Attached is a patch to added AES-ECB modes (128, 192, 256) to
eng_cryptodev.c (and some whitespace cleanup). I also have a backported
1.0.1e if you guys want that as well. The attached patch is from git
master.
I started adding other modes (CTR), but the tests were failing, so I
decided to
On Čt, 2013-10-31 at 22:05 +0100, Kurt Roeckx wrote:
On Mon, Oct 28, 2013 at 09:33:05AM +0100, Andre Robatino via RT wrote:
I have an old i686 machine with a Cyrix M II CPU running Fedora 19. The
latest version of openssl (openssl-1.0.1e-28.fc19.i686) doesn't work
properly with it due to
Hi. When I build the latest development version of httpd or nginx
against the OpenSSL_1_0_2-stable branch, the ECDHE-RSA and ECDHE-ECDSA
ciphers don't work. With both webservers, I can get these ciphers to
work by either...
1. Deleting: SSL_CTX_set_options(ctx, SSL_OP_SINGLE_ECDH_USE);
On Fri, Nov 01, 2013, Rob Stradling wrote:
Hi. When I build the latest development version of httpd or nginx
against the OpenSSL_1_0_2-stable branch, the ECDHE-RSA and
ECDHE-ECDSA ciphers don't work. With both webservers, I can get
these ciphers to work by either...
1. Deleting:
Hey,
I think it's a bug in OpenSSL 1.0.2. It shouldn't break anything that works in
previous versions, at least not without a very good reason.
I'll look into it.
I already reported / patched this a while ago (with no response):
https://rt.openssl.org/Ticket/Display.html?id=3103
It's the
On Fri Aug 02 10:23:33 2013, pi...@cloudflare.com wrote:
Hello,
attached patch fixes the issue with dropped support for EC cipher
suites in software that uses SSL_OP_SINGLE_ECDH_USE after upgrading to
OpenSSL-1.0.2+.
Fixed now, thanks for the report.
Steve.
--
Dr Stephen N. Henson. OpenSSL
On Fri, Nov 01, 2013, Piotr Sikora wrote:
Hey,
I think it's a bug in OpenSSL 1.0.2. It shouldn't break anything that works
in
previous versions, at least not without a very good reason.
I'll look into it.
I already reported / patched this a while ago (with no response):