[openssl.org #2948] thousands of getpid called inside libcrypto.sl.0.9.8

2013-01-10 Thread Stephen Henson via RT
On Thu Jan 10 15:33:12 2013, meiling...@emc.com wrote: > Hi, > Thank you. > I just notice that the main time consumer is not the > getpid(). > I also found thousands of “FIPS_selftest_failed” during > FIPS mode setup which indeed induce the getpid call. > Is it normal > that FIPS_mode_set(1) needs

OpenSSL RT instance migration

2013-01-10 Thread Lutz Jaenicke
Hi, in the process of upgrading and migrating our server infrastructure I have just put the updated Request Tracker into operation. The request tracker stays reachable via r...@openssl.org (or the alias openssl-b...@openssl.org). While the migration is still in progress, the web interface is tempo

Re: [openssl.org #2937] Handshake performance degradation in 1.0.1 and up.

2013-01-10 Thread Andrey Kulikov via RT
Please find attached two patches, together implementing proper HMAC context re-initialization instead of full re-creation. In comparison to openssl-1.0.1c it gives ~10% handshake performance improvements when some engine-specific MAC are used. In order to apply patches use command patch -p1 -i P

RE: [openssl.org #2948] thousands of getpid called inside libcrypto.sl.0.9.8

2013-01-10 Thread Ge, Meiling via RT
Hi, Thank you. I just notice that the main time consumer is not the getpid(). I also found thousands of “FIPS_selftest_failed” during FIPS mode setup which indeed induce the getpid call. Is it normal that FIPS_mode_set(1) needs 5 seconds to finish? Do you have any idea about the main time consume

Re: [openssl.org #2937] Handshake performance degradation in 1.0.1 and up.

2013-01-10 Thread Andrey Kulikov via RT
On 11 December 2012 04:00, Stephen Henson via RT wrote: > > I also notice that even the original HMAC version initialises two HMAC > contexts with the same key. That could be improved by initialising one > and copying the context across. > > This kind of optimization can be also applied P_hash i

[openssl.org #2955] Bug in documentation: s/EVP_PKEY_verifyrecover/EVP_PKEY_verify_recover/

2013-01-10 Thread Peylo, Martin via RT
Hi, the documented "EVP_PKEY_verifyrecover" and "EVP_PKEY_verifyrecover_init" functions don't exist in 1.0.1c. "EVP_PKEY_verify_recover" seems to be the right spelling. The following commands should fix the issue: $ sed -i 's/EVP_PKEY_verifyrecover/EVP_PKEY_verify_recover/g' doc/crypto/* $ mv do

[openssl.org #2952] Testing new RT instance

2013-01-10 Thread Lutz Jaenicke via RT
This is a test of the upgraded RT for openssl.org Best regards, Lutz __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated L

[openssl.org #2954] [PATCH] avoid memcpy for overlapping regions

2013-01-10 Thread Nickolai Zeldovich via RT
Using memcpy on overlapping regions of memory is undefined behavior in C. In engines/ccgost/gosthash.c, the circle_xor8() function uses memcpy to copy data between the two arrays passed as arguments, but in some cases (e.g., the third call to circle_xor8 in hash_step() in the same file) the two

[openssl.org #2953] s_server to show connection duration and transfer speed

2013-01-10 Thread Andrey Kulikov via RT
Please find attached patch, introducing two new options for s_server: one specify maximum number of connections s_server will accept. It will exit clearly after completing last connection the other tells s_server to show each completed connection duration and data transfer rate. These options exce

OpenSSL EVP Latchups

2013-01-10 Thread GAURAV GUPTA
Hello Members, I think what I am going to discuss is an old problem. But I do not know whether there is fix for this problem or not. 1. OpenSSL EVP has OpenSSL_add_all_ type functions, which are not threadsafe. These when called in multi-threaded environment behaves abnormal , some times lea