Hello, sorry for my poor english, i installed both 1.0.1e and 1.0.1f
version of openssl but in both versions the cipher
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
does not exists.
I found only EDH-DSS-DES-CBC3-SHA so connections with explorer 8 and
cipher suite
Lines 612 through 615 of rsa_pmeth.c apparently contain duplicated lines:
Line 612:
else if (!strcmp(value, oeap))
pm = RSA_PKCS1_OAEP_PADDING;
else if (!strcmp(value, oaep))
pm = RSA_PKCS1_OAEP_PADDING;
This appears
make problem on ppc tiger 10.4. Regardless, some of the tests run OK.
Crash report attached.
Openssl 1.0.0k installed.
Thanks for help.
**
Host Name: mweinles-powerbook-g4-15
Date/Time: 2014-01-09 18:36:32.121 -0800
OS Version: 10.4.11 (Build 8S165)
Report Version: 4
---
crypto/srp/srp_lib.c | 27 ---
1 files changed, 20 insertions(+), 7 deletions(-)
diff --git a/crypto/srp/srp_lib.c b/crypto/srp/srp_lib.c
index 18d1bb9..a95fb0e 100644
--- a/crypto/srp/srp_lib.c
+++ b/crypto/srp/srp_lib.c
@@ -82,6 +82,7 @@
static BIGNUM
On Pá, 2014-01-10 at 09:53 +0100, Paul Suhler via RT wrote:
Lines 612 through 615 of rsa_pmeth.c apparently contain duplicated lines:
Line 612:
else if (!strcmp(value, oeap))
pm = RSA_PKCS1_OAEP_PADDING;
else if (!strcmp(value, oaep))
Hi,
I am facing a deadlock issue on openssl1.0.1e. Please see the stack below.
Could anyone advise if this is a known bug? Is there any workaround/fix? I am
not sure if FIPS is enabled, as the system is not accessible to me yet. I shall
confirm it.
(gdb) bt full
#0 __lll_lock_wait () at
On Wed, 18 Dec 2013 23:42:08 +0100 Stephen Henson via RT wrote:
Many thanks for that info. I think I've traced the cause of the thing
now with that clue. It might have security implications (DoS only
though) so I'll keep any further details off the public mailing lists.
This is now covered by
Fixed in 1.0.1f and 1.0.0l:
http://www.openssl.org/news/vulnerabilities.html#2013-6450
th.
__
OpenSSL Project http://www.openssl.org
Development Mailing List
On 10 January 2014 06:41, Florian Zumbiehl via RT r...@openssl.org wrote:
Hi,
The fix is to change || in the above code to . Then, the
command-line parameters are used to set the certificate path, and if
that fails, the defaults are used instead. This then gives the
while the behaviour
With this patch, I am afraid in case of error, the context will not be
cleaned up.
Shouldn't the line :
EVP_MD_CTX_cleanup(ctxt);
be moved inside the 'err:' block ?
Le 10/01/2014 09:54, Florian Zumbiehl via RT a écrit :
---
crypto/srp/srp_lib.c | 27 ---
1 files
Tomas pointed out the oeap vs. oaep difference. And now you have to
support the typo forever. Sigh.
Paul
-Original Message-
From: owner-openssl-...@openssl.org [mailto:owner-openssl-...@openssl.org] On
Behalf Of Paul Suhler via RT
Sent: Friday, January 10, 2014 00:54
Cc:
On Tue Jan 07 09:26:35 2014, z...@polarhome.com wrote:
Hello,
Thank you for releasing 1.0.0l and 1.0.1f.
I tested them right away (that I haven't done for more than a year) found
that there are needed some changes in order to make the it work under
OpenVMS.
Thanks for the report. Is there
From: Stephen Henson via RT r...@openssl.org
Thanks for the report. Is there some way you can generate diff files in a=
more
standard form? [...]
Date: Wed, 12 Aug 2009 14:05:10 -0500 (CDT)
From: sms@antinode-info (Steven M. Schweda)
Subject: Re: OpenSSL 1.0.0 beta3 release v. VMS
[...]
Hello,
Sure, it is possible.
Thank you Stephen for reminding me for gnu diff from antinode.info
I am happy to use it.
Patches for 1.0.0l
SYSTEM@ia64$ mc dka0:utilgdiff.exe [.ssl]ssl-lib.com;1
[.ssl]ssl-lib.com;4
217c217
On Sat, Jan 11, 2014, Zoltan Arpadffy wrote:
SYSTEM@ia64$ mc dka0:utilgdiff.exe -u [.ssl]ssl-lib.com;1
[.ssl]ssl-lib.com;4
--- [.ssl]ssl-lib.com;1 Mon Jan 6 16:00:58 2014
+++ [.ssl]ssl-lib.com;4 Mon Jan 6 22:03:46 2014
@@ -214,7 +214,7 @@
$! Define The Different SSL library Files.
$!
15 matches
Mail list logo