Look at some of the changes to pull in Poly1305 and SipHash in to EVP:
https://github.com/openssl/openssl/commit/52ad5b60e3a1fef12a1a5ea01527a90b8f92a34b
https://github.com/openssl/openssl/commit/3f5616d734a92fdf99ab827f21e5b6cab85e7194
--
-Todd Short
//
tor> You have mail.
doctor> root@doctor:/usr/source/openssl-1.0.2-stable-SNAP-20170223 #
make[K[K[K[Kless /usr/contrib/b in/configopenssl
doctor>
doctor> [?1h=
doctor> #!/usr/local/bin/bash
doctor> CC=/usr/local/bin/clang39 ./Configure --prefix=/usr/ BSD-x86_64 fips
en
Fixed now.
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
On 23/02/17 12:54, The Doctor wrote:
> Please fix!
>
This fix is already on the way:
https://github.com/openssl/openssl/pull/2713
Matt
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Script started on Thu Feb 23 05:41:55 2017
You have mail.
root@doctor:/usr/source/openssl-1.0.2-stable-SNAP-20170223 #
make[K[K[K[Kless /usr/contrib/b in/configopenssl
[?1h=
#!/usr/local/bin/bash
CC=/usr/local/bin/clang39 ./Configure --prefix=/usr/ BSD-x86_64 fips
enable-gmp
I know, I know, zero knowledge proofs are not crypto. But:
We live in the post-snowden era. Providers and centralized hosting services
are becomming a larger threat than man-in-the-middle attacks. People
(including me) are loosing their trust in cryptography that's only meant to
protect sensitive