Hi,
   There was recently a FIPS capable openssl-1.0.1-stable release
(link below released).

  ftp://ftp.openssl.org/snapshot/openssl-1.0.1-stable-SNAP-2011MMDD.tar.gz

Can you advise if 1.0.1-stable would have the relevant patches or its
best to checkout 1.0.0-stable and apply #2550 and #2555?.

Thanks,
-Yogi

On Fri, Jul 8, 2011 at 12:05 AM, Robin Seggelmann
<seggelm...@fh-muenster.de> wrote:
> Hi Yogesh,
>
> The patch was created for the development version in the CVS, you can't use 
> this patch for 1.0.0d without at least patch #2506 previously applied. So you 
> either have to check out the 1.0.0-stable repository and apply the not yet 
> applied patches #2550 and #2555 or you can use the cumulative patch for 
> 1.0.0d from our website sctp.fh-muenster.de, which includes all patches since 
> the last release.
>
> I hope 1.0.0e will be released anytime soon, with the latest patches 
> included. Makes things a lot easier.
>
> Best regards
> Robin
>
>
> On Jul 6, 2011, at 11:29 PM, Yogesh Chopra wrote:
>
>> Hi,
>>   I am using openssl-1.0.0d and have been applying patches provided
>> earlier and was able to apply this patch cleanly but it fails
>> compilation. The "listen" comes up as a undeclared identifier.  Can
>> you recheck the patch?.
>>
>> Thanks,
>> -Yogi
>>
>> On Wed, Jul 6, 2011 at 11:41 AM, Robin Seggelmann via RT <r...@openssl.org> 
>> wrote:
>>> This patch fixes that the server increases the expected handshake sequence 
>>> number while listening for new connections, although its supposed to not 
>>> change its state. The server also reflects the record sequence numbers of 
>>> ClientHellos in its HelloVerifyRequest and ServerHello messages now to 
>>> remain stateless, as described in 
>>> http://tools.ietf.org/html/draft-ietf-tls-rfc4347-bis-06.
>>>
>>> Thanks to Yogesh Chopra for providing hints!
>>>
>>> Best regards
>>> Robin
>>>
>>>
>>>
>>>
>>> --- ssl/d1_srvr.c       25 May 2011 14:29:55 -0000      1.20.2.18
>>> +++ ssl/d1_srvr.c       6 Jul 2011 10:06:25 -0000
>>> @@ -167,6 +167,8 @@
>>>        s->in_handshake++;
>>>        if (!SSL_in_init(s) || SSL_in_before(s)) SSL_clear(s);
>>>
>>> +       s->d1->listen = listen;
>>> +
>>>        if (s->cert == NULL)
>>>                {
>>>                SSLerr(SSL_F_DTLS1_ACCEPT,SSL_R_NO_CERTIFICATE_SET);
>>> @@ -276,6 +278,12 @@
>>>
>>>                        s->init_num=0;
>>>
>>> +                       /* Reflect ClientHello sequence to remain stateless 
>>> while listening */
>>> +                       if (listen)
>>> +                               {
>>> +                               memcpy(s->s3->write_sequence, 
>>> s->s3->read_sequence, sizeof(s->s3->write_sequence));
>>> +                               }
>>> +
>>>                        /* If we're just listening, stop here */
>>>                        if (listen && s->state == SSL3_ST_SW_SRVR_HELLO_A)
>>>                                {
>>>
>>>
>>>
>>>
>>>
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> Development Mailing List                       openssl-dev@openssl.org
>> Automated List Manager                           majord...@openssl.org
>
>
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> Development Mailing List                       openssl-dev@openssl.org
> Automated List Manager                           majord...@openssl.org
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to