Okay, I've learned that there is another bug in the sha-256 implementation in pycrypto:
http://sourceforge.net/tracker/index.php?func=detail&aid=1740198&group_id=20937&atid=120937 This bug report, along with patch that fixes it (below) and instructions for how to test the bug and the fix have been sitting in pycrypto bug tracker since June of this year. This is further evidence, in my humble opinion, that pycrypto is unmaintained and that its use should be deprecated. Hopefully such a deprecation will result in either a new maintainer stepping up to take over from AMK, or a new library (possibly the Python standard library itself) taking over pycrypto's functions. Regards, Zooko --- SHA256.c 2005-06-14 00:14:57.000000000 +0000 +++ SHA256.c 2007-06-20 08:00:53.000000000 +0000 @@ -140,7 +140,7 @@ * then compress. Then we can fall back to padding zeros and length * encoding like normal. */ - if (md->curlen >= 56) { + if (md->curlen > 56) { for (; md->curlen < 64;) md->buf[md->curlen++] = 0; sha_compress(md); -- Hash Sum mismatch https://bugs.launchpad.net/bugs/131503 You received this bug notification because you are a member of Ubuntu Bugs, which is a direct subscriber. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
