[openssl.org #3451] patch for x509.c

2014-07-15 Thread Richard Levitte via RT
I do like the idea, and definitely see the need for this. A nit pick, though '-valid' as a option name is a bit confusing, I'd personally expect it to take a full blown time argument -- something like DDD-HH:MM -- and not just hours and minutes. Maybe '-time' or something like that. That or

Re: [openssl.org #3451] patch for x509.c

2014-07-15 Thread Jan Just Keijser
Hi Richard, On 15/07/14 10:56, Richard Levitte via RT wrote: I do like the idea, and definitely see the need for this. A nit pick, though '-valid' as a option name is a bit confusing, I'd personally expect it to take a full blown time argument -- something like DDD-HH:MM -- and not just

Re: [openssl.org #3451] patch for x509.c

2014-07-15 Thread Jan Just Keijser via RT
Hi Richard, On 15/07/14 10:56, Richard Levitte via RT wrote: I do like the idea, and definitely see the need for this. A nit pick, though '-valid' as a option name is a bit confusing, I'd personally expect it to take a full blown time argument -- something like DDD-HH:MM -- and not just

Re: [openssl.org #3451] patch for x509.c

2014-07-15 Thread Felix Laurie von Massenbach
On 15 Jul 2014 11:06, Jan Just Keijser via RT r...@openssl.org wrote: Hi Richard, On 15/07/14 10:56, Richard Levitte via RT wrote: I do like the idea, and definitely see the need for this. A nit pick, though '-valid' as a option name is a bit confusing, I'd personally expect it to

[openssl.org #3449] [BUG] DTLS: ECC extensions not sent (1.0.1h)

2014-07-15 Thread Stephen Henson via RT
Fixed now. Let me know of any problems. Thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project

[openssl.org #3453] [BUG] s_server: -www Co break DTLS connections

2014-07-15 Thread Stephen Henson via RT
Since these options aren't supported with DTLS they now return an error message. Thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org

RE: [openssl.org #3451] patch for x509.c

2014-07-15 Thread Salz, Rich
The Globus syntax is strange. :) We should support the ISO date/time standard, and use that throughout and not invent yet another syntax, or yet another flag. It's fairly simple to parse, and handles timezones, relative times, date/time mixing, and so on. The XML XSD spec, for example, has a

RE: [openssl.org #3451] patch for x509.c

2014-07-15 Thread Salz, Rich via RT
The Globus syntax is strange. :) We should support the ISO date/time standard, and use that throughout and not invent yet another syntax, or yet another flag. It's fairly simple to parse, and handles timezones, relative times, date/time mixing, and so on. The XML XSD spec, for example, has a

Re: [openssl.org #3451] patch for x509.c

2014-07-15 Thread Daniel Kahn Gillmor via RT
On 07/15/2014 07:58 AM, Salz, Rich via RT wrote: The Globus syntax is strange. :) We should support the ISO date/time standard, and use that throughout and not invent yet another syntax, or yet another flag. It's fairly simple to parse, and handles timezones, relative times, date/time

[openssl.org #2077] openssl 1.0.0 stable does not print all digests with help

2014-07-15 Thread Rich Salz via RT
This will be fixed in a release after 1.0.2. All commands get a -help (also --help), and the list of ciphers and digests is now consistent. It says any supported cipher And you can find those via openssl list-message-digest-algorithms

How to send SSLv3 client-hello by using SSLv23_method

2014-07-15 Thread sanju
How to send SSLv3 client-hello by using SSLv23_method? I don't want to disable any protocol except SSLv2 don't want to use SSLv3_method. __ OpenSSL Project http://www.openssl.org Development

[openssl.org #3454] remove OPENSSL_SYS_WIN constraint for EC_GFp_nistp224_method()

2014-07-15 Thread Support via RT
Hi, Currently (14-07-2014, commit f8571ce82) the master branch doesn't compile on Windows (mingw64) when using the enable-ec_nistp_64_gcc_128 option. The same option does work however on the OpenSSL_1_0_2-stable branch. This is due to a small difference in the file crypto/ec/ec.h. On

[openssl.org #3456] PATCH: fix typo in pem.pod

2014-07-15 Thread noloa...@gmail.com via RT
EVP_bytestokey - EVP_BytesToKey Added SEE ALSO section with links to EVP_get_cipherbyname and EVP_BytesToKey. * $ git diff doc/crypto/pem.pod diff --git a/doc/crypto/pem.pod b/doc/crypto/pem.pod index 54414a3..21e9fe3 100644 --- a/doc/crypto/pem.pod +++ b/doc/crypto/pem.pod @@ -450,9 +450,9

[openssl.org #3457] Possible Bugs in EVP_KeyToBytes?

2014-07-15 Thread noloa...@gmail.com via RT
Below is from crypto/evp/evp_key.c. Notice that `addmd` is never set to 1. *If* the routine needs to loop back to the top to finish fulfilling a derivation request, then the previous hash is *not* added back into the computation. That is, this is never executed: if (addmd++)

[openssl.org #3455] Compile error on Tandem NonStop (including patch)

2014-07-15 Thread Johnson, Wayne via RT
While compiling OpenSSH 1.0.1h on Nonstop (the OS for Tandem machines) I received the following error: c89 -DMONOLITH -I.. -I../include -Ww -D__TANDEM -D_XOPEN_SOURCE -D_XOPEN_SOURCE_EXTENDED=1 -D_TANDEM_SOURCE -DB_ENDIAN -c -o ca.o ca.c #include sys/file.h ^

Re: [openssl.org #3451] patch for x509.c

2014-07-15 Thread Jan Just Keijser via RT
On 15/07/14 15:20, Daniel Kahn Gillmor wrote: On 07/15/2014 07:58 AM, Salz, Rich via RT wrote: The Globus syntax is strange. :) We should support the ISO date/time standard, and use that throughout and not invent yet another syntax, or yet another flag. It's fairly simple to parse, and

[openssl.org #3452] PSK and -Verify: discrepancy between TLS and DTLS

2014-07-15 Thread Stephen Henson via RT
Fixed now. Thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project

Re: [openssl.org #3457] Possible Bugs in EVP_KeyToBytes?

2014-07-15 Thread Marcus Meissner
On Tue, Jul 15, 2014 at 07:31:59PM +0200, noloa...@gmail.com via RT wrote: Below is from crypto/evp/evp_key.c. Notice that `addmd` is never set to 1. *If* the routine needs to loop back to the top to finish fulfilling a derivation request, then the previous hash is *not* added back into the