Greetings!
On Thu, Sep 22, 2011 at 3:00 AM, Roumen Petrov
open...@roumenpetrov.info wrote:
Hi Dmitry,
Dmitry Belyavsky wrote:
Greetings!
During the 1.x version the current scheme of
algorithms providing through engines was implemented.
Debugging our (Cryptocom LTD) engines, I’ve found
The latest 1.0.1 snap has an error in DTLS related code at line 1068 in
ssl_lib.c
.\ssl\ssl_lib.c(1068) : warning C4018: '' : signed/unsigned mismatch
NMAKE : fatal error U1077: 'cl' : return code '0x2'
Stop.
Please, at least compile to test changes!
-typo.patch
- OpenSSL 1.0.0 stable: openssl-1.0.0e-typo.patch
--
Leena Heino University of Tampere / Computer Centre
( liinu at uta.fi ) ( http://www.uta.fi/laitokset/tkk )
diff -Naur openssl-SNAP-20110924.orig/crypto/modes/modes_lcl.h
openssl-SNAP-20110924/crypto/modes
Hello,
I've noticed that in the latest 1.0.1 and 1.1.0 snapshots that support
TLSv1.1 when using RC4-SHA or RC4-MD5 on different webservers such as
apache or nginx (both using latest versions) will result in segfaults
among other errors and a failed ssl connection.
There seem to be no issues
There appears to be a bug in the SSL bio (ssl/bio_ssl.c) when processing
the BIO_flush() function. This causes a segmentation fault on linux.
OpenSSL 0.9.8b 04 May 2006
built on: Mon Oct 15 17:44:48 EDT 2007
platform: linux-x86_64
options: bn(64,64) md2(int) rc4(ptr,int) des(idx,cisc,16,int)
[xeo...@gmail.com - Sat Sep 24 20:27:48 2011]:
Hello,
I've noticed that in the latest 1.0.1 and 1.1.0 snapshots that support
TLSv1.1 when using RC4-SHA or RC4-MD5 on different webservers such as
apache or nginx (both using latest versions) will result in segfaults
among other errors and