[gnutls-dev] GNUTLS_E_INTERNAL_ERROR in _gnutls_ciphertext2compressed
Nikos Mavrogiannopoulos
n.mavrogiannopoulos at gmail.com
Thu Nov 15 15:21:46 CET 2007
I was talking about this patch (quite big):
http://git.savannah.gnu.org/gitweb/?p=gnutls.git;a=commitdiff;h=a923cc605a40cf73dbb40de0ac46978674e388fd
and use gnutls_session_enable_compatibility_mode() on your server.
On Nov 15, 2007 4:06 PM, Ludovic Courtès <ludovic.courtes at laas.fr> wrote:
> With the attached patch against 2.0.1 (your 2 fixes + additional
> `gnutlsassert's) and `NULL' encryption, I nailed it down to this part
> of `gnutls_cipher.c':
>
> /* This one was introduced to avoid a timing attack against the TLS
> * 1.0 protocol.
> */
> if (pad_failed != 0)
> {
> gnutls_assert (); /* <-- This is where we fail */
> return pad_failed;
> }
>
> That's the first `assert' I see, which seems to indicate that PAD_FAILED
> was set here:
>
> /* Check the pading bytes (TLS 1.x)
> */
> if (ver >= GNUTLS_TLS1 && pad_failed == 0)
> for (i = 2; i < pad; i++)
> {
> if (ciphertext.data[ciphertext.size - i] !=
> ciphertext.data[ciphertext.size - 1])
> pad_failed = GNUTLS_E_DECRYPTION_FAILED;
> }
>
> It's pretty hard for me to debug this on a Nokia so I hope you'll come
> up with a bright idea. :-)
>
> Thanks,
> Ludovic.
>
>
> _______________________________________________
> Gnutls-dev mailing list
> Gnutls-dev at gnupg.org
> http://lists.gnupg.org/mailman/listinfo/gnutls-dev
>
>
More information about the Gnutls-dev
mailing list