Re: [openssl-dev] [openssl.org #3964] Fix OPENSSL_NO_STDIO build

2016-02-18 Thread David Woodhouse
On Wed, 2016-02-17 at 17:43 +, Salz, Rich wrote: > > It looks like we're in fairly good shape for the OpenSSL 1.1.0 release > > to work "out of the box". > > That will be great. >   > > I would like to see what we can do in the way of automated testing, > > though. It should be possible to at

[openssl-dev] [openssl.org #4312] documentation: RSA_new_method argument

2016-02-18 Thread Rich Salz via RT
pushed in commit 6baa3b430555d25b6eee6440a6b8bee80eaabfc3 thanks. -- Rich Salz, OpenSSL dev team; rs...@openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4312 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe:

[openssl-dev] [openssl.org #4321] Re: Missing accessor to the EVP_CIPHER_CTX member oiv

2016-02-18 Thread Dmitry Belyavsky via RT
Dear Richard, Sorry for the delay. I am out of office now so I will check it some days later. On Thursday, February 18, 2016, Richard Levitte via RT wrote: > Did that help, can we close this ticket now? > > Vid Ons, 17 Feb 2016 kl. 11.25.26, skrev levitte: > > May I suggest

Re: [openssl-dev] duplicate opt* declaration in apps.h

2016-02-18 Thread Salz, Rich
Thanks, fix just pushed to master. -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #4267] Missing accessor to the EVP_CIPHER_CTX member oiv

2016-02-18 Thread Richard Levitte via RT
Did that help, can we close this ticket now? Vid Ons, 17 Feb 2016 kl. 11.25.26, skrev levitte: > May I suggest that you use EVP_CIPHER_set_asn1_iv() and/or > EVP_CIPHER_get_asn1_iv()? With a temporary ASN1_TYPE to which you > assign > gcp->iv, that should be perfectly possible, no? > > Cheers, >

Re: [openssl-dev] OPENSSL_config with default configuration

2016-02-18 Thread Salz, Rich
> OPENSSL_config with NULL argument crash in master branch. > Please find attached file with proposed patch. Fixed with commit 4015adf0a3d352cc4013c722f1b2d5374989ac4c; thanks! -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] memory leaks detected using libSSL 1.1

2016-02-18 Thread Matt Caswell
On 18/02/16 13:59, Michel wrote: > Yes ! > With your 2 patches applied, tls_decrypt_ticket.patch and > fix-win-thread-stop.patch, > (looks like I lost the first one yesterday), > none of my tests programs using libSSL v1.1 reports leaks. > > I feel better. :-) Great. I'll get those reviewed

Re: [openssl-dev] memory leaks detected using libSSL 1.1

2016-02-18 Thread Michel
Yes ! With your 2 patches applied, tls_decrypt_ticket.patch and fix-win-thread-stop.patch, (looks like I lost the first one yesterday), none of my tests programs using libSSL v1.1 reports leaks. I feel better. :-) Thank you Matt. Regards, Michel. -Message d'origine- De : openssl-dev

Re: [openssl-dev] ssl/t1_enc.c with TLS_DEBUG

2016-02-18 Thread Gisle Vanem
Rich Salz wrote: > #ifdef CIPHER_DEBUG > fprintf(stderr, > -"Applying rule %d with %08lx/%08lx/%08lx/%08lx/%08lx %08lx > (%d)\n", > +"Applying rule %d with %08x/%08x/%08x/%08x/%08x %08x (%d)\n", > rule, alg_mkey, alg_auth, alg_enc, alg_mac, alg_ssl, >

Re: [openssl-dev] ssl/t1_enc.c with TLS_DEBUG

2016-02-18 Thread Salz, Rich
> The ssl/t1_enc.c file doesn't compile with '-DTLS_DEBUG': > Besides, enabling '-DCIPHER_DEBUG', also generates lots of warnings. Does the attached patch fix it? diff --git a/ssl/ssl_ciph.c b/ssl/ssl_ciph.c index 9849185..a9954e9 100644 --- a/ssl/ssl_ciph.c +++ b/ssl/ssl_ciph.c @@ -892,7

[openssl-dev] ssl/t1_enc.c with TLS_DEBUG

2016-02-18 Thread Gisle Vanem
The ssl/t1_enc.c file doesn't compile with '-DTLS_DEBUG': ssl/t1_enc.c: In function 'tls1_setup_key_block': ssl/t1_enc.c:528:30: error: 'p1' undeclared (first use in this function) printf("%02X%c", p1[z], ((z + 1) % 16) ? ' ' : '\n'); I assume that should be: printf("%02X%c",

[openssl-dev] [openssl.org #2460] OCSP server uses only IP6

2016-02-18 Thread Rich Salz via RT
fixed with full ipv6 support in master. -- Rich Salz, OpenSSL dev team; rs...@openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2460 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe:

Re: [openssl-dev] memory leaks detected using libSSL 1.1

2016-02-18 Thread Matt Caswell
On 18/02/16 11:37, Michel wrote: > Hi Matt, > > Here under is the new results after applying your patch. > Let me know anything I could do to investigate deeper. Thanks. That was very helpful. I think I may have identified the issue. Please can you try the attached patch and see if that fixes

[openssl-dev] [openssl.org #2047] [PATCH][Beta3] Fix IPv6 handling in BIO_get_accept_socket()

2016-02-18 Thread Rich Salz via RT
fixed in master. Rich Salz, OpenSSL dev team; rs...@openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2047 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] memory leaks detected using libSSL 1.1

2016-02-18 Thread Michel
Hi Matt, Here under is the new results after applying your patch. Let me know anything I could do to investigate deeper. Regards, Michel. Thread serveur 5324 demarre Thread client 6348 demarre OPENSSL_INIT: ossl_init_base: Setting up stop handlers OPENSSL_INIT: ossl_init_add_all_ciphers:

Re: [openssl-dev] memory leaks detected using libSSL 1.1

2016-02-18 Thread Matt Caswell
On 18/02/16 00:13, Michel wrote: > Hi Matt, > > Thanks for the suggestion. > > This is what was printed to stderr : > OPENSSL_INIT: ossl_init_base: Setting up stop handlers > OPENSSL_INIT: ossl_init_add_all_ciphers: openssl_add_all_ciphers_internal() > OPENSSL_INIT: ossl_init_add_all_digests: