hash Sum mismatch
https://bugs.launchpad.net/bugs/131503
You received this bug notification because you are a member of Ubuntu
Bugs, which is a direct subscriber.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to