RFC5054 says:
Cipher suites that begin with TLS_SRP_SHA_RSA or TLS_SRP_SHA_DSS
require the server to send a certificate message containing a
certificate with the specified type of public key, and to sign the
server key exchange message using a matching private key.
Cipher suites that do not
Hi Hubert
Many thanks for your contribution. I have merged all 3 of your pull requests.
Nice work!
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=343e5cf194b7baf244ed24efa4b8e6d9fc5d4921
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=4ceddeea6c626a922e1b8f54b6fe1d2b89f8ef90
Should have added: I did not include the issue around SRP and aNULL.
I thought this was a bit odd myself, so after a bit of investigation have
decided this is a bug. Raised as #3396
Matt
__
OpenSSL Project
Closing this ticket. Patch has been reported as working.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List
Steve H has fixed this through this commit:
https://github.com/openssl/openssl/commit/447280ca7babd7532f23ab7afd9e8393f0b07fc0
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing
Fixed.
I have made the following commit to master and 1.0.2:
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d84ba7ea23b386f3fe56c4fe7a7aa8ece2e0c356
And this one to 1.0.0 and 0.9.8:
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d663f506dc43752b64db58e9169e2e200b3b4be6
Many
This version number refers to the ABI version of the library.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List
Patch applied:
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=abfb989fe0b749ad61f1aa4cdb0ea4f952fc13e0
Many thanks for your contribution.
Matt
__
OpenSSL Project http://www.openssl.org
To be honest I'm not too sure what the policy here is, but I think we generally
don't update copyright messages unless some significant change is made. There
are a lot of files in the OpenSSL source code with these dates inI'd rather
not go through each one individually fixing them!
Matt
Merged:
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=8a6c6bbf21cc11ea0fed69a106250af0d734d786
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=96fc4b72506c1573fd80cfc1d2e5ca4d3d0c2b3f
On Sun Jun 22 20:00:14 2014, k...@x64architecture.com wrote:
Hello,
Sorry about this whole mess, the issue was discovered and fixed by the
OpenBSD team. I reply'd to the original person who discovered my
mistake of not attributing the OpenBSD team instead of to this list (I
thought I reply'd
Applied. Thanks for your contribution.
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=6e6ba36d980f67b6e5c7b139f78da7acbbf8ec76
Matt
__
OpenSSL Project http://www.openssl.org
Development
Closing this as a dupe of #3198
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
I can confirm that CVE-2014-0198 is fixed in OpenSSL-1.0.1h.
Setting this ticket to resolved.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List
51518506c10cde225d4eb7590b2bc4f0ea67c959
Author: Matt Caswell m...@openssl.org
Date: Thu Jul 3 22:09:08 2014 +0100
Added PURIFY section to initialise variables in BN_consttime_swap to stop
valgrind complaining.
Assumes constant time is not important when PURIFY is defined.
PR#3415
diff --git a/crypto
Thanks Jeff:
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=75b7606881b08a892f487629cc30e63dff1800cb
Applied to master, 1.0.2 and 1.0.1. I don't believe 1.0.0 has AES-NI support
(?) so haven't applied it to that branch.
Matt
Please raise this issue on the openssl-users list - this is preferred way of
raising support questions.
If there is a definite bug then please re-raise a ticket in RT. Closing this
ticket for now.
Matt
__
OpenSSL Project
Please raise this issue on the openssl-users list - this is the preferred way of
raising support questions.
If there is a definite bug then please re-raise a ticket in RT. Closing this
ticket for now.
Matt
__
OpenSSL Project
Copying Kurt Roeckx response to this below (which only went to the openssl-dev
list, and not to RT).
Based on Kurt's response I am closing this ticket for now. Please re-open by
responding to this email if you still think this is a defect.
Matt
On Sun, Jul 06, 2014 at 10:18:29AM +0200,
Emilia is looking at this - assigning this ticket to her.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List
Fixed:
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=66816c53bea0ecddb9448da7ea9a51a334496127
I think you meant it should be done like this:
if ((a-method != NULL) (a-method-destroy != NULL))
a-method-destroy(a);
This has been lurking there since SSLeay. In practice I don't think it
Running the applications in this way is not supported. Closing this ticket.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
On Wed Jul 09 16:24:04 2014, lull...@yahoo.com wrote:
Hi,
openssl enc command with -aes-xxx-xts doesnt work if an IV is specified
When you say it doesn't work, what do you mean? Do you get an error? If so
what is it?
as below:
openssl enc -engine af_alg -aes-256-xts -in plaintext_file
On Thu Jul 10 11:26:46 2014, bcha...@akamai.com wrote:
Hello,
I have been looking at the OpenSSL source code, and this jumped out as a
possible error. 'n¹ is an unsigned before it is passed into ssl3_read_n,
which causes the worry of an overflow. To prevent this, I added check that
just makes
Fix applied:
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=f8571ce82292ed340ed6302635f9bd6dfbc1043a
Approach based on Rich Salz's suggestion. This seems to be the most pragmatic
way forward, although it does have the disadvantage that this will mask any
other future problems in the bn
I propose the following patch to deal with this ticket (for master, 1.0.2 and
1.0.1), i.e. disable XTS for the enc utility.
Any objections?
Matt
diff --git a/apps/enc.c b/apps/enc.c
index 928d16b..48f1f8b 100644
--- a/apps/enc.c
+++ b/apps/enc.c
@@ -339,6 +339,12 @@ bad:
goto end;
}
+ if
Hi Mike
I'm looking at this. I'll get back to you once I've reviewed.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Taking this ticket to investigate further.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Fixed (with dkg's suggested wording change):
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2097a17c576f2395a10b05f14490688bc5f45a07
Matt
__
OpenSSL Project http://www.openssl.org
Applied to master. Thanks Mike!
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Closing this ticket in favour of PR#3462.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Taking this ticket.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
On 21/07/14 21:34, Billy Brumley wrote:
Bump. Three year anniversary! Where's my leather gift?!
At least libressl picked it up:
https://github.com/libressl-portable/openbsd/commit/530a3e9ab5b28202266d1a443d4f0da1d2452372
BBB
Your leather gift is here:
If you originally obtained your copy of OpenSSL in binary form (such as from
your OS vendor), then please get hold of the latest copy from them.
If you originally obtained your copy of OpenSSL in source form then you will
need to build a new version from the latest release on the OpenSSL website.
Many thanks for your report.
Fixed in this commit (and other similar commits for other branches):
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=f2be92b94dad3c6cbdf79d99a324804094cf1617
Matt
__
OpenSSL Project
Many thanks for your patch.
Applied here:
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=750487899ad2b794078ed998b513a4a14f60f2cc
Matt
__
OpenSSL Project http://www.openssl.org
Someone already fixed this for 1.0.2 and 1.0.1, but for some reason it wasn't
fixed in master/1.0.0/0.9.8.
I've fixed this now. Thanks for the report.
Matt
__
OpenSSL Project
This is working as designed. From the man page:
EC_KEY_generate_key generates a new public and private key for the
supplied eckey object.
Matt
__
OpenSSL Project http://www.openssl.org
On 16/09/14 19:31, Dmitry Belyavsky wrote: Hello!
I've made a quick fix to solve this problem (attached). The main problem
with this fix is to move locally-defined engine constants to the level
of evp.h, so if you suggest a better solution, I am ready to implement it.
Thank you!
On Tue,
On Wed Sep 17 21:41:01 2014, beld...@gmail.com wrote:
Hello Matt,
the improved patch is attached. It uses the EVP_DigestSign* API
instead of
EVP_digest and does not modify any header files.
Thank you!
Hi Dmitry
There are still some significant problems with this patch as it is currently
Patch applied to master, 1.0.2, 1.0.1 and 1.0.0:
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=e0fdea3e49e7454aa76bd5ecf3a3747641354c68
Many thanks for the contribution
Matt
__
OpenSSL Project
That link just asks me to log in?
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
We have no plans to change this.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Many thanks for the report and patch. Applied here:
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=ae64fb528ecc1bc0452842c5217e5989df1177ad
Matt
__
OpenSSL Project
Many thanks. Patch applied:
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=5211e094dec9486a540ac480f345df1a8d2b2862
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing
On Thu Nov 06 10:38:23 2014, v.badal...@open-bs.ru wrote:
HI all
CentOS x86_64 release 6.6 (Final)
OpenSSL version
OpenSSL 1.0.1e-fips 11 Feb 2013
# rpm -qa | grep openssl
openssl-devel-1.0.1e-30.el6_6.2.x86_64
openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64
openssl-1.0.1e-30.el6_6.2.x86_64
On Thu Nov 13 01:15:10 2014, esado...@eniks.com wrote:
Matt,
It is not just my problem. Google that error and you will find plenty
of other
people having this issue as far back as 5 years ego. I already have
solution
in place and I do not require any fixing but all the people on Windows
Unfortunately I don't think it is as simple as that. If I understand the
previous change correctly, Emilia has deliberately removed the error message as
part of work to protect against timing attacks. The very act of adding an error
to the error queue could introduce a measurable timing difference
On Mon Nov 24 09:40:37 2014, aliosa.janko...@gmail.com wrote:
The connection to www.vehicleenquiry.service.gov.uk fails with openssl
1.0.1j even if it works well in IE and Google Chrome. This is actually a
regression because it works well even in openssl 1.0.0o version. I
discovered the issue
As per Hubert's note, either usage seems correct to me.
Closing this ticket.
Matt
-BEGIN PGP PUBLIC KEY BLOCK-
Version: GnuPG v1
mQENBFGALsIBCADBkh6zfxbewW2KJjaMaishSrpxuiVaUyvWgpe6Moae7JNCW8ay
hJbwAtsQ69SGA4gUkyrR6PBvDMVYEiYqZwXB/3IErStESjcu+gkbmsa0XcwHpkE3
On Sun Nov 23 19:09:46 2014, prav...@viptela.com wrote:
This happens when the server is unreachable. The client when it is trying
to resend the client_hello is barfing on fragment-frag value. Is this
known issue ? Let me know if you need any more info.
Not consistently reproducible. Please
On Sat Nov 22 13:19:13 2014, v.badal...@open-bs.ru wrote:
Find this:
https://bugzilla.redhat.com/show_bug.cgi?format=multipleid=987158
http://openssl.6102.n7.nabble.com/AES-cbc-encrypt-amp-aesni-cbc-
encrypt-length-parameter-td52370.html
not being correctly set. If you get another
crash with this patch applied, then please capture the core and let me know
what you find out.
Thanks
Matt
From 90e37eb304a697e37ebd857ea5456435fa236bc9 Mon Sep 17 00:00:00 2001
From: Matt Caswell m...@openssl.org
Date: Tue, 25 Nov 2014 13:36:00 +
On Thu Nov 20 21:35:45 2014, phil...@redfish-solutions.com wrote:
Can the following function please be added:
int RSA_public_digest(const RSA* key, const EVP_MD *type, unsigned
char *md, unsigned int *len);
which would use “type” to generate a digest over the DER encoding of
the public
OpenSSL is currently not supported under Cygwin64.
There is a port:
http://sourceforge.net/p/cygwin-ports/cygwin64-openssl/ci/master/tree/1.0.1-cygwin64.patch
You may wish to submit this defect there.
Closing this ticket.
Matt
Thanks for your submission. However Steve Henson has already commited a similar
patch, therefore closing this ticket.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List
OP reports this now working. Closing ticket.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Dmitry has reported that this has been fixed by this commit:
https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=8a35dbb6d89a16d792b79b157b3e89443639ec94
Closing this ticket
Matt
__
OpenSSL Project
On 25/11/14 23:20, Praveen Kariyanahalli wrote:
Hi Matt
Trying out your patch. Will keep you posted. In meanwhile we ran into
more valgrind issues .. on the server end. Can you please comment on them?
==621== 8,680 (1,488 direct, 7,192 indirect) bytes in 62 blocks are
definitely lost in
Resend this time including r...@openssl.org...sorry for the noise on
openssl-dev...
On 27/11/14 02:54, Praveen Kariyanahalli via RT wrote:
The purpose of DTLSv1_listen is to listen for incoming datagrams from
anyone. If it receives a ClientHello without a cookie it immediately
responds with a
On Tue Nov 25 09:38:33 2014, shre...@viptela.com wrote:
Version : 1.0.1j
Platform : mips64
The client is trying to reach a server that does not exist. And we are
trying to free the ssl peer. It has probably tried a retransmission after 1
second and SSL_connect returned ERR_WANT. Any help
Patch applied.
Many thanks,
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Adding info from Steve on how to do this on one go and reclosing this ticket:
On 25/11/14 16:02, Dr. Stephen Henson wrote:
I'm curious: I've not seen the private key version before, where is it used?
You can actually perform the encode and digest operation all in one go using
the
On Thu Nov 27 16:23:04 2014, prav...@viptela.com wrote:
*My approach*
global_ssl = SSL_new(ctx);
In Server call back function
ret = DTLSv1_listen(global_ssl, client_addr);
if ret = 0 return;
else socket,
bind,
connect (more specific) and
migrate the global_ssl to this peer (peer-ssl)
Thanks for the report. I have applied a fix in git...a slightly different
solution to the one proposed in your patch.
Thanks
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing
Thanks for the report. This has now been fixed.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Steve has now fixed this.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Closing this ticket as Andy has provided an answer.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Mike withdrew this ticket so closing.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
No further information supplied in response to Kurt's request, so closing this
ticket.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Fixed some while ago as part of fixing ticket 3253.
Closing this ticket.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Not a bug. If there are still issues please direct questions to the
openssl-users list.
Closing this ticket.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List
It is unclear what the issue is here. If you are still having problems then
please send an email to openssl-users.
Closing this ticket.
Matt
__
OpenSSL Project http://www.openssl.org
Development
Insufficient information to recreate. If this is still a problem then please
reopen this ticket.
Closing.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Thanks for the report. This was fixed some while ago as a result of ticket
3244.
Closing.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Quentin,
Please can you resubmit this patch as an attachment rather than inline? Email
has mangled it, and I am unable to review it.
Thanks
Matt
__
OpenSSL Project http://www.openssl.org
On Sun Nov 30 21:17:56 2014, olivier.rouss...@netaxis.be wrote:
Hello,
I am interfacing openssl with a custom version of pyca/pyopenssl.
When doing cffi compilation (CentOs 6.5) it fails for srtp.h reporting
an error to the lines using SRTP_PROTECTION_PROFILE.
By adding
#include
in
On Thu Nov 27 12:54:23 2014, matt wrote:
crash. I'm guessing some kind of memory corruption going on. Have you
tried
running this through valgrind? That would be a useful next step.
Any thoughts on this?
Thanks
Matt
__
:00 2001
From: Matt Caswell m...@openssl.org
Date: Mon, 1 Dec 2014 11:10:38 +
Subject: [PATCH] MTU fixes patch
---
apps/s_client.c| 16 +++-
apps/s_server.c| 18 -
crypto/bio/bio.h | 4 ++
crypto/bio/bss_dgram.c | 46 --
ssl/d1_both.c
OCB support has been merged in. Closing my own ticket.
Matt
___
openssl-dev mailing list
openssl-dev@openssl.org
https://mta.opensslfoundation.net/mailman/listinfo/openssl-dev
On Wed Dec 10 09:18:57 2014, v.badal...@open-bs.ru wrote:
Looks like need add some check to return code len
I agree. Co-incidentally I already have a very similar fix for the same defect
going through the review process.
Matt
___
openssl-dev
17 00:00:00 2001
From: Matt Caswell m...@openssl.org
Date: Fri, 12 Dec 2014 15:32:24 +
Subject: [PATCH] DTLS fixes for signed/unsigned issues
Conflicts:
ssl/d1_both.c
---
ssl/d1_both.c | 41 ++---
1 file changed, 30 insertions(+), 11 deletions(-)
diff --git
On Mon Dec 15 13:39:43 2014, v.badal...@open-bs.ru wrote:
Got assert
d1_both.c(296): OpenSSL internal error, assertion failed: s-init_num ==
(int)s-d1-w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH
To confirm: you did retain your change to check the return value from
dtls1_output_cert_chain?
The
On Thu Dec 18 04:54:57 2014, v.badal...@open-bs.ru wrote:
Thanks! Great!
6000 calls. No crashes or leaks only messages like this in
asterisk
[2014-12-18 04:59:20] ERROR[31074][C-13d4] res_rtp_asterisk.c:
DTLS
failure occurred on RTP instance '0x298c1d68' due to reason 'digest
check
On Thu Nov 27 16:59:36 2014, prav...@viptela.com wrote:
Thanks Matt. Will keep you posted on 1.
Coming back to the original crash. Here is some update.
Our server started seeing the crash and leaks, after our negative stress
testing suite added some pmtu testcases. i.e., during 1000s of
On Mon Dec 22 13:05:34 2014, prav...@viptela.com wrote:
Hi Matt
No, we have not hit this issue for a while now. You can close the ticket.
Thanks for following up.
Just to make sure, we won't hit these issues . . We will upgrade to the
latest stable version.
Ok. Closing this ticket.
Just
Hi Vijendra
There is insufficient information from your description to determine whether
this is a fault with OpenSSL or with your application. If this is still an
issue for you, please raise it on the openssl-users email list.
Since it cannot be determined that there is a problem OpenSSL itself
On Tue Dec 02 22:50:07 2014, luis.gar...@csr.com wrote:
Hi,
The bug list server of openssl is very slow to access, so I am not
sure if this bug has already been filed.
When using the routine ASN1_item_d2i, the pointer passed as the in
variable gets modified in
Whilst slightly unexpected
No response from OP so setting this ticket to stalled.
Matt
___
openssl-dev mailing list
openssl-dev@openssl.org
https://mta.opensslfoundation.net/mailman/listinfo/openssl-dev
On Mon Dec 22 17:38:49 2014, shre...@viptela.com wrote:
Hey Matt,
Sorry, but we haven't hit this issue again in our code. I cleaned up some
code with valgrind. Maybe that fixed some issues too. I will get back in
touch with you if I come across this trace again.
Ok - thanks for the update
On Wed Jan 14 21:21:46 2015, shir...@gmail.com wrote:
Hi all,
I believe I have found a bug which is only present in the latest
versions (1.0.1k)
I have created a simple C test which does the following things in this
order:
1. initialize the SSL library
2. creates an X509 key and cert
3.
On Wed Jan 14 21:55:17 2015, shir...@gmail.com wrote:
Hi Matt,
Here are more explanations:
On my Mac OS X Yosemite, the OS provided OpenSSL version
$ openssl version
OpenSSL 1.0.1j 15 Oct 2014
Compiling the test
$ gcc ~/Dropbox/Public/dtls_bug.c -Wno-deprecated-declarations -lssl
On Thu Jan 15 17:01:51 2015, shir...@gmail.com wrote:
Hi all,
Also, just for completeness, I want to point out I'm a fortunate case
where I can actually touch the code and recompile it to fix the
issue. I'm sure that other cases are not so fortunate. IMHO, when
DTLS method is used, that call
On Thu Jan 15 10:38:58 2015, sidhpurwala.huza...@gmail.com wrote:
Hi,
I found a memory leak in s_server.c. On my x86_64 machine, this leaks 56
bytes for each connection request.
Patch is attached.
I'm not seeing this memory leak. The kctx object should be being freed in the
call to SSL_free
Please could you try making the following call:
SSL_CTX_set_read_ahead(ctx, 1);
Insert it immediately after these lines in your test code:
pSslContext = SSL_CTX_new(DTLSv1_server_method()); assert(pSslContext != NULL);
assert(SSL_CTX_use_certificate(pSslContext, pX509) == 1);
On Thu Jan 15 14:25:54 2015, sidhpurwala.huza...@gmail.com wrote:
Here is how to test it:
openssl req -x509 -newkey rsa -keyout localhost.key -out localhost.crt
-subj \
/CN=localhost -nodes -batch -sha256
valgrind --leak-check=full openssl s_server -key localhost.key -cert \
localhost.crt
Many thanks. Patch applied.
Regards
Matt
___
openssl-dev mailing list
openssl-dev@openssl.org
https://mta.opensslfoundation.net/mailman/listinfo/openssl-dev
Hi Julien
There is a fix for this issue currently in git (see commit 56cd7404).
Closing this ticket.
Matt
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Hi Mark
There is a fix for this issue currently in git (see commit 56cd7404).
Closing this ticket.
Matt
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Hi Ben
There is a fix for this issue currently in git (see commit 56cd7404).
Closing this ticket.
Matt
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
501 - 600 of 930 matches
Mail list logo