[openssl.org #1928] interface bug on Windows 64

2009-05-13 Thread Sjoerd Mullender via RT
On Windows, the socket function returns a value of type SOCKET (i.e. *not* int). On 64 bit Windows (at least, Windows XP x64), SOCKET is defined as unsigned __int64. Sockets have to be passed to the openssl library using the call SSL_set_fd. This functions accepts an int to pass the socket

All active branches pass on OpenVMS! :-)

2009-05-13 Thread Richard Levitte
-c.liu.se said: levitte OPENSSL-SNAP-20090513 : PASSED levitte OPENSSL-1_0_0-STABLE-SNAP-20090513 : PASSED levitte OPENSSL-0_9_8-STABLE-SNAP-20090513 : PASSED -- Richard Levitte rich...@levitte.org http://richard.levitte.org/ Life

[openssl.org #1922] [PATCH] DTLS Timer Bug

2009-05-13 Thread Stephen Henson via RT
[seggelm...@fh-muenster.de - Tue May 12 16:44:34 2009]: I have updated the last patch, considering the suggestions of Daniel Mentz. The previous solutions were done in the BIO object, which was not a good choice. Additionally they didn't allow non-blocking sockets to be used.

[openssl.org #1921] DTLS: openssl s_client broken in 1.0.0-beta2 due to lack of ECDHE support

2009-05-13 Thread Stephen Henson via RT
[danie...@sent.com - Thu May 07 12:40:28 2009]: I hope that somebody can fix that problem or at least print out a log message saying No DTLS support for ECDHE This looks like this bit of DTLS code hasn't been updated for 1.0.0 . The code in question looks like it is similar (identical?)

RE: [openssl.org #1924] Resolved: [patch] Fix refs to _POSIX_C_SOURCE

2009-05-13 Thread Green, Paul via RT
Thanks for applying this patch, as well as others, on my behalf. PG __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List

[openssl.org #1922] [PATCH] DTLS Timer Bug

2009-05-13 Thread Robin Seggelmann via RT
This patch is broken due to line wrap issues. Try a plain text attachment or if that fails a gziped one. Ok, let's try a plain text attachment... Some of the changes break source compatibility with previous versions of the patch. That's ok for now but once this stuff appears in a

Re: [openssl.org #1922] [PATCH] DTLS Timer Bug

2009-05-13 Thread Tomas Mraz
On Wed, 2009-05-13 at 16:08 +0200, Robin Seggelmann via RT wrote: This patch is broken due to line wrap issues. Try a plain text attachment or if that fails a gziped one. Ok, let's try a plain text attachment... Some of the changes break source compatibility with previous versions

[openssl.org #1922] [PATCH] DTLS Timer Bug

2009-05-13 Thread Stephen Henson via RT
[seggelm...@fh-muenster.de - Wed May 13 16:08:12 2009]: This patch is broken due to line wrap issues. Try a plain text attachment or if that fails a gziped one. Ok, let's try a plain text attachment... OK that's better but the patch doesn't apply cleanly to 1.0.0-stable: getting

[openssl.org #1665] Contribution of aes.pod

2009-05-13 Thread Green, Paul via RT
I wrote and submitted a documentation file for the OpenSSL AES routines a 13 months ago. I was studying the code and thought I could be helpful to the project. I believe that the file I wrote was entirely accurate at the time of the submission. However, no one has taken the ticket or commented

[openssl.org #1921] DTLS: openssl s_client broken in 1.0.0-beta2 due to lack of ECDHE support

2009-05-13 Thread Stephen Henson via RT
[steve - Wed May 13 14:29:35 2009]: [danie...@sent.com - Thu May 07 12:40:28 2009]: I hope that somebody can fix that problem or at least print out a log message saying No DTLS support for ECDHE This looks like this bit of DTLS code hasn't been updated for 1.0.0 . The code in

Re: All active branches pass on OpenVMS! :-)

2009-05-13 Thread Steven M. Schweda
From: Richard Levitte rich...@levitte.org I just had the latest snapshots built, and all of them pass on OpenVMS Alpha V8.3 using HP C V7.1-015 and the TCP/IP libraries from HP TCP/IP Services for OpenVMS Alpha Version V5.6. I'll ask one more time: Any chance that you've looked at the

Re: select before SSL_read call

2009-05-13 Thread Sudarshan Soma
I have added SSL_pending after select call just to ensure that data is even not present in SSL buffers, incase select returns no data. Should i add the same login for SSL_ERROR_WANT_READ: SSL_ERROR_WANT_WRITE and then do a SSL_read. Please advice. Regards, Pavan On Tue, May 12, 2009 at 8:00

RE: select before SSL_read call

2009-05-13 Thread David Schwartz
Sudarshan Soma wrote: I have added SSL_pending after select call just to ensure that data is even not present in SSL buffers, incase select returns no data. That just makes more work for you. Unless you have some good reason not to, you should just call SSL_read. If there is data already

Re: [openssl.org #1922] [PATCH] DTLS Timer Bug

2009-05-13 Thread Robin Seggelmann via RT
OK that's better but the patch doesn't apply cleanly to 1.0.0-stable: getting rejects in bss_dgram.c Oh, I was still using beta 2 to create the patches and haven't noticed the changes you made in the meantime. Here is a new version attached. It was the change of the name of