1.0.1 only gets security fixes now.
might be fixed in 1.0.2
definitely fixed in 1.1
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
DKG,
any chance you can refresh your 1.0.2 patch? I'm interested in being able to
accept the common names but not changing the output for compatibility..
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Re-thinking about this a bit more, OpenSSL doesn't do any key-usage
verification of things when it does signatures.
So I am closing this ticket.
As a work-around, verifying the signature and usage of the signed data maybe?
(If someone wants to do a PR to fix this, great.)
--
Rich Salz, OpenSSL dev
For OpenSSL 1.0.2f
In crypto\modes\asm\aesni-gcm-x86_64.pl:
Registers are saved like this:
___
$code.=<<___ if ($win64);
lea -0xa8(%rsp),%rsp
movaps %xmm6,-0xd8(%rax)
movaps %xmm7,-0xc8(%rax)
movaps %xmm8,-0xb8(%rax)
movaps %xmm9,-0xa8(%rax)
Believed fixed. Also see https://github.com/openssl/openssl/pull/451
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
fixed in master. finally :)
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
EVP_PKEY_bits works, and as we're moving to EVP as the main public interface,
nothing more to be done.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Please see https://github.com/openssl/openssl/pull/451 which is what we'll be
doing for threads moving forward
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Please see https://github.com/openssl/openssl/pull/451 which is what we'll be
doing for threads moving forward
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry it took so long to get to this. We're only doing security fixes for 1.0.1
now. Closing.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
0.9.8 not supported, please re-test and re-open if still an issue on current
releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
not a bug.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Are these issues still present in the current releases(s)? If so, please open a
new ticket.
The 1.0.1 release only gets security fixes now.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
Also the build system in changed in master.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
No reply, cannot reproduce the bug, closing the ticket.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
this sounds like a windows display issue, not an openssl issue.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Fixed in master.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
Believed all in now :)
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
not an openssl issue, closing ticket.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
believed fixed; 1.0.1 only gets security fixes now.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
sorry we diddn't get to this sooner.
we're only taking 1.0.1 security fixes now.
and if you so much as *sneeze* on source code, you need a FIPS change letter :)
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To
Old release, Tried to reproduce the problem and could not do so.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
sorry, we're not doing any FIPS changes at this time.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now and not doing any FIPS stuff for now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
GOST is now a separately-maintained engine.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Hi there,
reading the last advisory again, I noticed, that there's one logical
inconsistency.
First:
OpenSSL before 1.0.2f will reuse the key if:
...
- Static DH ciphersuites are used. The key is part of the certificate
and so it will always reuse it. This is only supported in 1.0.2.
and
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Believe fixed in current releases.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Also this is fixed in master.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev
we no longer support building without all tls extensions.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
fixed in current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
We're only doing security fixes in 1.0.1 now, sorry we didn't get to this
sooner.
Believed fixed in 1.0.2 Definitely fixed in master.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
VMS gets a major uplift in 1.1
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Also, Tandem isn't much supported...
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
Also fixed in master, and probably 1.0.2
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
We cannot reproduce the error.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
We're not maintaining FIPS stuff right now.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
this feature is in openssl 1.1
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
We're only taking security fixes for 1.0.1 now. Sorry we didn't get to look at
this sooner.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Please see https://github.com/openssl/openssl/pull/451
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
for 1.0.1 we're only doing security fixes now.
for threads stuff, please see https://github.com/openssl/openssl/pull/451
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
GOST is now a separately-maintained engine.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
But we're not doing FIPS work now, either. Sorry.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
This is already fixed in master, as well.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
Also, the new build process should handle this more cleanly.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
sorry, we can't do anything about this without more detail.
inter-language bindings are tough.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Not enough information to reproduce the bug.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
fixed in later versions; 1.0.1 only gets security fixes now.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
fixed in master.
too invasive to fix in earlier releases
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Too late for 1.0.1 and too much work for 1.0.2 :)
We fixed it in master (1.1) by saying "any supported digest" which isn't ideal,
admittedly.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
We're only doing security fixes in 1.0.1 now; sorry we didn't get to this
sooner.
Fixed in current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
Also fixed in 1.1
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
also the new build process handles this correctl.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
No reply, cannot reproduce it, closing the ticket.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
Also, we're not touching FIPS stuff right now.
Also also, pascal inter-language calling stuff? :)
--
Rich Salz, OpenSSL dev team;
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
fixed in master and perhaps 1.0.2
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
Sorry, we can't touch the FIPS code any more without sponsorship.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
On 3 February 2016 at 10:50, Rich Salz via RT wrote:
> sorry, we can't do anything about this without more detail.
> inter-language bindings are tough
Fortunately, I haven't seen this issue since 1.0.2a, so I suspect it
was some other bug being exposed in a strange way, that
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
1.0.1 is only getting security fixes now.
we think current releases work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Since everyone disagrees with the RFC about sending "sigalg-agreeing" certs,
we're not going to change this.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Is this still an issue in 1.0.2 or master? If so, please re-open this ticket.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry we didn't get to this sooner, we are only taking security fixes for 1.0.1
now.
If still an issue on current releases, please open a new ticket.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
We believe this works now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev
this is fixed in master (openssl 1.1 release)
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
Also, fixed in master (and maybe 1.0.2)
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
On Tue, Feb 02, 2016 at 10:34:32PM +0100, Rainer Jung wrote:
> Hi there,
>
> reading the last advisory again, I noticed, that there's one logical
> inconsistency.
>
> First:
>
> OpenSSL before 1.0.2f will reuse the key if:
> ...
> - Static DH ciphersuites are used. The key is part of the
On 02/02/16 21:34, Rainer Jung wrote:
> Hi there,
>
> reading the last advisory again, I noticed, that there's one logical
> inconsistency.
>
> First:
>
> OpenSSL before 1.0.2f will reuse the key if:
> ...
> - Static DH ciphersuites are used. The key is part of the certificate
> and so it
The SecurityPolicy.pdf claims that HP-UX 11i IA64 is a Supported Configuration;
how can this claim be made when the code does nto even compile correctly?
From: Rich Salz via RT [r...@openssl.org]
Sent: Tuesday, February 02, 2016 4:23 PM
To: Stuart Kemp
Cc:
Can someone please tell me how to verify the fix done for
CVE-2015-3197. I want to test 1.0.1r version for this issue.
>From the issue description I'm not able to understand what exactly
client and server doing.
Please tell me what packet client has to send or else please provide
me the packet
On Tue Feb 02 21:46:59 2016, rsalz wrote:
> Sorry, we can't touch the FIPS code any more without sponsorship.
Though if this is still a problem a workaround is to rename the symbols on the
OpenSSL side outside the FIPS code.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
The patches were large and added new features and API's which isn't appropriate
for bugfix releases.
In the master branch, branch the PRF functionality has been redirected to
libcrypto so it's possible it can be optimised by using a more efficient
implementation in crypto/kdf or in an engine.
Please see https://github.com/openssl/openssl/pull/451 which is what we'll be
doing moving forward.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Please see https://github.com/openssl/openssl/pull/451 which is what we'll be
doing for threads moving forward
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
FYI.
Take a look at how the commit logs of OpenSSL can be visualised
using the cool program Gource [1]:
https://www.youtube.com/watch?v=068ePuZ5OWw
Notice how the Heartbleed (?) bug caused the commit rate and number
of contributors increases at time 8:10 (May 2014).
[1]
> Take a look at how the commit logs of OpenSSL can be visualised using the
> cool program Gource [1]:
> https://www.youtube.com/watch?v=068ePuZ5OWw
>
> Notice how the Heartbleed (?) bug caused the commit rate and number of
> contributors increases at time 8:10 (May 2014).
>
> [1]
1 - 100 of 113 matches
Mail list logo