Hi Nik, On Do 18 Apr 2019 21:49:58 CEST, Dominik George wrote:
with the attached patch, the conversion works on buster. The script uses php-mcrypt for no reason - the first use always returns an constant 16, the second returns random bytes. With the applied patch, the script works without php-mcrypt.While focusing on what the two mcrypt library calls did, something felt weird, but I didn't know what. I somehow did not trust that what I did was right, because how this decryption should work was not entirely clear to me, despite having basic understanding of how it works. Now I know why: A random IV does not make any sense at all in decryption, and in ECB mode, there is no such thing as an IV at all. Thus, I updated the patch to remove that useless code all together. -nik
This is a well tested patch that I can upload tonight (to unstable)? Or is more testing time needed? If the patch really fixes the transition, then we don't need the gosa s-pu. Do all agree?
Mike -- DAS-NETZWERKTEAM c\o Technik- und Ökologiezentrum Eckernförde Mike Gabriel, Marienthaler str. 17, 24340 Eckernförde mobile: +49 (1520) 1976 148 landline: +49 (4354) 8390 139 GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22 0782 9AF4 6B30 2577 1B31 mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de
pgphOFClEtekX.pgp
Description: Digitale PGP-Signatur