Re: [openssl.org #3277] OpenSSL s_client doc missing option

2014-07-03 Thread Ben Laurie
On 2 July 2014 23:17, Rich Salz via RT r...@openssl.org wrote: Fixed, added -servername to the pod file. Looks to me like you've only fixed this (and many others) in master - surely should also go to 1.0.2 at least (and probably older branches, too)? Also, we generally rebase rather than

[openssl.org #2563] Please close this bug; changes have been applied.

2014-07-03 Thread Green, Paul
I just checked-up on my unresolved openssl bugs, and noticed that this suggestion is still open in RT. This report can be closed, because the changes that I requested were applied by Dr. Henson back on December 19, 2011. Thanks PG -- Sr. Technical Consultant, Stratus Technologies, Inc. 111

Re: [openssl.org #3416] PATCH: EVP_EncryptionInit and AES-NI note

2014-07-03 Thread Jeffrey Walton
Since this may in future cover much more than just AES-NI... Good observation Doctor, done. Attached is the updated text. diff --git a/doc/crypto/EVP_EncryptInit.pod b/doc/crypto/EVP_EncryptInit.pod index f6e4396..8d7636c 100644 --- a/doc/crypto/EVP_EncryptInit.pod +++

[openssl.org #3421] PATCH: return appropriate error if RDRAND not available

2014-07-03 Thread noloa...@gmail.com via RT
Currently, ENGINE_load_rdrand will clear the error queue if the engine is loaded; but ENGINE_load_rdrand fails to set an error code if RDRAND is not available. This patch adds a check with an appropriate error code so callers can check for failure. Note: crypto/engine/engine.h only provides a

[openssl.org #3422] Misaligned pointers for buffers cast to an unsigned int* in md32_common.h

2014-07-03 Thread noloa...@gmail.com via RT
Running `make test` with Clang sanitizers results in some issues with unaligned pointers surrounding a use of buffers cast to a unsigned int*. The sanitizers used were `-fsanitize=undefined -fsanitize=address`. I believe the issues flagged below are undefined behavior. ---snip---

[openssl.org #3423] Undefined behavior in crypto/cast/c_enc.c

2014-07-03 Thread noloa...@gmail.com via RT
Running `make test` with Clang sanitizers results in some issues with crypto/cast/c_enc.c. The sanitizers used were `-fsanitize=undefined -fsanitize=address`. I believe the shift issue flagged below are undefined behavior. ---snip--- ../util/shlib_wrap.sh ./casttest c_enc.c:79:2: runtime error:

[openssl.org #3424] Misaligned pointers for buffers cast to a size_t*

2014-07-03 Thread noloa...@gmail.com via RT
Running `make test` with Clang sanitizers results in some issues with unaligned pointers surrounding some uses of buffers cast to a size_t*. The sanitizers used were `-fsanitize=undefined -fsanitize=address`. I believe the issues flagged below are undefined behavior. ---snip--- seed

[openssl.org #3425] Potential padding oracle in evp_enc.c

2014-07-03 Thread noloa...@gmail.com via RT
Around line 519 in evp_enc.c: // Line 519 below if (b 1) { if (ctx-buf_len || !ctx-final_used) { EVPerr(EVP_F_EVP_DECRYPTFINAL_EX,EVP_R_WRONG_FINAL_BLOCK_LENGTH); return(0); } OPENSSL_assert(b = sizeof ctx-final);

Re: OpenSSL roadmap

2014-07-03 Thread Loganaden Velvindron
On Wed, Jul 2, 2014 at 10:42 PM, Salz, Rich rs...@akamai.com wrote: I write fixes for pieces of software that I depend on. Some time ago, I sent a diff for OpenSSL. Great, thanks. If I'm interested in fixing OpenSSL, why shouldn't I have access to coverity scans ? Other Open Source

RE: [openssl.org #3277] OpenSSL s_client doc missing option

2014-07-03 Thread Salz, Rich
Looks to me like you've only fixed this (and many others) in master - surely should also go to 1.0.2 at least (and probably older branches, too)? Okay, tell me which branches. Also, we generally rebase rather than merge... I don't know the difference. But okay, if that's the practice, I'll

RE: OpenSSL roadmap

2014-07-03 Thread Salz, Rich
No, I don't mean to imply that you are one of the bad guys. It's just that we have only one real way of knowing who the good guys are, and that is being part of the development team. Yes, that can be very inconvenient. Trust me, I know, it took more than 10 years for the team to open up and

Re: [openssl.org #3277] OpenSSL s_client doc missing option

2014-07-03 Thread Ben Laurie
On 3 July 2014 12:04, Salz, Rich rs...@akamai.com wrote: Looks to me like you've only fixed this (and many others) in master - surely should also go to 1.0.2 at least (and probably older branches, too)? Okay, tell me which branches. Since this is a bug, all active branches (that it applies to

RE: [openssl.org #3277] OpenSSL s_client doc missing option

2014-07-03 Thread Salz, Rich
Thanks for the explanation. Which are the currently active branches? -- Principal Security Engineer Akamai Technologies, Cambridge, MA IM: rs...@jabber.me; Twitter: RichSalz -Original Message- From: owner-openssl-...@openssl.org [mailto:owner-openssl- d...@openssl.org] On Behalf

Re: [openssl.org #3277] OpenSSL s_client doc missing option

2014-07-03 Thread Viktor Dukhovni
On Thu, Jul 03, 2014 at 07:04:09AM -0400, Salz, Rich wrote: Looks to me like you've only fixed this (and many others) in master - surely should also go to 1.0.2 at least (and probably older branches, too)? Okay, tell me which branches. Also, we generally rebase rather than merge...

Re: OpenSSL roadmap

2014-07-03 Thread Loganaden Velvindron
On Thu, Jul 3, 2014 at 3:10 PM, Salz, Rich rs...@akamai.com wrote: No, I don't mean to imply that you are one of the bad guys. It's just that we have only one real way of knowing who the good guys are, and that is being part of the development team. Yes, that can be very inconvenient.

Re: [PATCH] LibReSSL/OpenSSL: Adjust/remove keysize restrictions

2014-07-03 Thread Hubert Kario
- Original Message - From: Benny Baumann be...@geshi.org To: openbsd-t...@openbsd.org, openssl-dev@openssl.org Sent: Wednesday, 2 July, 2014 8:49:18 PM Subject: [PATCH] LibReSSL/OpenSSL: Adjust/remove keysize restrictions Hi folks, I know the following patches will cause a

RE: [openssl.org #2563] Please close this bug; changes have been applied.

2014-07-03 Thread Salz, Rich
Closed, thanks. -- Principal Security Engineer Akamai Technologies, Cambridge, MA IM: rs...@jabber.memailto:rs...@jabber.me; Twitter: RichSalz

Re: OpenSSL roadmap

2014-07-03 Thread Matt Caswell
On 3 July 2014 13:01, Loganaden Velvindron logana...@gmail.com wrote: On Thu, Jul 3, 2014 at 3:10 PM, Salz, Rich rs...@akamai.com wrote: No, I don't mean to imply that you are one of the bad guys. It's just that we have only one real way of knowing who the good guys are, and that is being

[openssl.org #3426] [OpenSSL] I have a technical question

2014-07-03 Thread 김유식 via RT
Hi, my name is Yousik Kim from Republic of Korea. I use OpenSSL for https function of my security camera web server. Thank you. I have a problem as below. I use fd transfer function in lighttpd web server for video streaming. (Fd transfer is the function that pass client socket to other

Re: OpenSSL roadmap

2014-07-03 Thread Theodore Ts'o
On Thu, Jul 03, 2014 at 04:01:16PM +0400, Loganaden Velvindron wrote: I see such trends as leading to dangerous situations in the future. OpenSSL is widely deployed, and the developers appear to grow older, according to the various interviews I read. (I don't wish to offend any of you guys

Re: [openssl.org #3277] OpenSSL s_client doc missing option

2014-07-03 Thread Ben Laurie
On 3 July 2014 12:21, Salz, Rich rs...@akamai.com wrote: Thanks for the explanation. Which are the currently active branches? OpenSSL_0_9_8-stable OpenSSL_1_0_0-stable OpenSSL_1_0_1-stable OpenSSL_1_0_2-stable master -- Principal Security Engineer Akamai Technologies, Cambridge, MA IM:

[openssl.org #3426] [OpenSSL] I have a technical question

2014-07-03 Thread Stephen Henson via RT
The request tracker should not be used for general user queries. Please direct them to the openssl-users mailing list. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org

Re: OpenSSL roadmap

2014-07-03 Thread Tomas Mraz
On Čt, 2014-07-03 at 09:13 -0400, Theodore Ts'o wrote: However, in the kernel we are much more lax about who gets access to the Coverity project. Part of this is the sure and certain knowledge that the bad guys are quite willing to pay for a Coverity license, and so for us the balance of

Re: OpenSSL roadmap

2014-07-03 Thread Ben Laurie
On 3 July 2014 14:13, Theodore Ts'o ty...@mit.edu wrote: However, in the kernel we are much more lax about who gets access to the Coverity project. Part of this is the sure and certain knowledge that the bad guys are quite willing to pay for a Coverity license, and so for us the balance of

[openssl.org #3194] [PATCH] Provide asn1parse with capability to show raw OIDs

2014-07-03 Thread Stephen Henson via RT
We can't change the parameters of functions at all if we wish to maintain binary compatibility and if we wanted additional ASN.1 parsing flags in future we'd need further functions. An alternative would be to pass an opaque structure with the printing parameters to an extended version of

[openssl.org #3254] PATCH adding option for pbkdf2 and iteration count to the enc command - 1.0.1f

2014-07-03 Thread Stephen Henson via RT
New features are not added to release branches, see: https://www.openssl.org/support/faq.html#MISC8 Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org

[openssl.org #3255] PATCH adding option for pbkdf2 and iteration count to the enc command - 1.0.0.l

2014-07-03 Thread Stephen Henson via RT
New features are not added to release branches, see: https://www.openssl.org/support/faq.html#MISC8 Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org

RE: OpenSSL roadmap

2014-07-03 Thread Salz, Rich
release processes at various distributions. (Given that Microsoft has weekly patch Tuesdays, if even slow moving *Microsoft* can turn around a security update in a week, what's your excuse? :-) They have a regular release train, but it doesn't mean that everything gets fixed in one week.

Re: OpenSSL roadmap

2014-07-03 Thread Ben Laurie
On 3 July 2014 15:28, Salz, Rich rs...@akamai.com wrote: release processes at various distributions. (Given that Microsoft has weekly patch Tuesdays, if even slow moving *Microsoft* can turn around a security update in a week, what's your excuse? :-) They have a regular release train, but

Google Patch rewards updated to include refactoring

2014-07-03 Thread Ben Laurie
https://www.google.com/about/appsecurity/patch-rewards/ Refactorings that make it easier to reason about the security properties of the code. __ OpenSSL Project http://www.openssl.org Development

Re: [PATCH] LibReSSL/OpenSSL: Adjust/remove keysize restrictions

2014-07-03 Thread Kurt Roeckx
On Thu, Jul 03, 2014 at 08:08:52AM -0400, Hubert Kario wrote: - Original Message - From: Benny Baumann be...@geshi.org To: openbsd-t...@openbsd.org, openssl-dev@openssl.org Sent: Wednesday, 2 July, 2014 8:49:18 PM Subject: [PATCH] LibReSSL/OpenSSL: Adjust/remove keysize

[openssl.org #1372] default config should diable idea

2014-07-03 Thread Rich Salz via RT
As the changelog says for 0.9.8, (IDEA remains enabled despite being patented. This is because IDEA is frequently required for interoperability, and there is no license fee for non-commercial use. As before, no-idea can be used to avoid this algorithm.)

[openssl.org #1405] make failed on openssl-0.9.8d

2014-07-03 Thread Rich Salz via RT
very old release, cannot reproduce. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #1409] Openssl Bug report Password protected private key file causes crash in MSVCR80

2014-07-03 Thread Rich Salz via RT
Very old release, cannot reproduce. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #1415] Binary Segmentation fault - Suse Linux - SSL_CTX_new

2014-07-03 Thread Rich Salz via RT
Very old release, cannot reproduce, please re-open ticket if still an issue. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org

[openssl.org #1358] Problem using fips_premain.c with C++ compiler

2014-07-03 Thread Rich Salz via RT
Very old release, and ways to address the issue are described in the ticket. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org

Re: OpenSSL roadmap

2014-07-03 Thread Kurt Roeckx
On Thu, Jul 03, 2014 at 09:13:43AM -0400, Theodore Ts'o wrote: (Given that Microsoft has weekly patch Tuesdays, if even slow moving *Microsoft* can turn around a security update in a week, what's your excuse? :-) As far as I know, patch Tuesday is the 2nd Tuesday of the month. But wikipedia

[openssl.org #1448] [BUG] Incorrect dependencies in SNAP-20061227

2014-07-03 Thread Rich Salz via RT
old release, fixed now. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #1357] Self signed CA issue in version 0.9.8a-16

2014-07-03 Thread Rich Salz via RT
Very old release. Can't reproduce. Work-around (build your own cert with a Locality RDN), closing the ticket. __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #3427] crypto/bio/b_print.c: 2 useless if conditions ?

2014-07-03 Thread Toralf Förster via RT
the latest git tree fro yesterday + the latest git tree of cppcheck yields into these warning : The 2 ifs seems to be superfluous, or ? : if (iplace == sizeof iconvert) iplace--; iconvert[iplace] = 0;--- Array 'iconvert[20]' accessed at index 20, which is out of bounds.

Re: Website Contribution

2014-07-03 Thread Michael Croydon K.
Of course WML is just a tool which generates in the end the HTML, CSS and JS output. And we need a dynamic generation in the background. Pure HTML + CSS is pure pain and a lot worse than the current state. Means a no-go. But WML is a bit outdated and does very likely stopping people from

Re: [openssl.org #3427] crypto/bio/b_print.c: 2 useless if conditions ?

2014-07-03 Thread Kurt Roeckx via RT
On Thu, Jul 03, 2014 at 07:51:19PM +0200, Toralf Förster via RT wrote: the latest git tree fro yesterday + the latest git tree of cppcheck yields into these warning : The 2 ifs seems to be superfluous, or ? : The code before that is: /* convert integer part */ do {

Re: [openssl.org #3428] bug report : crypto/des/ofb64enc.c: Uninitialized variable: d

2014-07-03 Thread Kurt Roeckx via RT
On Thu, Jul 03, 2014 at 07:51:28PM +0200, Toralf Förster via RT wrote: I think cppcheck is right here in void DES_ofb64_encrypt(), line 84, 85 and 96, or ?: The line before that: dp=d; l2c(v0,dp);--- Uninitialized variable: d l2c(v1,dp);--- Uninitialized variable: d

[openssl.org #1554] Bug Report 0.9.8e: OpenVMS apps/makeApps.com

2014-07-03 Thread Rich Salz via RT
Old release, can't reproduce, hopefully fixed by now. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

Windows mingw status for snapshot-20140703 OK

2014-07-03 Thread dcruette
Hello Status for snapshot-20140703 perl .\Configure mingw : Ok make depend : Ok make speed.c:318:4 format '%d' expect 'int' but DWORD bntest.c:1949:5 format '%d' expect 'long int' but 'unsigned int' global make Ok Didier

[openssl.org #1772] Bug: Failure in 'make test' for OpenSSL 9.8g :Configured for 386 on linux-x86_64

2014-07-03 Thread Rich Salz via RT
very old release, works now. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #1749] OpenSSL 0.9.8i and WinCrypt.h

2014-07-03 Thread Rich Salz via RT
Someone already did it. Thank you, mysterious stranger. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

Re: [openssl.org #3428] bug report : crypto/des/ofb64enc.c: Uninitialized variable: d

2014-07-03 Thread Ben Laurie
On 3 July 2014 20:06, Kurt Roeckx via RT r...@openssl.org wrote: On Thu, Jul 03, 2014 at 07:51:28PM +0200, Toralf Förster via RT wrote: I think cppcheck is right here in void DES_ofb64_encrypt(), line 84, 85 and 96, or ?: The line before that: dp=d; l2c(v0,dp);---

[openssl.org #1796] Bug in openssl 0.9.8?

2014-07-03 Thread Rich Salz via RT
Requestor has a misunderstanding: ENOTCONN means not connected, and that is not a retry for nonblocking reasons kind of thing. __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #1762] Feature request

2014-07-03 Thread Rich Salz via RT
Sorry it took so long to get back to you: no, we have no plans to support that hardware crypto card. __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #1839] Patch to correct two build issues

2014-07-03 Thread Rich Salz via RT
old release, unsupported platform, please update ticket if still an issue. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated

[openssl.org #1836] a problem

2014-07-03 Thread Rich Salz via RT
old release, various CVE fixes have touched this area, can't reproduce, closing the ticket. __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #1842] OpenSSL Memory Leak

2014-07-03 Thread Rich Salz via RT
Insufficient information to reproduce the problem, and a very old release. closing the ticket. __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #2184] patch for openssl-0.9.8m on haiku

2014-07-03 Thread Rich Salz via RT
old release, unsupported platform (albeit with a very cool name), can't reproduce, closing ticket. __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #2142] [BUG] missing ssize_t definition in VCWIN-32

2014-07-03 Thread Rich Salz via RT
someone fixed it. Probably DrH __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #2079] Mismatch in makefiles - compilation error on cygwin

2014-07-03 Thread Rich Salz via RT
builds now. time flies. or is it time heals all builds? __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #2116] [OpenSSL 0.9.8k] client auth : Exit: error in SSLv3 read client hello A

2014-07-03 Thread Rich Salz via RT
somebody fixed something, not sure hwne. but old release old ticket and we'd have heard if it was still broken. __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #2168] 0.9.8m-beta1 tests.

2014-07-03 Thread Rich Salz via RT
old release, can't reproduce, closing ticket. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #2151] MGF1 not exported in 1.0.0

2014-07-03 Thread Rich Salz via RT
We didn't promise portability acrouss 0.9.8 and 1.0.0. But I don't see any static functions in crypto/rsa/rsa_oaep.c anyway so maybe we fixed it. __ OpenSSL Project http://www.openssl.org

[openssl.org #677] bug report - Memory leak in DSA_free() call.

2014-07-03 Thread Rich Salz via RT
old release, can't reproduce, closing ticket. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #705] PATCH FreeBSD osver.h

2014-07-03 Thread Rich Salz via RT
fencepost error in checking version that was old ten years ago. closing ticket. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org

[openssl.org #609] OpenSSL does not work with /dev/[u]random on HPUX 11i

2014-07-03 Thread Rich Salz via RT
very old release, very old platform, cannot reproduce. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #673] PATCH: new --exec-prefix feature 0.9.7b ATTACHED

2014-07-03 Thread Rich Salz via RT
We have INSTALL_PREFIX and INSTALLTOP and don't provide separate exec and shared prefixes. Closing ticket. __ OpenSSL Project http://www.openssl.org Development Mailing List

Re: [openssl.org #3428] bug report : crypto/des/ofb64enc.c: Uninitialized variable: d

2014-07-03 Thread Kurt Roeckx
On Thu, Jul 03, 2014 at 09:28:47PM +0100, Ben Laurie wrote: On 3 July 2014 20:06, Kurt Roeckx via RT r...@openssl.org wrote: On Thu, Jul 03, 2014 at 07:51:28PM +0200, Toralf Förster via RT wrote: I think cppcheck is right here in void DES_ofb64_encrypt(), line 84, 85 and 96, or ?: The

[openssl.org #3415] Bug report: Uninitialized memory reads reported by valgrind for ECDSA signatures

2014-07-03 Thread Matt Caswell via RT
I've done some digging on this and its kind of interesting. What is happening is that the code is calling the BN_consttime_swap function. This takes a condition variable and two BIGNUMs a and b, and swaps the value of a and b over if the condition is set. Inside a BIGNUM structure there is a

RE: [openssl.org #3415] Bug report: Uninitialized memory reads reported by valgrind for ECDSA signatures

2014-07-03 Thread Salz, Rich
Why not just have bn_expand_internal call memset? ; git diff bn_lib.c diff --git a/crypto/bn/bn_lib.c b/crypto/bn/bn_lib.c index b1e224b..86d1d37 100644 --- a/crypto/bn/bn_lib.c +++ b/crypto/bn/bn_lib.c @@ -324,6 +324,9 @@ static BN_ULONG *bn_expand_internal(const BIGNUM *b, int words)

Re: [PATCH] LibReSSL/OpenSSL: Adjust/remove keysize restrictions

2014-07-03 Thread Wilfried Klaebe
Am Thu, Jul 03, 2014 at 07:20:46PM +0200 schrieb Kurt Roeckx: On Thu, Jul 03, 2014 at 08:08:52AM -0400, Hubert Kario wrote: - Original Message - From: Benny Baumann be...@geshi.org To: openbsd-t...@openbsd.org, openssl-dev@openssl.org Sent: Wednesday, 2 July, 2014 8:49:18 PM

Re: [PATCH] LibReSSL/OpenSSL: Adjust/remove keysize restrictions

2014-07-03 Thread Kurt Roeckx
On Thu, Jul 03, 2014 at 11:42:08PM +0200, Wilfried Klaebe wrote: Am Thu, Jul 03, 2014 at 07:20:46PM +0200 schrieb Kurt Roeckx: On Thu, Jul 03, 2014 at 08:08:52AM -0400, Hubert Kario wrote: - Original Message - From: Benny Baumann be...@geshi.org To: openbsd-t...@openbsd.org,

Re: [openssl.org #2184] patch for openssl-0.9.8m on haiku

2014-07-03 Thread Scott McCreary via RT
Seeing as this was a four year old ticket, a few things have changed since it was filed. Here's our current repo for haikuports where you can see our latest patches. I suspect most of the patch would be taken care of by updating the Haiku entries in openssl's config.

[openssl.org #1481] Cipher selection patch (AES/CAMELLIA-128 vs. AES/CAMELLIA-256)

2014-07-03 Thread Rich Salz via RT
Says Viktor: 1481 was resolved by Bodo Moeller and me, quite some time ago, and can be closed. Also Postfix works around this for older releases. __ OpenSSL Project http://www.openssl.org