Re: IMPORTANT: please test snapshot openssl-0.9.7-stable-SNAP-20030214.tar.gz

2003-02-19 Thread Jacques A. Vidrine
On Fri, Feb 14, 2003 at 06:08:34PM +0100, Bodo Moeller wrote:
 Please test snapshot openssl-0.9.7-stable-SNAP-20030214.tar.gz
 (or later), which will be available today around 8 p.m. GMT at
 URL: ftp://ftp.openssl.org/snapshot;type=d .
 
 We plan to release version 0.9.7a soon (next week if all goes well).
 OpenSSL 0.9.7a will be a bugfix release based on 0.9.7; thus there
 will be no beta releases.  The snapshot should solve most problems
 that have been reported to [EMAIL PROTECTED]; please test it to help us
 avoid unforeseen problems with the new release.

`make test' completed for openssl-0.9.7-stable-SNAP-20030216 on
FreeBSD 5.0-CURRENT i386, alpha, and sparc64.

Cheers,
-- 
Jacques A. Vidrine [EMAIL PROTECTED]  http://www.celabo.org/
NTT/Verio SME  . FreeBSD UNIX .   Heimdal Kerberos
[EMAIL PROTECTED] .  [EMAIL PROTECTED]  .  [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[PATCH] Parallel make

2003-02-19 Thread Witold Filipczyk
Parallel make, eg. make -j 7 fails now.
This patch correct it.
-- 
Witold Filipczyk
[EMAIL PROTECTED]

--- openssl-0.9.7.old/crypto/Makefile.ssl   Fri Dec 20 15:28:45 2002
+++ openssl-0.9.7/crypto/Makefile.ssl   Sun Feb 16 20:02:43 2003
@@ -50,7 +50,7 @@
 top:
@(cd ..; $(MAKE) DIRS=$(DIR) all)
 
-all: buildinf.h lib subdirs shared
+all: shared
 
 buildinf.h: ../Makefile.ssl
( echo #ifndef MK1MF_BUILD; \
@@ -96,7 +96,7 @@
$(RANLIB) $(LIB) || echo Never mind.
@touch lib
 
-shared:
+shared: buildinf.h lib subdirs
if [ -n $(SHARED_LIBS) ]; then \
(cd ..; $(MAKE) $(SHARED_LIB)); \
fi
--- openssl-0.9.7.old/ssl/Makefile.ssl  Thu Dec 19 22:10:20 2002
+++ openssl-0.9.7/ssl/Makefile.ssl  Sun Feb 16 20:03:13 2003
@@ -55,14 +55,14 @@
 top:
(cd ..; $(MAKE) DIRS=$(DIR) all)
 
-all:   lib shared
+all:   shared
 
 lib:   $(LIBOBJ)
$(AR) $(LIB) $(LIBOBJ)
$(RANLIB) $(LIB) || echo Never mind.
@touch lib
 
-shared:
+shared: lib
if [ -n $(SHARED_LIBS) ]; then \
(cd ..; $(MAKE) $(SHARED_LIB)); \
fi



[openssl.org #512] make OpenSSl-0.9.6a

2003-02-19 Thread Guttormsen Stian via RT

I get this message when I try to compile OpenSSL-0.9.6a with the command
make:

# make
making all in crypto...
cc -I. -I.. -I../include -DOPENSSL_SYSNAME_ULTRASPARC -DOPENSSL_THREADS
-D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DOPENSSL_NO_KRB5 -xtarget=ultra
-xarch=v8plus -xO5 -xstrconst -xdepend -Xa -DB_ENDIAN -DBN_DIV2W -DMD5_ASM
-c  cryptlib.c
/usr/ucb/cc:  language optional software package not installed
*** Error code 1
make: Fatal error: Command failed for target `cryptlib.o'
Current working directory /progs/local/openssl-0.9.7/crypto
*** Error code 1
make: Fatal error: Command failed for target `sub_all'

Do I need to install a language package?

Stian Guttormsen
EDB-Teamco
Driftskonsulent 
Telecom Drift Unix Mobil
 tlf: 22772827 / mob: 91888785/ fax: 22090492
 email: [EMAIL PROTECTED]
 smail: Boks 399, Økern 0513 Oslo
www.edb.teamco.com


__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #513] [PATCH] Parallel make

2003-02-19 Thread Witold Filipczyk via RT

Parallel make, eg. make -j 7 fails now.
This patch correct it.
-- 
Witold Filipczyk
[EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #510] bug at compilation

2003-02-19 Thread Richard Levitte via RT

Fix committed.  It will appear in OpenSSL 0.9.7a and on.

This ticket is now resolved.

[[EMAIL PROTECTED] - Tue Feb 18 12:29:43 2003]:

 Hello !
 
 I'm trying to compile OpenSSL on a Windows 2000 server with Borland
 C++
 Builder 5 using nasm.
 
 With the OpenSSL 0.9.7 stable snapshot 20030216, compilation stopped
 with
 the following error code :
 bcc32 -otmp32\md2test.obj -Iinc32 -Itmp32 -DWIN32_LEAN_AND_MEAN -q
 -w-au s
 -w-par -w-inl -c -tWC -tWM -DOPENSSL_SYSNAME_WIN32 -DL_ENDIAN
 -DDSO_WIN32
 -D_s tricmp=stricmp -O2 -ff -fp -DBN_ASM -DMD5_ASM -DSHA1_ASM
 -DRMD160_ASM
 -DOPENSSL_NO_KRB5 -c .\crypto\md2\md2test.c
 
 .\crypto\md2\md2test.c:
 Warning W8066 .\crypto\md2\md2test.c 128: Unreachable code in function
 main
 
 ilink32 -ap -Tpe -x -Gn tmp32\md2test.obj c0x32.obj,
 out32\md2test.exe,,
 out32\ssleay32.lib out32\libeay32.lib cw32mt.lib import32.lib
 
 Turbo Incremental Link 5.00 Copyright (c) 1997, 2000 Borland
 Fatal: Unable to open file 'C0X32.OBJ'
 
 ** error 2 ** deleting out32\md2test.exe
 
 How can I fix it ?
 
 Thanks.
 
 Olivier Marché
 Observatoire de la Vie Etudiante - Infocentre
 Université de Provence - Aix-Marseille 1
 tél : 04 91 10 62 37 -  fax : 04 91 10 61 20
 


-- 
Richard Levitte
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[ANNOUNCE] OpenSSL 0.9.7a and 0.9.6i released

2003-02-19 Thread Richard Levitte - VMS Whacker
-BEGIN PGP SIGNED MESSAGE-


  OpenSSL version 0.9.7a and 0.9.6i released
  ==

  OpenSSL - The Open Source toolkit for SSL/TLS
  http://www.openssl.org/

  The OpenSSL project team is pleased to announce the release of
  version 0.9.7a of our open source toolkit for SSL/TLS.  This new
  OpenSSL version is a security and bugfix release and incorporates
  at least 11 changes and bugfixes to the toolkit (for a complete list
  see http://www.openssl.org/source/exp/CHANGES.

  We also release 0.9.6i, which contains the same security bugfix as
  0.9.7a and a few more small bugfixes compared to 0.9.6h.

  The most significant changes are:

o Security: Important security related bugfixes. [0.9.7a and 0.9.6i]
o Enhanced compatibility with MIT Kerberos. [0.9.7a]
o Can be built without the ENGINE framework. [0.9.7a]
o IA32 assembler enhancements. [0.9.7a]
o Support for new platforms: FreeBSD/IA64 and FreeBSD/Sparc64. [0.9.7a]
o Configuration: the no-err option now works properly. [0.9.7a]
o SSL/TLS: now handles manual certificate chain building. [0.9.7a]
o SSL/TLS: certain session ID malfunctions corrected. [0.9.7a]

  We consider OpenSSL 0.9.7a to be the best version of OpenSSL available
  and we strongly recommend that users of older versions upgrade as
  soon as possible.  OpenSSL 0.9.7a is available for download via HTTP
  and FTP from the following master locations (you can find the various
  FTP mirrors under http://www.openssl.org/source/mirror.html):

o http://www.openssl.org/source/
o ftp://ftp.openssl.org/source/

  For those who want or have to stay with the 0.9.6 series of OpenSSL,
  we strongly recommend that you upgrade to OpenSSL 0.9.6i as soon as
  possible.  It's available in the same location as 0.9.7a.

  The distribution file name is:

o openssl-0.9.7a.tar.gz [normal]
  MD5 checksum: a0d3203ecf10989fdc61c784ae82e531
o openssl-0.9.6i.tar.gz [normal]
  MD5 checksum: 9c4db437c17e0b6412c5e4645b6fcf5c
o openssl-engine-0.9.6i.tar.gz [engine]
  MD5 checksum: c9adc0596c630b31b999eba32fc0a6b3

  The checksums were calculated using the following command:

openssl md5  openssl-0.9.7a.tar.gz
openssl md5  openssl-0.9.6i.tar.gz
openssl md5  openssl-engine-0.9.6i.tar.gz

  Yours,
  The OpenSSL Project Team...  

Mark J. Cox Ben Laurie  Andy Polyakov
Ralf S. Engelschall Richard Levitte Geoff Thorpe
Dr. Stephen Henson  Bodo Möller
Lutz JänickeUlf Möller

-BEGIN PGP SIGNATURE-
Version: 2.6.3ia
Charset: noconv

iQEVAwUBPlOJmPTy7ZjgbSyxAQHG4Qf+K6vX8kk9msYI3iD6zK3BSXzMFO0pCVNN
8OkUW7wsmAnoSRuT89jGTom0fmIi1eiQcOFUf1krlk7btJ4KRVEok/G2ooa4qOmq
MU+4djKgM/LDlqzAbDfN7cEbWGPJeP4polPTgOBYqexBdwoTvJuX9m4LRgvK2enW
BsJjqdsmsLqWlMmixpKsMHNXXyYqs8SGhdSR7SQlbCVNu6QabWi21NbKCvyJzhEq
5Bn9mUej60GHOdTNpRGwqWxBCvl/kAPnOP4ffj5mbQL+R9VYCeCy3BsjDmLdmDt9
xqxdXBxPqu/S1OnSnsTQeMk70o3qX0F6lgqhNUt6FtHynbxoAGAPcw==
=KOdL
-END PGP SIGNATURE-
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #509]

2003-02-19 Thread Humberto Valiente via RT


Hello

(a beginner using linux+ssl)

I tried to install the latest version of openssl  (openssl-0.9.7.tar.gz)
under Suse Linux 7.2 but it makes no results.
The make and make install command doesn´t work.

Then I tried with the version 9.6h.tar.gz and the make and make install
runs.  The only problem I had is that i received an error messages like this:

make[2]: Leaving directory `/var/tmp/openssl-0.9.6h/crypto/rand'
making all in crypto/err...
make[2]: Entering directory `/var/tmp/openssl-0.9.6h/crypto/err'
make[2]: Nothing to be done for `all'.
make[2]: Leaving directory `/var/tmp/openssl-0.9.6h/crypto/err'
making all in crypto/objects...
make[2]: Entering directory `/var/tmp/openssl-0.9.6h/crypto/objects'
/usr/local/bin/perl objects.pl objects.txt obj_mac.num obj_mac.h
make[2]: /usr/local/bin/perl: Command not found
make[2]: *** [obj_mac.h] Error 127
make[2]: Leaving directory `/var/tmp/openssl-0.9.6h/crypto/objects'
make[1]: *** [subdirs] Error 1
make[1]: Leaving directory `/var/tmp/openssl-0.9.6h/crypto'
make: *** [sub_all] Error 1

What I understand is that openssl  is looking for archive perl, under the
the directory /usr/local/bin/ ..but in my computer
the archive perl is located at /usr/bin/.

My question is  ..What I can do ..so that ..when I run the make install
..it looks for the perl archive in /usr//bin/
and not in /usr/local/bin

If you have other solution please let me know...

Thanks a lot

__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #511] BUG: crypto/ec/ec_key.c:EC_KEY_dup()

2003-02-19 Thread Bodo Moeller via RT

__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #512] make OpenSSl-0.9.6a

2003-02-19 Thread Bodo Moeller via RT

This is not an OpenSSL bug; you should install gcc, and possibly
remove /usr/ucb from the PATH.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #514] Bug in OpenSSL????

2003-02-19 Thread Ralph via RT

Hi,

on AIX (64bit) I noticed a major problem with non-blocking sockets. 
Methods SSL_connect(), SSL_read() and SSL_write() should return 
SSL_ERROR_WANT_READ or SSL_ERROR_WANT_WRITE if they need to complete 
their tasks but the socket couldn't handle all the work.

But instead, the methods return SSL_ERROR_SYSCALL when the underlying 
socket gave errno=EWOULDBLOCK or errno=EAGAIN (means: the application 
should retry with these functions if it has not been completed, yet) 
from their respective functions (read() and write()).

For these specific system error numbers, the SSL functions should return 
SSL_ERROR_WANT_* return codes, shouldn't they?

Regards

Ralph Schuster

PS: However, on AIX 4.2 and earlier, this didn't seem to be a problem. 
Funny, isn't it? (But these versions are not supported by IBM anymore!)

__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: [openssl.org #512] make OpenSSl-0.9.6a

2003-02-19 Thread Guttormsen Stian via RT

Thanks.
I have already done that and it resolved the problem.


SG

-Original Message-
From: Bodo Moeller via RT [mailto:[EMAIL PROTECTED]]
Sent: 19. februar 2003 17:33
To: Guttormsen Stian
Cc: [EMAIL PROTECTED]
Subject: [openssl.org #512] make OpenSSl-0.9.6a 



This is not an OpenSSL bug; you should install gcc, and possibly
remove /usr/ucb from the PATH.

__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Inconsistent behavior of ECPublicKey_{set,get}_octet_string()?

2003-02-19 Thread Dr. Stephen Henson
On Wed, Feb 19, 2003, Eric Cronin wrote:

 I am trying to find the analogue of the {i2d,d2i}_{DSA,RSA}PublicKey 
 functions for ECDSA EC_KEY's.  As best I can tell, 
 i2dECPKParameters+ECPublicKey_get_octet_string and 
 d2iECPKParameters+ECPublicKey_set_octet_string are the way to do the 
 encoding/decoding of just the public portions of an EC_KEY.  However, 
 unlike all the other encoding routines in OpenSSL, 
 ECPublicKey_{set,get}_octet_string() does not advance the supplied 
 buffer after copying the key to it.
 Instead, if *in is non-NULL, it remains pointing to the start of the 
 copied key after the function returns (In every other encoding routine 
 I've used *in is advanced to point to the byte after the just encoded 
 data).
 

Although the key specific RSAPublicKey and RSAPrivateKey functions follow a
written standard (PKCS#1) the DSAPublicKey and DSAPrivateKey ones AFAIK do
not: they were made up for SSLeay and we're now stuck with them.

Rather than make up a new format that would be incompatible with everything
else I'd prefer it that we didn't have any equivalents at all for newer
algorithms.

The preferred technique for handling all types of public keys is the
{i2d,d2i}_PUBKEY functions and EVP_PKEY. These use the standard certificate
format for public keys. This isn't algorithm specific and there are various
standards that define the formats used.

There are key specific key types such as {i2d,d2i}_RSA_PUBKEY. These just call
the PUBKEY type and insert or extract the algorithm specific key, throwing an
error if the key isn't of the expected type.

The EC equivalents are d2i_EC_PUBKEY and i2d_EC_PUBKEY.

Similarly PKCS#8 is the preferred private key format.

 Is there a reason these functions deviates from the normal OpenSSL 
 behavior?  It was hard enough to figure out the unwritten rules of when 
 the input buffer does and does not get advanced to begin with, and now 
 if some functions adhere to it and some don't...
 

A lot more of that stuff is documented since 0.9.7 but not all the EC stuff:
its very new.

Steve.
--
Dr Stephen N. Henson.
Core developer of the   OpenSSL project: http://www.openssl.org/
Freelance consultant see: http://www.drh-consultancy.demon.co.uk/
Email: [EMAIL PROTECTED], PGP key: via homepage.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Inconsistent behavior of ECPublicKey_{set,get}_octet_string()?

2003-02-19 Thread Nils Larsch
Eric Cronin wrote:
 I am trying to find the analogue of the {i2d,d2i}_{DSA,RSA}PublicKey
 functions for ECDSA EC_KEY's.  

May I ask why ? For X9.62 you don't need them (, or do
you mean a X509 SubjectPublicKeyInfo object ?).

   As best I can tell,
 i2dECPKParameters+ECPublicKey_get_octet_string and
 d2iECPKParameters+ECPublicKey_set_octet_string are the way to do the
 encoding/decoding of just the public portions of an EC_KEY.  However,
 unlike all the other encoding routines in OpenSSL,
 ECPublicKey_{set,get}_octet_string() does not advance the supplied
 buffer after copying the key to it.

The ECPublicKey_{set|get}_octet_string() functions should simply return
(or set) the public key as an octet string (as the name suggest). They have
nothing to do with ASN1 DER encoding = no i2d or d2i prefix.
Note: the ec public key in the X509 SubjectPublicKeyInfo object is not
DER encoded (the most significant bit of the public key (encoded
as an octet string) becomes the most significant bit of the bit string).

 Instead, if *in is non-NULL, it remains pointing to the start of the
 copied key after the function returns (In every other encoding routine
 I've used *in is advanced to point to the byte after the just encoded
 data).

ECPublicKey_{set|get}_octet_string() are *not* DER de/encoding routines.

 Is there a reason these functions deviates from the normal OpenSSL
 behavior? It was hard enough to figure out the unwritten rules of when
 the input buffer does and does not get advanced to begin with, and now
 if some functions adhere to it and some don't...

Sorry, perhaps I should add some comments in the corresponding
code section ...

Regards,
Nils
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Inconsistent behavior of ECPublicKey_{set,get}_octet_string()?

2003-02-19 Thread Eric Cronin

On Wednesday, February 19, 2003, at 02:48  PM, Nils Larsch wrote:


Eric Cronin wrote:

I am trying to find the analogue of the {i2d,d2i}_{DSA,RSA}PublicKey
functions for ECDSA EC_KEY's.


May I ask why ? For X9.62 you don't need them (, or do
you mean a X509 SubjectPublicKeyInfo object ?).



I'm working on an implementation of forward-secure signature 
algorithms, whose keys can sometimes contain multiple RSA/DSA/ECDSA/etc 
keys.  I haven't tackled the best way to PKCS encode these 
forward-secure keys yet, so in the meantime I have just been using a 
simple obj1_size||obj1_blob||obj2_size||obj2_blob||... encoding, using 
i2d_DSAPublicKey and the like when I needed to dump out an OpenSSL key. 
 I will probably switch to putting the raw keys into an EVP_PKEY for 
the encoding as Steve suggested, but my original goal was just to use 
the simplest encoding possible since the code will all be removed once 
a real encoding is decided upon.

  As best I can tell,
i2dECPKParameters+ECPublicKey_get_octet_string and
d2iECPKParameters+ECPublicKey_set_octet_string are the way to do the
encoding/decoding of just the public portions of an EC_KEY.  However,
unlike all the other encoding routines in OpenSSL,
ECPublicKey_{set,get}_octet_string() does not advance the supplied
buffer after copying the key to it.


The ECPublicKey_{set|get}_octet_string() functions should simply return
(or set) the public key as an octet string (as the name suggest). They 
have
nothing to do with ASN1 DER encoding = no i2d or d2i prefix.
Note: the ec public key in the X509 SubjectPublicKeyInfo object is not
DER encoded (the most significant bit of the public key (encoded
as an octet string) becomes the most significant bit of the bit 
string).


OK, maybe encoding is the wrong term to have used.  What I meant is 
that all the other (OpenSSL internal datastructure) - (char * buffer) 
functions I can think of have the side effect of advancing the output 
buffer's pointer after copying the data (unless it allocated the 
buffer, in which case it doesn't)...  The ECPublicKey_{set,get} ones, 
while having that same common function signature, do not.  Maybe this 
is just i2d/d2i functions vs. all other functions of this nature, in 
which case I've unfairly singled out ECPublicKey_{set,get}/

I'm not saying that advancing the buffer pointer is the best design 
(personally I think side effects like that just to save the caller from 
a simple += are bad), but it would at least be nice if all of OpenSSL's 
foo_convert(object * foo, char **out) had the same behavior regarding 
if (!out), if (out  !*out) and if (out  *out) and similarly for the 
conversion back to in internal datastructure.

Thanks,
Eric

__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Re: Inconsistent behavior of ECPublicKey_{set,get}_octet_string()?

2003-02-19 Thread Nils Larsch
Eric Cronin wrote:
...
 I'm working on an implementation of forward-secure signature
 algorithms, whose keys can sometimes contain multiple RSA/DSA/ECDSA/etc
 keys.  I haven't tackled the best way to PKCS encode these
 forward-secure keys yet, so in the meantime I have just been using a
 simple obj1_size||obj1_blob||obj2_size||obj2_blob||... encoding, using
 i2d_DSAPublicKey and the like when I needed to dump out an OpenSSL key.
   I will probably switch to putting the raw keys into an EVP_PKEY for
 the encoding as Steve suggested, but my original goal was just to use
 the simplest encoding possible since the code will all be removed once
 a real encoding is decided upon.

I think you should use, as Steve suggested, the X509 DER encoded
SubjectPublicKeyInfo object because a simple EC public key 
(without parameters) isn't really useful.

...
  The ECPublicKey_{set|get}_octet_string() functions should simply return
  (or set) the public key as an octet string (as the name suggest). They
  have
  nothing to do with ASN1 DER encoding = no i2d or d2i prefix.
  Note: the ec public key in the X509 SubjectPublicKeyInfo object is not
  DER encoded (the most significant bit of the public key (encoded
  as an octet string) becomes the most significant bit of the bit
  string).

 OK, maybe encoding is the wrong term to have used.  What I meant is
 that all the other (OpenSSL internal datastructure) - (char * buffer)
 functions I can think of have the side effect of advancing the output
 buffer's pointer after copying the data (unless it allocated the
 buffer, in which case it doesn't)...  The ECPublicKey_{set,get} ones,
 while having that same common function signature, do not.  Maybe this
 is just i2d/d2i functions vs. all other functions of this nature, in
 which case I've unfairly singled out ECPublicKey_{set,get}/

 I'm not saying that advancing the buffer pointer is the best design

I guess the reason for this was to simplify the OpenSSL ASN1 macros/
functions (you can call the corresponding de- encode functions in a 
row, without taking care of the pointer).

 (personally I think side effects like that just to save the caller from
 a simple += are bad), but it would at least be nice if all of OpenSSL's
 foo_convert(object * foo, char **out) had the same behavior regarding
 if (!out), if (out  !*out) and if (out  *out) and similarly for the
 conversion back to in internal datastructure.

Ack = I will think about it ... 

Regards,
Nils
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #511] BUG: crypto/ec/ec_key.c:EC_KEY_dup()

2003-02-19 Thread Bodo Moeller
Bodo Moeller via RT [EMAIL PROTECTED]:

[nothing]

RT has cut off the message, which said that the fix will be in the
next snapshot (which should be the latest snapshot by now).


-- 
Bodo Möller [EMAIL PROTECTED]
PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/0x36d2c658.html
* TU Darmstadt, Theoretische Informatik, Alexanderstr. 10, D-64283 Darmstadt
* Tel. +49-6151-16-6628, Fax +49-6151-16-6036
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Inconsistent behavior of ECPublicKey_{set,get}_octet_string()?

2003-02-19 Thread Dr. Stephen Henson
On Wed, Feb 19, 2003, Nils Larsch wrote:

 
 I guess the reason for this was to simplify the OpenSSL ASN1 macros/
 functions (you can call the corresponding de- encode functions in a 
 row, without taking care of the pointer).
 

It was indeed for that purpose. When the old ASN1 code built encoders and
decoders by stringing together d2i and i2d functions it avoided having to
bloat the code even further by incrementing a pointer after every single call.

It doesn't matter as much now because encoders and decoders aren't written
like that with the new ASN1 code (though a couple of pathological cases remain)
but I suppose were stuck with that behaviour in case anything relies on it.

Steve.
--
Dr Stephen N. Henson.
Core developer of the   OpenSSL project: http://www.openssl.org/
Freelance consultant see: http://www.drh-consultancy.demon.co.uk/
Email: [EMAIL PROTECTED], PGP key: via homepage.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]