[openssl.org #3396] SRP and aNULL

2014-06-10 Thread Matt Caswell via RT
RFC5054 says: Cipher suites that begin with TLS_SRP_SHA_RSA or TLS_SRP_SHA_DSS require the server to send a certificate message containing a certificate with the specified type of public key, and to sign the server key exchange message using a matching private key. Cipher suites that do not

[openssl.org #3384] Patch: add ECC strings to ciphers(1), point out difference between DH and ECDH

2014-06-10 Thread Matt Caswell via RT
Hi Hubert Many thanks for your contribution. I have merged all 3 of your pull requests. Nice work! https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=343e5cf194b7baf244ed24efa4b8e6d9fc5d4921 https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=4ceddeea6c626a922e1b8f54b6fe1d2b89f8ef90

[openssl.org #3384] Patch: add ECC strings to ciphers(1), point out difference between DH and ECDH

2014-06-10 Thread Matt Caswell via RT
Should have added: I did not include the issue around SRP and aNULL. I thought this was a bit odd myself, so after a bit of investigation have decided this is a bug. Raised as #3396 Matt __ OpenSSL Project

[openssl.org #3380] OpenSSL 1.0.1h on SGI IRIX

2014-06-11 Thread Matt Caswell via RT
Closing this ticket. Patch has been reported as working. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List

[openssl.org #3396] SRP and aNULL

2014-06-11 Thread Matt Caswell via RT
Steve H has fixed this through this commit: https://github.com/openssl/openssl/commit/447280ca7babd7532f23ab7afd9e8393f0b07fc0 Matt __ OpenSSL Project http://www.openssl.org Development Mailing

[openssl.org #3377] 0.9.8za/1.0.0m incomplete backport from 1.0.1h in ssl/s3_pkt.c

2014-06-12 Thread Matt Caswell via RT
Fixed. I have made the following commit to master and 1.0.2: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d84ba7ea23b386f3fe56c4fe7a7aa8ece2e0c356 And this one to 1.0.0 and 0.9.8: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=d663f506dc43752b64db58e9169e2e200b3b4be6 Many

[openssl.org #3372] Possible patch for typo fix in version number of dylib

2014-06-12 Thread Matt Caswell via RT
This version number refers to the ABI version of the library. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List

[openssl.org #3375] Patch: Off-by-one errors in ssl_cipher_get_evp()

2014-06-12 Thread Matt Caswell via RT
Patch applied: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=abfb989fe0b749ad61f1aa4cdb0ea4f952fc13e0 Many thanks for your contribution. Matt __ OpenSSL Project http://www.openssl.org

[openssl.org #3373] [BUG] [WIN] DLL copyright message not synchronize for quite a while

2014-06-16 Thread Matt Caswell via RT
To be honest I'm not too sure what the policy here is, but I think we generally don't update copyright messages unless some significant change is made. There are a lot of files in the OpenSSL source code with these dates inI'd rather not go through each one individually fixing them! Matt

[openssl.org #3386] Allow custom iteration count in the PKCS#8 application

2014-06-17 Thread Matt Caswell via RT
Merged: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=8a6c6bbf21cc11ea0fed69a106250af0d734d786 https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=96fc4b72506c1573fd80cfc1d2e5ca4d3d0c2b3f

[openssl.org #3375] Patch: Off-by-one errors in ssl_cipher_get_evp()

2014-06-22 Thread Matt Caswell via RT
On Sun Jun 22 20:00:14 2014, k...@x64architecture.com wrote: Hello, Sorry about this whole mess, the issue was discovered and fixed by the OpenBSD team. I reply'd to the original person who discovered my mistake of not attributing the OpenBSD team instead of to this list (I thought I reply'd

[openssl.org #3393] PATCH: EVP_SignInit.pod update

2014-06-29 Thread Matt Caswell via RT
Applied. Thanks for your contribution. https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=6e6ba36d980f67b6e5c7b139f78da7acbbf8ec76 Matt __ OpenSSL Project http://www.openssl.org Development

[openssl.org #3411] Fixed possible null pointers if malloc fails

2014-06-29 Thread Matt Caswell via RT
Closing this as a dupe of #3198 Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #3414] OpenSSL: Status of official fix for CVE-2014-0198

2014-07-01 Thread Matt Caswell via RT
I can confirm that CVE-2014-0198 is fixed in OpenSSL-1.0.1h. Setting this ticket to resolved. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #3415] Bug report: Uninitialized memory reads reported by valgrind for ECDSA signatures

2014-07-03 Thread Matt Caswell via RT
51518506c10cde225d4eb7590b2bc4f0ea67c959 Author: Matt Caswell m...@openssl.org Date: Thu Jul 3 22:09:08 2014 +0100 Added PURIFY section to initialise variables in BN_consttime_swap to stop valgrind complaining. Assumes constant time is not important when PURIFY is defined. PR#3415 diff --git a/crypto

[openssl.org #3416] PATCH: EVP_EncryptionInit and AES-NI note

2014-07-05 Thread Matt Caswell via RT
Thanks Jeff: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=75b7606881b08a892f487629cc30e63dff1800cb Applied to master, 1.0.2 and 1.0.1. I don't believe 1.0.0 has AES-NI support (?) so haven't applied it to that branch. Matt

[openssl.org #3430] ssltest fails when using -DTEMP_GOST_TLS

2014-07-06 Thread Matt Caswell via RT
Please raise this issue on the openssl-users list - this is preferred way of raising support questions. If there is a definite bug then please re-raise a ticket in RT. Closing this ticket for now. Matt __ OpenSSL Project

[openssl.org #3433] ESXi 4.1 SSL Patch

2014-07-06 Thread Matt Caswell via RT
Please raise this issue on the openssl-users list - this is the preferred way of raising support questions. If there is a definite bug then please re-raise a ticket in RT. Closing this ticket for now. Matt __ OpenSSL Project

[openssl.org #3437] Bug in TLS Client Hello CipherSuite List

2014-07-06 Thread Matt Caswell via RT
Copying Kurt Roeckx response to this below (which only went to the openssl-dev list, and not to RT). Based on Kurt's response I am closing this ticket for now. Please re-open by responding to this email if you still think this is a defect. Matt On Sun, Jul 06, 2014 at 10:18:29AM +0200,

[openssl.org #3425] Potential padding oracle in evp_enc.c

2014-07-07 Thread Matt Caswell via RT
Emilia is looking at this - assigning this ticket to her. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List

[openssl.org #3439] Memory leak bug

2014-07-09 Thread Matt Caswell via RT
Fixed: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=66816c53bea0ecddb9448da7ea9a51a334496127 I think you meant it should be done like this: if ((a-method != NULL) (a-method-destroy != NULL)) a-method-destroy(a); This has been lurking there since SSLeay. In practice I don't think it

[openssl.org #3441] bug report - RAND_cleanup in apps_shutdown problem

2014-07-10 Thread Matt Caswell via RT
Running the applications in this way is not supported. Closing this ticket. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org

[openssl.org #3442] [patch] AES XTS: supporting custom iv from openssl enc command

2014-07-10 Thread Matt Caswell via RT
On Wed Jul 09 16:24:04 2014, lull...@yahoo.com wrote: Hi, openssl enc command with -aes-xxx-xts doesnt work if an IV is specified When you say it doesn't work, what do you mean? Do you get an error? If so what is it? as below: openssl enc -engine af_alg -aes-256-xts -in plaintext_file

[openssl.org #3448] Overflow

2014-07-10 Thread Matt Caswell via RT
On Thu Jul 10 11:26:46 2014, bcha...@akamai.com wrote: Hello, I have been looking at the OpenSSL source code, and this jumped out as a possible error. 'n¹ is an unsigned before it is passed into ssl3_read_n, which causes the worry of an overflow. To prevent this, I added check that just makes

[openssl.org #3415] Bug report: Uninitialized memory reads reported by valgrind for ECDSA signatures

2014-07-13 Thread Matt Caswell via RT
Fix applied: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=f8571ce82292ed340ed6302635f9bd6dfbc1043a Approach based on Rich Salz's suggestion. This seems to be the most pragmatic way forward, although it does have the disadvantage that this will mask any other future problems in the bn

[openssl.org #3442] [patch] AES XTS: supporting custom iv from openssl enc command

2014-07-13 Thread Matt Caswell via RT
I propose the following patch to deal with this ticket (for master, 1.0.2 and 1.0.1), i.e. disable XTS for the enc utility. Any objections? Matt diff --git a/apps/enc.c b/apps/enc.c index 928d16b..48f1f8b 100644 --- a/apps/enc.c +++ b/apps/enc.c @@ -339,6 +339,12 @@ bad: goto end; } + if

[openssl.org #3446] test/testutil.h test registry macros

2014-07-13 Thread Matt Caswell via RT
Hi Mike I'm looking at this. I'll get back to you once I've reviewed. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org

[openssl.org #3443] [patch] Implement Camellia-CBC suites from RFC6367

2014-07-14 Thread Matt Caswell via RT
Taking this ticket to investigate further. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #3442] [patch] AES XTS: supporting custom iv from openssl enc command

2014-07-16 Thread Matt Caswell via RT
Fixed (with dkg's suggested wording change): https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=2097a17c576f2395a10b05f14490688bc5f45a07 Matt __ OpenSSL Project http://www.openssl.org

[openssl.org #3446] test/testutil.h test registry macros

2014-07-19 Thread Matt Caswell via RT
Applied to master. Thanks Mike! Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #3457] Possible Bugs in EVP_KeyToBytes?

2014-07-19 Thread Matt Caswell via RT
Closing this ticket in favour of PR#3462. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #3450] Out-of-bounds read in ssl3_get_key_exchange (ssl/s3_clnt.c)

2014-07-19 Thread Matt Caswell via RT
Taking this ticket. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #2569] [PATCH] EC_POINT_invert checks wrong function pointer

2014-07-21 Thread Matt Caswell via RT
On 21/07/14 21:34, Billy Brumley wrote: Bump. Three year anniversary! Where's my leather gift?! At least libressl picked it up: https://github.com/libressl-portable/openbsd/commit/530a3e9ab5b28202266d1a443d4f0da1d2452372 BBB Your leather gift is here:

[openssl.org #3467] FW: Critical vulnerabilities found (#8083-432678597-2590)

2014-07-22 Thread Matt Caswell via RT
If you originally obtained your copy of OpenSSL in binary form (such as from your OS vendor), then please get hold of the latest copy from them. If you originally obtained your copy of OpenSSL in source form then you will need to build a new version from the latest release on the OpenSSL website.

[openssl.org #3450] Out-of-bounds read in ssl3_get_key_exchange (ssl/s3_clnt.c)

2014-08-15 Thread Matt Caswell via RT
Many thanks for your report. Fixed in this commit (and other similar commits for other branches): https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=f2be92b94dad3c6cbdf79d99a324804094cf1617 Matt __ OpenSSL Project

[openssl.org #3443] [patch] Implement Camellia-CBC suites from RFC6367

2014-08-15 Thread Matt Caswell via RT
Many thanks for your patch. Applied here: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=750487899ad2b794078ed998b513a4a14f60f2cc Matt __ OpenSSL Project http://www.openssl.org

[openssl.org #2693] [OpenSSL 1.0.1 beta 2] crypto/ec/ec_key.c - double header inclusion

2014-08-29 Thread Matt Caswell via RT
Someone already fixed this for 1.0.2 and 1.0.1, but for some reason it wasn't fixed in master/1.0.0/0.9.8. I've fixed this now. Thanks for the report. Matt __ OpenSSL Project

[openssl.org #2725] [Patch] Openssl 1.0.1 beta2 - ec_key.c - EC_KEY_generate_key() overwrites user-defined private key

2014-08-29 Thread Matt Caswell via RT
This is working as designed. From the man page: EC_KEY_generate_key generates a new public and private key for the supplied eckey object. Matt __ OpenSSL Project http://www.openssl.org

[openssl.org #3530] Problems measuring openssl speed

2014-09-16 Thread Matt Caswell via RT
On 16/09/14 19:31, Dmitry Belyavsky wrote: Hello! I've made a quick fix to solve this problem (attached). The main problem with this fix is to move locally-defined engine constants to the level of evp.h, so if you suggest a better solution, I am ready to implement it. Thank you! On Tue,

[openssl.org #3530] Problems measuring openssl speed

2014-09-18 Thread Matt Caswell via RT
On Wed Sep 17 21:41:01 2014, beld...@gmail.com wrote: Hello Matt, the improved patch is attached. It uses the EVP_DigestSign* API instead of EVP_digest and does not modify any header files. Thank you! Hi Dmitry There are still some significant problems with this patch as it is currently

[openssl.org #3551] [PATCH] Removed duplicated and identical definition of PKCS7_type_is_encrypted

2014-10-06 Thread Matt Caswell via RT
Patch applied to master, 1.0.2, 1.0.1 and 1.0.0: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=e0fdea3e49e7454aa76bd5ecf3a3747641354c68 Many thanks for the contribution Matt __ OpenSSL Project

[openssl.org #3592] bug report. Crash. Critical? Security bug?

2014-11-12 Thread Matt Caswell via RT
That link just asks me to log in? __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #3582] Request openssl-1.0.1j Makefile: move build_tests to do in test

2014-11-12 Thread Matt Caswell via RT
We have no plans to change this. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #3535] TS high-precision time malformation

2014-11-12 Thread Matt Caswell via RT
Many thanks for the report and patch. Applied here: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=ae64fb528ecc1bc0452842c5217e5989df1177ad Matt __ OpenSSL Project

[openssl.org #3599] [PATCH] Fixes a typo in the docs for EVP_EncryptUpdate

2014-11-12 Thread Matt Caswell via RT
Many thanks. Patch applied: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=5211e094dec9486a540ac480f345df1a8d2b2862 Matt __ OpenSSL Project http://www.openssl.org Development Mailing

[openssl.org #3592] bug report. Crash. Critical? Security bug?

2014-11-12 Thread Matt Caswell via RT
On Thu Nov 06 10:38:23 2014, v.badal...@open-bs.ru wrote: HI all CentOS x86_64 release 6.6 (Final) OpenSSL version OpenSSL 1.0.1e-fips 11 Feb 2013 # rpm -qa | grep openssl openssl-devel-1.0.1e-30.el6_6.2.x86_64 openssl-debuginfo-1.0.1e-30.el6_6.2.x86_64 openssl-1.0.1e-30.el6_6.2.x86_64

[openssl.org #3532] FW: [openssl] Build on Windows fails if cloned with git (#174)

2014-11-13 Thread Matt Caswell via RT
On Thu Nov 13 01:15:10 2014, esado...@eniks.com wrote: Matt, It is not just my problem. Google that error and you will find plenty of other people having this issue as far back as 5 years ego. I already have solution in place and I do not require any fixing but all the people on Windows

[openssl.org #3602] [PATCH]

2014-11-16 Thread Matt Caswell via RT
Unfortunately I don't think it is as simple as that. If I understand the previous change correctly, Emilia has deliberately removed the error message as part of work to protect against timing attacks. The very act of adding an error to the error queue could introduce a measurable timing difference

[openssl.org #3610] Bug, Regression from 1.0.0 : Cannot connect to www.vehicleenquiry.service.gov.uk

2014-11-24 Thread Matt Caswell via RT
On Mon Nov 24 09:40:37 2014, aliosa.janko...@gmail.com wrote: The connection to www.vehicleenquiry.service.gov.uk fails with openssl 1.0.1j even if it works well in IE and Google Chrome. This is actually a regression because it works well even in openssl 1.0.0o version. I discovered the issue

[openssl.org #3609] Requesting to change the Spelling mistake: Can be changed as bits instead of bit on displaying key size

2014-11-24 Thread Matt Caswell via RT
As per Hubert's note, either usage seems correct to me. Closing this ticket. Matt -BEGIN PGP PUBLIC KEY BLOCK- Version: GnuPG v1 mQENBFGALsIBCADBkh6zfxbewW2KJjaMaishSrpxuiVaUyvWgpe6Moae7JNCW8ay hJbwAtsQ69SGA4gUkyrR6PBvDMVYEiYqZwXB/3IErStESjcu+gkbmsa0XcwHpkE3

[openssl.org #3608] SEGV Crash in dtls1_retransmit_message function

2014-11-24 Thread Matt Caswell via RT
On Sun Nov 23 19:09:46 2014, prav...@viptela.com wrote: This happens when the server is unreachable. The client when it is trying to resend the client_hello is barfing on fragment-frag value. Is this known issue ? Let me know if you need any more info. Not consistently reproducible. Please

[openssl.org #3592] bug report. Crash. Critical? Security bug?

2014-11-24 Thread Matt Caswell via RT
On Sat Nov 22 13:19:13 2014, v.badal...@open-bs.ru wrote: Find this: https://bugzilla.redhat.com/show_bug.cgi?format=multipleid=987158 http://openssl.6102.n7.nabble.com/AES-cbc-encrypt-amp-aesni-cbc- encrypt-length-parameter-td52370.html

[openssl.org #3608] SEGV Crash in dtls1_retransmit_message function

2014-11-25 Thread Matt Caswell via RT
not being correctly set. If you get another crash with this patch applied, then please capture the core and let me know what you find out. Thanks Matt From 90e37eb304a697e37ebd857ea5456435fa236bc9 Mon Sep 17 00:00:00 2001 From: Matt Caswell m...@openssl.org Date: Tue, 25 Nov 2014 13:36:00 +

[openssl.org #3606] Need RSA_pubkey_digest()

2014-11-25 Thread Matt Caswell via RT
On Thu Nov 20 21:35:45 2014, phil...@redfish-solutions.com wrote: Can the following function please be added: int RSA_public_digest(const RSA* key, const EVP_MD *type, unsigned char *md, unsigned int *len); which would use “type” to generate a digest over the DER encoding of the public

[openssl.org #3605] bug report: compilation error and fix for OpenSSL on Cygwin64

2014-11-25 Thread Matt Caswell via RT
OpenSSL is currently not supported under Cygwin64. There is a port: http://sourceforge.net/p/cygwin-ports/cygwin64-openssl/ci/master/tree/1.0.1-cygwin64.patch You may wish to submit this defect there. Closing this ticket. Matt

[openssl.org #3585] [PATCH] OPENSSL_NO_SSL3 doesn't remove all SSLv3 bits

2014-11-25 Thread Matt Caswell via RT
Thanks for your submission. However Steve Henson has already commited a similar patch, therefore closing this ticket. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #3564] Build error OpenSSL 1.0.1i

2014-11-25 Thread Matt Caswell via RT
OP reports this now working. Closing ticket. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #3572] [BUG] Memory leak in DTLS re-negotiation

2014-11-26 Thread Matt Caswell via RT
Dmitry has reported that this has been fixed by this commit: https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=8a35dbb6d89a16d792b79b157b3e89443639ec94 Closing this ticket Matt __ OpenSSL Project

Re: [openssl.org #3608] SEGV Crash in dtls1_retransmit_message function

2014-11-26 Thread Matt Caswell via RT
On 25/11/14 23:20, Praveen Kariyanahalli wrote: Hi Matt Trying out your patch. Will keep you posted. In meanwhile we ran into more valgrind issues .. on the server end. Can you please comment on them? ==621== 8,680 (1,488 direct, 7,192 indirect) bytes in 62 blocks are definitely lost in

Fwd: Re: [openssl.org #3608] SEGV Crash in dtls1_retransmit_message function

2014-11-27 Thread Matt Caswell via RT
Resend this time including r...@openssl.org...sorry for the noise on openssl-dev... On 27/11/14 02:54, Praveen Kariyanahalli via RT wrote: The purpose of DTLSv1_listen is to listen for incoming datagrams from anyone. If it receives a ClientHello without a cookie it immediately responds with a

[openssl.org #3611] Segmentation fault during SSL_free

2014-11-27 Thread Matt Caswell via RT
On Tue Nov 25 09:38:33 2014, shre...@viptela.com wrote: Version : 1.0.1j Platform : mips64 The client is trying to reach a server that does not exist. And we are trying to free the ssl peer. It has probably tried a retransmission after 1 second and SSL_connect returned ERR_WANT. Any help

[openssl.org #3612] Fwd: [PATCH] Missing documentation for ocsp -timeout option

2014-11-27 Thread Matt Caswell via RT
Patch applied. Many thanks, Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #3606] Need RSA_pubkey_digest()

2014-11-27 Thread Matt Caswell via RT
Adding info from Steve on how to do this on one go and reclosing this ticket: On 25/11/14 16:02, Dr. Stephen Henson wrote: I'm curious: I've not seen the private key version before, where is it used? You can actually perform the encode and digest operation all in one go using the

[openssl.org #3608] SEGV Crash in dtls1_retransmit_message function

2014-11-27 Thread Matt Caswell via RT
On Thu Nov 27 16:23:04 2014, prav...@viptela.com wrote: *My approach* global_ssl = SSL_new(ctx); In Server call back function ret = DTLSv1_listen(global_ssl, client_addr); if ret = 0 return; else socket, bind, connect (more specific) and migrate the global_ssl to this peer (peer-ssl)

[openssl.org #3613] Patch: Fix warning in Nginx logs on every connect when GOST TLS used.

2014-11-27 Thread Matt Caswell via RT
Thanks for the report. I have applied a fix in git...a slightly different solution to the one proposed in your patch. Thanks Matt __ OpenSSL Project http://www.openssl.org Development Mailing

[openssl.org #1767] bug of EVP_Cipher when use openssl engine

2014-11-27 Thread Matt Caswell via RT
Thanks for the report. This has now been fixed. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #3559] Weak digest for (EC)DH key exchange when connecting to SNI defined host

2014-11-27 Thread Matt Caswell via RT
Steve has now fixed this. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #3556] Problem building openssl 1.0.1i in debug mode

2014-11-27 Thread Matt Caswell via RT
Closing this ticket as Andy has provided an answer. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #3510] Clang warning/error fixes

2014-11-27 Thread Matt Caswell via RT
Mike withdrew this ticket so closing. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #3315] Why does the linker complain about undefined symbols?

2014-11-27 Thread Matt Caswell via RT
No further information supplied in response to Kurt's request, so closing this ticket. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #3228] Bug report: openssl 1.0.1f build fails with make: invalid option

2014-11-27 Thread Matt Caswell via RT
Fixed some while ago as part of fixing ticket 3253. Closing this ticket. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org

[openssl.org #3180] Brainpool Elliptic Curves in OpenSSL version 1.0.2 - Re: #2239: [PATCH] RFC 5639 support

2014-11-27 Thread Matt Caswell via RT
Not a bug. If there are still issues please direct questions to the openssl-users list. Closing this ticket. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #3086] Re: OpenSSL

2014-11-27 Thread Matt Caswell via RT
It is unclear what the issue is here. If you are still having problems then please send an email to openssl-users. Closing this ticket. Matt __ OpenSSL Project http://www.openssl.org Development

[openssl.org #3225] make 'failure'

2014-11-27 Thread Matt Caswell via RT
Insufficient information to recreate. If this is still a problem then please reopen this ticket. Closing. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #3115] s3_srvr.c out-of-bound dereference (minor bug)

2014-11-27 Thread Matt Caswell via RT
Thanks for the report. This was fixed some while ago as a result of ticket 3244. Closing. Matt __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #3604] [PATCH] User can specify the public exponent in genrsa

2014-11-28 Thread Matt Caswell via RT
Quentin, Please can you resubmit this patch as an attachment rather than inline? Email has mangled it, and I am unable to review it. Thanks Matt __ OpenSSL Project http://www.openssl.org

[openssl.org #3614] issue when using srtp.h with cffi

2014-12-02 Thread Matt Caswell via RT
On Sun Nov 30 21:17:56 2014, olivier.rouss...@netaxis.be wrote: Hello, I am interfacing openssl with a custom version of pyca/pyopenssl. When doing cffi compilation (CentOs 6.5) it fails for srtp.h reporting an error to the lines using SRTP_PROTECTION_PROFILE. By adding #include in

[openssl.org #3611] Segmentation fault during SSL_free

2014-12-02 Thread Matt Caswell via RT
On Thu Nov 27 12:54:23 2014, matt wrote: crash. I'm guessing some kind of memory corruption going on. Have you tried running this through valgrind? That would be a useful next step. Any thoughts on this? Thanks Matt __

[openssl.org #3592] bug report. Crash. Critical? Security bug?

2014-12-02 Thread Matt Caswell via RT
:00 2001 From: Matt Caswell m...@openssl.org Date: Mon, 1 Dec 2014 11:10:38 + Subject: [PATCH] MTU fixes patch --- apps/s_client.c| 16 +++- apps/s_server.c| 18 - crypto/bio/bio.h | 4 ++ crypto/bio/bss_dgram.c | 46 -- ssl/d1_both.c

[openssl-dev] [openssl.org #3181] [PATCH] OCB

2014-12-08 Thread Matt Caswell via RT
OCB support has been merged in. Closing my own ticket. Matt ___ openssl-dev mailing list openssl-dev@openssl.org https://mta.opensslfoundation.net/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3592] bug report. Crash. Critical? Security bug?

2014-12-12 Thread Matt Caswell via RT
On Wed Dec 10 09:18:57 2014, v.badal...@open-bs.ru wrote: Looks like need add some check to return code len I agree. Co-incidentally I already have a very similar fix for the same defect going through the review process. Matt ___ openssl-dev

[openssl-dev] [openssl.org #3592] bug report. Crash. Critical? Security bug?

2014-12-12 Thread Matt Caswell via RT
17 00:00:00 2001 From: Matt Caswell m...@openssl.org Date: Fri, 12 Dec 2014 15:32:24 + Subject: [PATCH] DTLS fixes for signed/unsigned issues Conflicts: ssl/d1_both.c --- ssl/d1_both.c | 41 ++--- 1 file changed, 30 insertions(+), 11 deletions(-) diff --git

[openssl-dev] [openssl.org #3592] bug report. Crash. Critical? Security bug?

2014-12-16 Thread Matt Caswell via RT
On Mon Dec 15 13:39:43 2014, v.badal...@open-bs.ru wrote: Got assert d1_both.c(296): OpenSSL internal error, assertion failed: s-init_num == (int)s-d1-w_msg_hdr.msg_len + DTLS1_HM_HEADER_LENGTH To confirm: you did retain your change to check the return value from dtls1_output_cert_chain? The

[openssl-dev] [openssl.org #3592] bug report. Crash. Critical? Security bug?

2014-12-18 Thread Matt Caswell via RT
On Thu Dec 18 04:54:57 2014, v.badal...@open-bs.ru wrote: Thanks! Great! 6000 calls. No crashes or leaks only messages like this in asterisk [2014-12-18 04:59:20] ERROR[31074][C-13d4] res_rtp_asterisk.c: DTLS failure occurred on RTP instance '0x298c1d68' due to reason 'digest check

[openssl-dev] [openssl.org #3608] SEGV Crash in dtls1_retransmit_message function

2014-12-22 Thread Matt Caswell via RT
On Thu Nov 27 16:59:36 2014, prav...@viptela.com wrote: Thanks Matt. Will keep you posted on 1. Coming back to the original crash. Here is some update. Our server started seeing the crash and leaks, after our negative stress testing suite added some pmtu testcases. i.e., during 1000s of

[openssl-dev] [openssl.org #3608] SEGV Crash in dtls1_retransmit_message function

2014-12-22 Thread Matt Caswell via RT
On Mon Dec 22 13:05:34 2014, prav...@viptela.com wrote: Hi Matt No, we have not hit this issue for a while now. You can close the ticket. Thanks for following up. Just to make sure, we won't hit these issues . . We will upgrade to the latest stable version. Ok. Closing this ticket. Just

[openssl-dev] [openssl.org #3623] faulting module ssleay32.dll, version 0.0.0.0, fault address 0x00010c8b.

2014-12-22 Thread Matt Caswell via RT
Hi Vijendra There is insufficient information from your description to determine whether this is a fault with OpenSSL or with your application. If this is still an issue for you, please raise it on the openssl-users email list. Since it cannot be determined that there is a problem OpenSSL itself

[openssl-dev] [openssl.org #3620] bug report ASN1_item_d2i causes memory leak

2014-12-22 Thread Matt Caswell via RT
On Tue Dec 02 22:50:07 2014, luis.gar...@csr.com wrote: Hi, The bug list server of openssl is very slow to access, so I am not sure if this bug has already been filed. When using the routine ASN1_item_d2i, the pointer passed as the in variable gets modified in Whilst slightly unexpected

[openssl-dev] [openssl.org #3611] Segmentation fault during SSL_free

2014-12-22 Thread Matt Caswell via RT
No response from OP so setting this ticket to stalled. Matt ___ openssl-dev mailing list openssl-dev@openssl.org https://mta.opensslfoundation.net/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3611] Segmentation fault during SSL_free

2014-12-22 Thread Matt Caswell via RT
On Mon Dec 22 17:38:49 2014, shre...@viptela.com wrote: Hey Matt, Sorry, but we haven't hit this issue again in our code. I cleaned up some code with valgrind. Maybe that fixed some issues too. I will get back in touch with you if I come across this trace again. Ok - thanks for the update

[openssl-dev] [openssl.org #3657] OpenSSL 1.0.1k DTLS handshake no longer works

2015-01-14 Thread Matt Caswell via RT
On Wed Jan 14 21:21:46 2015, shir...@gmail.com wrote: Hi all, I believe I have found a bug which is only present in the latest versions (1.0.1k) I have created a simple C test which does the following things in this order: 1. initialize the SSL library 2. creates an X509 key and cert 3.

[openssl-dev] [openssl.org #3657] OpenSSL 1.0.1k DTLS handshake no longer works

2015-01-14 Thread Matt Caswell via RT
On Wed Jan 14 21:55:17 2015, shir...@gmail.com wrote: Hi Matt, Here are more explanations: On my Mac OS X Yosemite, the OS provided OpenSSL version $ openssl version OpenSSL 1.0.1j 15 Oct 2014 Compiling the test $ gcc ~/Dropbox/Public/dtls_bug.c -Wno-deprecated-declarations -lssl

[openssl-dev] [openssl.org #3657] OpenSSL 1.0.1k DTLS handshake no longer works

2015-01-15 Thread Matt Caswell via RT
On Thu Jan 15 17:01:51 2015, shir...@gmail.com wrote: Hi all, Also, just for completeness, I want to point out I'm a fortunate case where I can actually touch the code and recompile it to fix the issue. I'm sure that other cases are not so fortunate. IMHO, when DTLS method is used, that call

[openssl-dev] [openssl.org #3660] Memory leak in s_server.c

2015-01-15 Thread Matt Caswell via RT
On Thu Jan 15 10:38:58 2015, sidhpurwala.huza...@gmail.com wrote: Hi, I found a memory leak in s_server.c. On my x86_64 machine, this leaks 56 bytes for each connection request. Patch is attached. I'm not seeing this memory leak. The kctx object should be being freed in the call to SSL_free

[openssl-dev] [openssl.org #3657] OpenSSL 1.0.1k DTLS handshake no longer works

2015-01-15 Thread Matt Caswell via RT
Please could you try making the following call: SSL_CTX_set_read_ahead(ctx, 1); Insert it immediately after these lines in your test code: pSslContext = SSL_CTX_new(DTLSv1_server_method()); assert(pSslContext != NULL); assert(SSL_CTX_use_certificate(pSslContext, pX509) == 1);

[openssl-dev] [openssl.org #3660] Memory leak in s_server.c

2015-01-15 Thread Matt Caswell via RT
On Thu Jan 15 14:25:54 2015, sidhpurwala.huza...@gmail.com wrote: Here is how to test it: openssl req -x509 -newkey rsa -keyout localhost.key -out localhost.crt -subj \ /CN=localhost -nodes -batch -sha256 valgrind --leak-check=full openssl s_server -key localhost.key -cert \ localhost.crt

[openssl-dev] [openssl.org #3638] [PATCH] Fix build with -DOPENSSL_NO_SRTP

2015-01-05 Thread Matt Caswell via RT
Many thanks. Patch applied. Regards Matt ___ openssl-dev mailing list openssl-dev@openssl.org https://mta.opensslfoundation.net/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3651] Compilation error on Windows x64 in crypto/cversion.c

2015-01-14 Thread Matt Caswell via RT
Hi Julien There is a fix for this issue currently in git (see commit 56cd7404). Closing this ticket. Matt ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3652] [PATCH] openssl-1.0.1k fails to compile under Windows

2015-01-14 Thread Matt Caswell via RT
Hi Mark There is a fix for this issue currently in git (see commit 56cd7404). Closing this ticket. Matt ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3646] Compile bug in 1.0.1k

2015-01-14 Thread Matt Caswell via RT
Hi Ben There is a fix for this issue currently in git (see commit 56cd7404). Closing this ticket. Matt ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

<    1   2   3   4   5   6   7   8   9   10   >