Patch applied. Thanks.
Note that actually all of these are bogus warnings. In none of the instances
fixed was there an actual code path which resulted in an uninitialised variable
being used - it's just that the compiler was unable to figure that out and so
issues spurious warnings.
Matt
This ticket was opened in error. Closing.
Matt
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Looks like this patch was applied some time ago in commit
83a3af9f4e61170afad6f79f161fad8245ae1f95. Closing this ticket.
Matt
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
The MTU logic has been extensively revised since this ticket was raised so I am
assuming this is no longer an issue. If that's not the case please reopen this
ticket.
Closing.
Matt
___
openssl-dev mailing list
To unsubscribe:
I don't believe this is the case any more. Closing this ticket.
Matt
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
The ECDH callback needs to query the server's certificate to discover
the EC group being used. The callback can then return a temporary key
in the field.
It looks like SSL_get_certificate can be used for the purpose.
SSL_get_certificate is used in apps/s_cb.c, but there's no
documentation for it.
Not enough information in this ticket to track down the problem. I'm assuming
that by now you've resolved this issue. If not please send further details to
the openssl-users mailing list. Closing this ticket.
Matt
___
openssl-dev mailing list
To
Hello Viktor,
On Wednesday, May 6, 2015, Viktor Dukhovni openssl-us...@dukhovni.org
wrote:
On Wed, May 06, 2015 at 08:33:37PM +0300, Dmitry Belyavsky wrote:
I would like to suggest a small patch providing the necessary check
for
RSA_METHOD_FLAG_NO_CHECK here.
I am not convinced
Hello Victor,
On Wed, May 6, 2015 at 7:10 PM, Viktor Dukhovni openssl-us...@dukhovni.org
wrote:
On Wed, May 06, 2015 at 05:58:31PM +0200, Dmitry Belyavsky via RT wrote:
It seems to me there is a bug in the SSL_CTX_check_private_key function.
The function ignores RSA_METHOD_FLAG_NO_CHECK
On Wed, May 06, 2015 at 08:33:37PM +0300, Dmitry Belyavsky wrote:
I would like to suggest a small patch providing the necessary check for
RSA_METHOD_FLAG_NO_CHECK here.
I am not convinced this change is correct. The function would then
not do what it is supposed to do. The flag
On Wed, May 06, 2015 at 05:58:31PM +0200, Dmitry Belyavsky via RT wrote:
It seems to me there is a bug in the SSL_CTX_check_private_key function.
The function ignores RSA_METHOD_FLAG_NO_CHECK flag and always tries to
check public/private key match.
I think that's deliberate and correct.
Hello Openssl team,
It seems to me there is a bug in the SSL_CTX_check_private_key function.
The function ignores RSA_METHOD_FLAG_NO_CHECK flag and always tries to
check public/private key match.
The only place in real code where this function is used is in
the set_cert_key_stuff function, just
12 matches
Mail list logo