From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 20296 invoked by alias); 4 Aug 2017 08:32:54 -0000 Mailing-List: contact cygwin-apps-help@cygwin.com; run by ezmlm Precedence: bulk Sender: cygwin-apps-owner@cygwin.com List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Mail-Followup-To: cygwin-apps@cygwin.com Received: (qmail 6255 invoked by uid 89); 4 Aug 2017 08:26:28 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-0.9 required=5.0 tests=BAYES_00,KAM_LAZY_DOMAIN_SECURITY,SPF_HELO_PASS autolearn=no version=3.3.2 spammy=H*M:cygwin, Hx-languages-length:337, HAuthentication-Results:cygwin.com, H*M:4776 X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Fri, 04 Aug 2017 08:26:25 +0000 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 572DF68682 for ; Fri, 4 Aug 2017 08:26:24 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 572DF68682 Authentication-Results: ext-mx03.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=cygwin.com Authentication-Results: ext-mx03.extmail.prod.ext.phx2.redhat.com; spf=none smtp.mailfrom=yselkowitz@cygwin.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com 572DF68682 Received: from [10.10.120.13] (ovpn-120-13.rdu2.redhat.com [10.10.120.13]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 1003F8B328 for ; Fri, 4 Aug 2017 08:26:23 +0000 (UTC) Subject: Re: [PATCH crypt 5/8] Disable blowfish cipher To: cygwin-apps@cygwin.com References: <20170804025258.19248-1-yselkowi@redhat.com> <20170804025258.19248-6-yselkowi@redhat.com> <20170804074607.GK25551@calimero.vinschen.de> From: Yaakov Selkowitz Message-ID: <7264180c-d075-c1aa-4776-bdc0c24f269f@cygwin.com> Date: Fri, 04 Aug 2017 08:32:00 -0000 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1 MIME-Version: 1.0 In-Reply-To: <20170804074607.GK25551@calimero.vinschen.de> Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="n1vLlfBmr116OlxdvMTqNJ9DKhPpqX2e7" X-IsSubscribed: yes X-SW-Source: 2017-08/txt/msg00013.txt.bz2 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --n1vLlfBmr116OlxdvMTqNJ9DKhPpqX2e7 Content-Type: multipart/mixed; boundary="GQGwgCunoUrpUVHPhpJUHVCEwCbpgONFI"; protected-headers="v1" From: Yaakov Selkowitz To: cygwin-apps@cygwin.com Message-ID: <7264180c-d075-c1aa-4776-bdc0c24f269f@cygwin.com> Subject: Re: [PATCH crypt 5/8] Disable blowfish cipher References: <20170804025258.19248-1-yselkowi@redhat.com> <20170804025258.19248-6-yselkowi@redhat.com> <20170804074607.GK25551@calimero.vinschen.de> In-Reply-To: <20170804074607.GK25551@calimero.vinschen.de> --GQGwgCunoUrpUVHPhpJUHVCEwCbpgONFI Content-Type: text/plain; charset=utf-8 Content-Language: en-CA Content-Transfer-Encoding: quoted-printable Content-length: 296 On 2017-08-04 02:46, Corinna Vinschen wrote: > Any details? I don't see anything target dependent in the blowfish > code. When I tested the various algorithms, all I got from blowfish was "*", which indicates something went wrong. I'm still not sure what the issue actually is. --=20 Yaakov --GQGwgCunoUrpUVHPhpJUHVCEwCbpgONFI-- --n1vLlfBmr116OlxdvMTqNJ9DKhPpqX2e7 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" Content-length: 228 -----BEGIN PGP SIGNATURE----- iHQEARECADQWIQRFYAu5jKh4qpenARn/IK+aZu4flAUCWYQvrBYceXNlbGtvd2l0 ekBjeWd3aW4uY29tAAoJEP8gr5pm7h+UHEkAn2ZDFNW3kXNTO1etZrIGjwYAf+T5 AJ4o2uOH9zPNOroIjFNM7YorzwBOPg== =Zc01 -----END PGP SIGNATURE----- --n1vLlfBmr116OlxdvMTqNJ9DKhPpqX2e7--