[openssl-dev] [openssl.org #3767] Enhancement: Use PNG instead of GIF

2015-03-27 Thread Fred .Flintstone via RT
/usr/share/doc/openssl/openssl_button.gif GIF is an outdated old legacy file format. Please convert it to the modern PNG file format. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3767] AutoReply: Enhancement: Use PNG instead of GIF

2015-03-27 Thread Fred .Flintstone via RT
You are right, it is not a bug. It was failed as an enhancement, like a feature request. On Fri, Mar 27, 2015 at 9:38 AM, The default queue via RT r...@openssl.org wrote: Greetings, This message has been automatically generated in response to the creation of a trouble ticket regarding:

Re: [openssl-dev] [openssl.org #3767] Enhancement: Use PNG instead of GIF

2015-03-27 Thread Fred .Flintstone via RT
You are right, it is not a bug. It was failed as an enhancement, like a feature request. On Fri, Mar 27, 2015 at 1:19 PM, Rich Salz via RT r...@openssl.org wrote: not a source code bug. not really a bug, even. -- Rich Salz, OpenSSL dev team; rs...@openssl.org

[openssl-dev] [openssl.org #3767] Enhancement: Use PNG instead of GIF

2015-03-27 Thread Rich Salz via RT
not a source code bug. not really a bug, even. -- Rich Salz, OpenSSL dev team; rs...@openssl.org ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3768] [BUG] using s_server with ECDHE-RSA is broken on OpenSSL 1.0.1m

2015-03-27 Thread Linsell, StevenX via RT
When testing s_server/s_client with ECDHE-RSA based ciphers - with any protocol version - on the OpenSSL 1.0.1m release - on x86_64 Fedora 16 the handshake fails with: 140305461679776:error:1408A0C1:SSL routines:SSL3_GET_CLIENT_HELLO:no shared cipher:s3_srvr.c:1389: Example commands:

Re: [openssl-dev] s3_clnt.c changes regarding external pre-shared secret seem to break EAP-FAST

2015-03-27 Thread Emilia Käsper
John, Erik, https://github.com/openssl/openssl/pull/250 Can you verify whether this resolves the problem? (And also, does not create any new problems.) Note this is pending team review so is not a definitive fix. But since we're maintaining this feature more or less blind, we'd appreciate your

Re: [openssl-dev] [openssl.org #3765] AutoReply: [BUG] Crash in PEM write functions with generated EC_KEY on Windows

2015-03-27 Thread Julien Kauffmann via RT
Follow up: apparently the problem seems to go away if I add: ::EC_KEY_set_asn1_flag(private_key-pkey.ec, OPENSSL_EC_NAMED_CURVE); Before the call. Sadly, I'm facing a similar with the reverse operation (loading EC_KEY from memory/file) using PEM_read_bio_EC_PUBKEY() when the generated key

Re: [openssl-dev] s3_clnt.c changes regarding external pre-shared secret seem to break EAP-FAST

2015-03-27 Thread Erik Tkal
Hi Emelia, I’m not sure that will work as presently designed, as it keys off of the session object: -if (s-version = TLS1_VERSION s-tls_session_secret_cb) { +if (s-version = TLS1_VERSION s-tls_session_secret_cb +s-session-tlsext_tick) { Our client uses the public API

Re: [openssl-dev] s3_clnt.c changes regarding external pre-shared secret seem to break EAP-FAST

2015-03-27 Thread Brian Smith
Erik Tkal etks...@gmail.com wrote: In order for EAP-FAST to work it seems that if the client does have a tls_session_secret that s-hit must NOT be set since there is no indication in the serverHello as to whether the session_ticket sent by the client is accepted by the server (the

Re: [openssl-dev] s3_clnt.c changes regarding external pre-shared secret seem to break EAP-FAST

2015-03-27 Thread Brian Smith
Brian Smith br...@briansmith.org wrote: Although the RFC4851 (an informational RFC documenting EAP-FAST) does not require the server to send the session ticket extension during resumption, it is based on RFC4507/RFC5077 (which are on the standards track), which *does* require the server to