Currently the manual page
http://www.openssl.org/docs/crypto/EVP_EncryptInit.html paragraph for
EVP_DecryptFinal() says:
EVP_EncryptFinal(), EVP_DecryptFinal() and EVP_CipherFinal()
behave in a similar way to EVP_EncryptFinal_ex(), EVP_DecryptFinal_ex()
and EVP_CipherFinal_ex() except ctx
Hello!
BN_mod_inverse has a lines such as:
if (sign 0)
{
if (!BN_sub(Y,n,Y)) goto err;
}
This is incorrect call of BN_sub(BIGNUM *r, const BIGNUM *a, const
BIGNUM *b), because BN_sub change first parameter r during arithmetic
operations and suppose r and b are different objects.
I
Richard Hartmann wrote:
Hi all,
3 X509_V_ERR_UNABLE_TO_GET_CRL unable to get certificate CRL
should read
3 X509_V_ERR_UNABLE_TO_GET_CRL: unable to get certificate CRL
i.e. there is a colon missing. If there is any interest, I can create a patch
but it is probably faster for both sides if
Hello,
OpenSSL doesn't cleanly verify revocation status when a CA is renewed
(with a key change). Attached is a proposed patch to handle this case.
This patch has been done against the current CVS version (I mirror it
every night).
For a description of the problem, please consider the following
Hi Erwann:
On Thursday 31 January 2008 11:23:57 Erwann ABALEA wrote:
Hello,
OpenSSL doesn't cleanly verify revocation status when a CA is renewed
(with a key change). Attached is a proposed patch to handle this case.
This patch has been done against the current CVS version (I mirror it
Howdy all,
As part of some work that my colleague (Ben Bennett) and I have been
doing on increasing performance of OpenSSH we've developed a
multi-threaded implementation of CTR mode for AES. Its built against the
OpenSSH implementation of CTR mode but we were thinking that there might
be
Hi Patrick,
Hodie pr. Kal. Feb. MMVIII est, Patrick Patterson scripsit:
Hi Erwann:
On Thursday 31 January 2008 11:23:57 Erwann ABALEA wrote:
Hello,
OpenSSL doesn't cleanly verify revocation status when a CA is renewed
(with a key change). Attached is a proposed patch to handle this
Hi Erwann;
On Thursday 31 January 2008 13:07:32 Erwann ABALEA wrote:
Renewal is when you issue a new certificate, but keep the same keys. In
this case, the CRL validation in OpenSSL works fine, since the keys are
the same, and the only difference in the cert is a new validity and
serial
Hi,
Has this patch been applied to s_client and s_server in 0.9.8g?
Thanks,
--Hyong
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Hi, Yair Elharrar!
For me it looks bad. :-/ Because, BN_sub doesn't handle this situation (r =
b):
1) BN_sub call BN_uadd(r,a,b), but r = b, then
2) BN_sub change r-neg, but r = b, then
3) BN_sub call BN_expand(r), then
4) BN_sub call BN_ucmp(a,b), but b here is not that b that was
10 matches
Mail list logo