OpenSSL EVP Latchups

2013-01-10 Thread GAURAV GUPTA
Hello Members, I think what I am going to discuss is an old problem. But I do not know whether there is fix for this problem or not. 1. OpenSSL EVP has OpenSSL_add_all_ type functions, which are not threadsafe. These when called in multi-threaded environment behaves abnormal , some times

[openssl.org #2953] s_server to show connection duration and transfer speed

2013-01-10 Thread Andrey Kulikov via RT
Please find attached patch, introducing two new options for s_server: one specify maximum number of connections s_server will accept. It will exit clearly after completing last connection the other tells s_server to show each completed connection duration and data transfer rate. These options

[openssl.org #2954] [PATCH] avoid memcpy for overlapping regions

2013-01-10 Thread Nickolai Zeldovich via RT
Using memcpy on overlapping regions of memory is undefined behavior in C. In engines/ccgost/gosthash.c, the circle_xor8() function uses memcpy to copy data between the two arrays passed as arguments, but in some cases (e.g., the third call to circle_xor8 in hash_step() in the same file) the

[openssl.org #2952] Testing new RT instance

2013-01-10 Thread Lutz Jaenicke via RT
This is a test of the upgraded RT for openssl.org Best regards, Lutz __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated

[openssl.org #2955] Bug in documentation: s/EVP_PKEY_verifyrecover/EVP_PKEY_verify_recover/

2013-01-10 Thread Peylo, Martin via RT
Hi, the documented EVP_PKEY_verifyrecover and EVP_PKEY_verifyrecover_init functions don't exist in 1.0.1c. EVP_PKEY_verify_recover seems to be the right spelling. The following commands should fix the issue: $ sed -i 's/EVP_PKEY_verifyrecover/EVP_PKEY_verify_recover/g' doc/crypto/* $ mv

Re: [openssl.org #2937] Handshake performance degradation in 1.0.1 and up.

2013-01-10 Thread Andrey Kulikov via RT
On 11 December 2012 04:00, Stephen Henson via RT r...@openssl.org wrote: I also notice that even the original HMAC version initialises two HMAC contexts with the same key. That could be improved by initialising one and copying the context across. This kind of optimization can be also

RE: [openssl.org #2948] thousands of getpid called inside libcrypto.sl.0.9.8

2013-01-10 Thread Ge, Meiling via RT
Hi, Thank you. I just notice that the main time consumer is not the getpid(). I also found thousands of “FIPS_selftest_failed” during FIPS mode setup which indeed induce the getpid call. Is it normal that FIPS_mode_set(1) needs 5 seconds to finish? Do you have any idea about the main time

Re: [openssl.org #2937] Handshake performance degradation in 1.0.1 and up.

2013-01-10 Thread Andrey Kulikov via RT
Please find attached two patches, together implementing proper HMAC context re-initialization instead of full re-creation. In comparison to openssl-1.0.1c it gives ~10% handshake performance improvements when some engine-specific MAC are used. In order to apply patches use command patch -p1 -i

OpenSSL RT instance migration

2013-01-10 Thread Lutz Jaenicke
Hi, in the process of upgrading and migrating our server infrastructure I have just put the updated Request Tracker into operation. The request tracker stays reachable via r...@openssl.org (or the alias openssl-b...@openssl.org). While the migration is still in progress, the web interface is

[openssl.org #2948] thousands of getpid called inside libcrypto.sl.0.9.8

2013-01-10 Thread Stephen Henson via RT
On Thu Jan 10 15:33:12 2013, meiling...@emc.com wrote: Hi, Thank you. I just notice that the main time consumer is not the getpid(). I also found thousands of “FIPS_selftest_failed” during FIPS mode setup which indeed induce the getpid call. Is it normal that FIPS_mode_set(1) needs 5