Re: cvs commit: openssl/crypto/evp digest.c

2001-09-02 Thread Ben Laurie

[EMAIL PROTECTED] wrote:
 
 geoff   01-Sep-2001 20:37:20
 
   Modified:crypto/evp digest.c
   Log:
   Only OPENSSL_free() non-NULL pointers.

Why? Surely OPENSSL_free() follows the usual semantics and allows a NULL
to be freed?

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: cvs commit: openssl/crypto/evp evp_test.c

2001-09-02 Thread Ben Laurie

[EMAIL PROTECTED] wrote:
 
 ulf 01-Sep-2001 07:30:46
 
   Modified:crypto/evp evp_test.c
   Log:
 
 
   Revision  ChangesPath
   1.5   +1 -1  openssl/crypto/evp/evp_test.c
 
   Index: evp_test.c
   ===
   RCS file: /e/openssl/cvs/openssl/crypto/evp/evp_test.c,v
   retrieving revision 1.4
   retrieving revision 1.5
   diff -u -r1.4 -r1.5
   --- evp_test.c2001/09/01 05:05:32 1.4
   +++ evp_test.c2001/09/01 05:30:45 1.5
   @@ -328,7 +328,7 @@
 if(line[0] == '#' || line[0] == '\n')
 continue;
 p=line;
   - cipher=strsep(p,:);
   + cipher=(char*)ustrsep(p,:);
 key=ustrsep(p,:);
 iv=ustrsep(p,:);
 plaintext=ustrsep(p,:);

Ick! You could at least have preserved the ustrsep/strsep thing...

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



OpenSSL for Novell NetWare

2001-09-02 Thread abcd efghi

Hi,

I want to compile openssl for Novell NetWare. Was this done before? If so, 
can anyone give
detailed instructions how to do it?
If not, can you give general ideas of what should be done? How should I 
approach the
porting of openssl to NetWare?

Sincerely,
Yosi

_
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp

__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[STATUS] OpenSSL (Sun 2-Sep-2001)

2001-09-02 Thread OpenSSL Project


  OpenSSL STATUS   Last modified at
  __   $Date: 2001/07/17 14:39:26 $

  DEVELOPMENT STATE

o  OpenSSL 0.9.7:  Under development...
o  OpenSSL 0.9.6b: Released on July   9th, 2001
o  OpenSSL 0.9.6a: Released on April  5th, 2001
o  OpenSSL 0.9.6:  Released on September 24th, 2000
o  OpenSSL 0.9.5a: Released on April  1st, 2000
o  OpenSSL 0.9.5:  Released on February  28th, 2000
o  OpenSSL 0.9.4:  Released on August09th, 1999
o  OpenSSL 0.9.3a: Released on May   29th, 1999
o  OpenSSL 0.9.3:  Released on May   25th, 1999
o  OpenSSL 0.9.2b: Released on March 22th, 1999
o  OpenSSL 0.9.1c: Released on December  23th, 1998

  RELEASE SHOWSTOPPERS

  AVAILABLE PATCHES

o IA-64 (a.k.a. Intel Itanium) public-key operation performance 
  patch for Linux is available for download at
  http://www.openssl.org/~appro/096b.linux-ia64.diff. As URL
  suggests the patch is relative to OpenSSL 0.9.6b.

  IN PROGRESS

o Steve is currently working on (in no particular order):
ASN1 code redesign, butchery, replacement.
OCSP
EVP cipher enhancement.
Enhanced certificate chain verification.
Private key, certificate and CRL API and implementation.
Developing and bugfixing PKCS#7 (S/MIME code).
Various X509 issues: character sets, certificate request extensions.
o Geoff and Richard are currently working on:
ENGINE (the new code that gives hardware support among others).
o Richard is currently working on:
UI (User Interface)
UTIL (a new set of library functions to support some higher level
  functionality that is currently missing).
Shared library support for VMS.
Kerberos 5 authentication
Constification
OCSP

  NEEDS PATCH

o  apps/ca.c: Sign the certificate? - n creates empty certificate file

o  OpenSSL_0_9_6-stable:
   #include openssl/e_os.h in exported header files is illegal since
   e_os.h is suitable only for library-internal use.

o  Whenever strncpy is used, make sure the resulting string is NULL-terminated
   or an error is reported

  OPEN ISSUES

o  crypto/ex_data.c is not really thread-safe and so must be used
   with care (e.g., extra locking where necessary, or don't call
   CRYPTO_get_ex_new_index once multiple threads exist).
   The current API is not suitable for everything that it pretends
   to offer.

o  The Makefile hierarchy and build mechanism is still not a round thing:

   1. The config vs. Configure scripts
  It's the same nasty situation as for Apache with APACI vs.
  src/Configure. It confuses.
  Suggestion: Merge Configure and config into a single configure
  script with a Autoconf style interface ;-) and remove
  Configure and config. Or even let us use GNU Autoconf
  itself. Then we can avoid a lot of those platform checks
  which are currently in Configure.

o  Support for Shared Libraries has to be added at least
   for the major Unix platforms. The details we can rip from the stuff
   Ralf has done for the Apache src/Configure script. Ben wants the
   solution to be really simple.

   Status: Ralf will look how we can easily incorporate the
   compiler PIC and linker DSO flags from Apache
   into the OpenSSL Configure script.

   Ulf: +1 for using GNU autoconf and libtool (but not automake,
which apparently is not flexible enough to generate
libcrypto)


o  The perl/ stuff needs a major overhaul. Currently it's
   totally obsolete. Either we clean it up and enhance it to be up-to-date
   with the C code or we also could replace it with the really nice
   Net::SSLeay package we can find under
   http://www.neuronio.pt/SSLeay.pm.html.  Ralf uses this package for a
   longer time and it works fine and is a nice Perl module. Best would be
   to convince the author to work for the OpenSSL project and create a
   Net::OpenSSL or Crypt::OpenSSL package out of it and maintains it for
   us.

   Status: Ralf thinks we should both contact the author of Net::SSLeay
   and look how much effort it is to bring Eric's perl/ stuff up
   to date.
   Paul +1

  WISHES

o  SRP in TLS.
   [wished by:
Dj [EMAIL PROTECTED], Tom Wu [EMAIL PROTECTED],
Tom Holroyd [EMAIL PROTECTED]]

   See http://search.ietf.org/internet-drafts/draft-ietf-tls-srp-00.txt
   as well as http://www-cs-students.stanford.edu/~tjw/srp/.

   Tom Holroyd tells us there is a SRP patch for OpenSSH at
   http://members.tripod.com/professor_tom/archives/, that could
   be useful.