generating a 160-bit DSS key leads to eternal loop
Bug #247846 reported by
Matthias Klose
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Python-Crypto |
Fix Released
|
Low
|
Darsey Litzenberger | ||
python-crypto (Debian) |
Fix Released
|
Unknown
|
|||
python-crypto (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
>>> from Crypto.Util import randpool
>>> r=randpool.
>>> r.stir()
>>> from Crypto.PublicKey import DSA
>>> DSA.generate(161, r.get_bytes)
<Crypto.
>>> DSA.generate(160, r.get_bytes)
Traceback (most recent call last):
File "<stdin>", line 1, in ?
File "/usr/lib/
V[k]
KeyboardInterrupt
Changed in python-crypto: | |
status: | Unknown → Confirmed |
Changed in pycrypto: | |
milestone: | none → 2.1.0 |
Changed in python-crypto (Debian): | |
status: | Confirmed → Fix Released |
To post a comment you must log in.
First of all, don't use RandomPool like that unless you want to end up with bugs like CVE-2008-0166 (the Debian openssl bug). See this: www.lag. net/pipermail/ paramiko/ 2008-January/ 000599. html www.lag. net/pipermail/ paramiko/ 2008-April/ 000678. html
http://
http://
I've confirmed this bug on my machine.