[openssl.org #3501] Re: [PATCH] s_server.c: fix typos.

2014-08-30 Thread Rich Salz via RT
Fixed in https://github.com/akamai/openssl/tree/rsalz-monolith/apps for a post-1.0.2 release commit 8a5466bd0fbfd3131ae5f5f93d35cfa77c979a2f Author: Kurt Cancemi Date: Fri Aug 22 17:03:24 2014 -0400 PR3501: Typo's in s_server help text. Fixed help text for -crl_check and -crl_check_all -- Ri

[openssl.org #2324] convert c_rehash from perl to POSIX shell

2014-08-30 Thread Rich Salz via RT
Quietly re-rejecting this. the longer-term plan is the C version builtin to the openssl command. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@

Re: [openssl.org #3471] [PATCH] md5-asm-aarch64-29regs

2014-08-30 Thread Andy Polyakov via RT
Hi, > I would like to submit a patch for md5 calculation on aarch64 architectures. First of all we have to recognize that MD5 is effectively dead and therefore implementing it in assembly is basically just a useful exercise. This doesn't mean rejection, it only affects the priority. And now to th

RE: [openssl.org #2990] Bug Report:openssl timezone issue

2014-08-30 Thread Salz, Rich
Not according to the PKIX RFC 5280 CAs conforming to this profile MUST always encode certificate validity dates through the year 2049 as UTCTime; certificate validity dates in 2050 or later MUST be encoded as GeneralizedTime. Conforming applications MUST be able to process validity date

[openssl.org #2119] Patch for dgst Man Page

2014-08-30 Thread Rich Salz via RT
HEAD d1bea96 RT2119,3407: Updated to dgst.pod OpenSSL_1_0_1-stable c211921 RT2119,3407: Updated to dgst.pod OpenSSL_1_0_2-stable 6aa9dba RT2119,3407: Updated to dgst.pod Author: Rich Salz Date: Thu Aug 28 19:11:42 2014 -0400 RT2119,3407: Updated to dgst.pod Re-order algorithm list. Be consiste

Re: AES_cbc_encrypt & aesni_cbc_encrypt length parameter

2014-08-30 Thread Andy Polyakov
Hi, > I was absolutely sure that parameters of all AES functions are > equivalent in all implementations. First of all you have to recognize that aesni_*, vpaes_* and alike are *private* interfaces. Private to EVP and therefore have to fulfill only EVP's requirements. > However, I found that > A

[openssl.org #1941] Missing man page: c_rehash(3ssl)

2014-08-30 Thread Rich Salz via RT
OpenSSL_1_0_0-stable 62ca466 RT2379: Bug in BIO_set_accept_port.pod OpenSSL_1_0_1-stable 22387f0 RT1941: c_rehash.pod is missing OpenSSL_1_0_2-stable c1071ab RT1941: c_rehash.pod is missing HEAD cf2239b RT1941: c_rehash.pod is missing Author: James Westby Date: Thu Aug 14 10:14:35 2014 -0400

RE: [openssl.org #2451] [PATCH] Enhancement: Telnet START_TLS in s_client

2014-08-30 Thread Salz, Rich
Right, oops. Thanks ; git show b56d251 commit b56d251ad332edae0d252816b7c21548c85a1007 Author: David Michael Date: Sat Aug 30 09:43:06 2014 -0400 RT2451: I switched the cascading if/else-if to a switch and missed a break statement; David caught it. diff --git a/apps/s_client.c b/

Re: [openssl.org #2451] [PATCH] Enhancement: Telnet START_TLS in s_client

2014-08-30 Thread David Michael via RT
Hi, On Fri, Aug 29, 2014 at 1:47 PM, Rich Salz via RT wrote: > Fixed in rsalz-monolith branch of akamai/openssl fork on github. > To be part of post-1.0.2. Thanks! Great. > commit 0223322b17f50f2e46c072e4d1cdd2e82426260d I checked this commit, and it looks like PROTO_XMPP's case is missing a b