[openssl-dev] [openssl.org #4697] Bug in 1.1.0 (lost compatibility with previous releases)

2016-10-05 Thread Stephen Henson via RT
On Wed Oct 05 07:05:06 2016, sgbrazhni...@gmail.com wrote: > Hi, guys. > > Just figured out that files encrypted with OpenSSL 1.1.0-stable can not be > decrypted with previous releases and vice versa. > Tested aes256, cast5-cfb, camellia128 on 1.1.0-stable, 1.0.2-stable and > 0.9.8(cast5-cfb only)

[openssl-dev] [openssl.org #4690] Bug in OpenSSL 1.0.2j ssl_accept

2016-09-28 Thread Stephen Henson via RT
On Wed Sep 28 19:44:49 2016, mich...@michsoft.de wrote: > In addition to my message I send you my gdb backtrace: > > Program received signal SIGSEGV, Segmentation fault. > [Switching to Thread 0x71413700 (LWP 13663)] > 0x76ba4e87 in sk_value () from /usr/lib64/libcrypto.so.1.0.0 >

[openssl-dev] [openssl.org #4675] Bug: Parsing Configuration that contains System Variables

2016-09-16 Thread Stephen Henson via RT
On Fri Sep 16 13:54:00 2016, georg.hoellr...@gmx.at wrote: > > As long as $SAN is unset I get > openssl version > 6870300:error:0E065068:configuration file routines:STR_COPY:variable has no > value:conf_def.c:618:line 17 > This is expected and documented behaviour: see config manual page for

[openssl-dev] [openssl.org #4660] error:89070063:lib(137):CAPI_RSA_SIGN:cant create hash object

2016-09-02 Thread Stephen Henson via RT
On Sat Aug 27 14:01:11 2016, 1047941...@qq.com wrote: > hello: > i want to use libcurl with openssl, and i build openssl use this > cmd: > "perl configure VC-WIN32 no-asm -DOPENSSL_SSL_CLIENT_ENGINE_AUTO=capi > -DOPENSSL_CAPIENG_DIALO" > > > when i use curl get url,eg "curl -k

[openssl-dev] [openssl.org #4651] [BUG] malloc_failure in ASN1_D2I_READ_BIO with large smime encoded file

2016-08-18 Thread Stephen Henson via RT
On Thu Aug 18 14:01:03 2016, bmor...@mortoninsights.com wrote: > Ok, so this might be a separate issue. Please let me know what you think > and I can file. The issue is pretty much irrelevant since you can't > decrypt anything over 1.5G. > > Try this: > > bmorton@athens:~$ dd if=/dev/urandom

[openssl-dev] [openssl.org #4651] [BUG] malloc_failure in ASN1_D2I_READ_BIO with large smime encoded file

2016-08-18 Thread Stephen Henson via RT
On Thu Aug 18 00:40:21 2016, bmor...@mortoninsights.com wrote: > > Regardless of input size (2GB or 30GB) to the smime application, the > resulting encrypted file is only 1.9GB on disk. Unless smime format > has > some very serious compression, it looks like it is silently truncating > input. A 32

[openssl-dev] [openssl.org #4651] [BUG] malloc_failure in ASN1_D2I_READ_BIO with large smime encoded file

2016-08-17 Thread Stephen Henson via RT
On Wed Aug 17 18:16:41 2016, bmor...@mortoninsights.com wrote: > That doesn't sound like an ideal case for a bugfix. Any other creative > ideas on how to fix this one? Some suggestions I read previously included > adding support for streaming decode to avoid such a large memory > allocation. This

[openssl-dev] [openssl.org #4650] BUG: parsing CRL with openssl

2016-08-17 Thread Stephen Henson via RT
It's a bug that is fixed in the current stable versions of OpenSSL and will be in the next releases. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here:

[openssl-dev] [openssl.org #4590] accessors without const return arguments

2016-08-17 Thread Stephen Henson via RT
On Wed Aug 03 21:13:08 2016, open...@roumenpetrov.info wrote: > > Please update documentation (status of 3.8.2016): > 1) DSA_SIG_new.pod > DSA_SIG_new() allocates and initializes a B structure. > > So now function only allocates signature. > > > 2) ECDSA_SIG_new.pod > ECDSA_SIG_new() allocates a

[openssl-dev] [openssl.org #4643] [patch] pass EVP_MD to engines verifyctx_init and signctx_init

2016-08-08 Thread Stephen Henson via RT
On Mon Aug 08 13:52:12 2016, f.schuel...@infodas.de wrote: > Hello, > > for some engine-implementations one needs the possibility to change > the EVP_MD used in signctx_init and verifyctx_init. > (because different EVP_MD are needed for standalone calculating of the > digest and calculating the

[openssl-dev] [openssl.org #4639] Missing const and docs X509_get_notBefore, X509_get_notAfter

2016-08-01 Thread Stephen Henson via RT
Added documentation now and constified a few more cases. Thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4639 Please log in as

[openssl-dev] [openssl.org #4637] Fwd: Missing accessor - DSA key length

2016-08-01 Thread Stephen Henson via RT
Added now, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4637 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4590] accessors without const return arguments

2016-08-01 Thread Stephen Henson via RT
This has addressed the original issue. If there are any cases for DH/DSA/RSA you feel need addressing please give details in a new ticket. Steve.; -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here:

[openssl-dev] [openssl.org #4613] openssl RSA key: verify error 1.0.1t

2016-07-24 Thread Stephen Henson via RT
On Mon Jul 11 12:10:27 2016, 13731461...@126.com wrote: > > I was trying to install openssl 1.0.1t on AIX5.3, and it report error > when running "make test". Below is the error test. > > CMS consistency test > /usr/bin/perl cms-test.pl > CMS => PKCS#7 compatibility tests > signed content DER

[openssl-dev] [openssl.org #4615] Cache utility behaving strange with X509_LOOKUP_add_dir

2016-07-24 Thread Stephen Henson via RT
On Sun Jul 24 18:29:16 2016, aniru...@avaya.com wrote: > Thanks a lot !!! Will definitely try it out :) > Note that this bugfix is now in OpenSSL 1.0.2 and the master branch so alternatively just try a recent snapshot. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial

[openssl-dev] [openssl.org #4599] big CRLs problem with openssl 1.0.2h

2016-07-22 Thread Stephen Henson via RT
This is a known issue which is fixed in the current snapshots. Commit a1eef756cc1948ed4d1f addresses it. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here:

[openssl-dev] [openssl.org #4623] OpenSSL master regression in handling malformed Client Key Exchange messages in RSA key exchange

2016-07-22 Thread Stephen Henson via RT
On Fri Jul 22 14:56:11 2016, hka...@redhat.com wrote: > the issue is present in master 0ed26acce328ec16a3aa and looks to have > been > introduced in commit: > I tried what I thought was a fix for this which is to simply delete the lines: if (decrypt_len < 0) goto err; from

[openssl-dev] [openssl.org #4511] s_server does not send Alert messages upon receiving malformed Client Key Exchange messages in DHE key exchange

2016-07-22 Thread Stephen Henson via RT
Fixed now in master and 1.0.2. Thanks for the report, Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4511 Please log in as guest with password guest if

[openssl-dev] [openssl.org #4590] accessors without const return arguments

2016-07-22 Thread Stephen Henson via RT
On Sat Jun 25 22:09:59 2016, open...@roumenpetrov.info wrote: > > Above is reason the request to remove const from return argument of get0 > methods. > We had a discussion about this and the preference was to have get methods retain const for various reasons. Instead the DSA_SIG/ECDSA_SIG

[openssl-dev] [openssl.org #4610] Incorrect handling of malformed Client Key Exchange messages for ECDHE_RSA key exchange

2016-07-22 Thread Stephen Henson via RT
This has now been addressed in master and 1.0.2. Thanks for the report, Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4610 Please log in as guest with

[openssl-dev] [openssl.org #4603] HMAC_Init_ex incompatible change (possibly doc bug)

2016-07-22 Thread Stephen Henson via RT
On Sat Jul 02 11:13:44 2016, k...@roeckx.be wrote: > > /* If we are changing MD then we must have a key */ > if (md != NULL && md != ctx->md && (key == NULL || len < 0)) > return 0; > > That means contrary to the documentation, the existing salt isn't > reused > when the md argument is non-zero

[openssl-dev] [openssl.org #4615] Cache utility behaving strange with X509_LOOKUP_add_dir

2016-07-22 Thread Stephen Henson via RT
On Tue Jul 19 22:23:56 2016, steve wrote: > > If there are multiple CRLs with the appropriate scope then the first > one where > the current time falls between lastUpdate and nextUpdate is used. > > It is possible to dynamically update CRLs but currently only the time > criteria > is used. So if

[openssl-dev] [openssl.org #4600] Core dump when using -keymatexport and receiving a handshake alert

2016-07-19 Thread Stephen Henson via RT
Fixed now, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4600 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4615] Cache utility behaving strange with X509_LOOKUP_add_dir

2016-07-19 Thread Stephen Henson via RT
On Tue Jul 19 08:47:11 2016, levitte wrote: > My answer was incorrect... > > What happens when trying to find a CRL is that get_cert_by_subject (in > crypto/x509/by_dir.c) gets called, and it will try to load every file > it finds > (so both $hash{sub_ca}.r0 and $hash{sub_ca}.r1). However, when

[openssl-dev] [openssl.org #4588] pkcs12 -info doesn't handle PKCS#12 files with PKCS#5 v2.0 PBE

2016-07-19 Thread Stephen Henson via RT
Thanks for the report, fixed now in master and 1.0.2. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4588 Please log in as guest with password guest if

[openssl-dev] [openssl.org #4605] OCSP accessors

2016-07-13 Thread Stephen Henson via RT
Fixed now, ticket closed. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4605 Please log in as guest with password guest if prompted -- openssl-dev

[openssl-dev] [openssl.org #4554] Bug: psk argument of the s_client/s_server command strips leading zero bytes.

2016-06-12 Thread Stephen Henson via RT
Fixed now, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4554 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4474] Overflow optimizations being taken by GCC

2016-06-02 Thread Stephen Henson via RT
It looks like a lot of these warnings are bogus. For example ct_validation is only ever set to 0 or 1 yet it throws out a warning with if(ct_vlidation) in one place while not warning about a similar expression just above it. I tidied up ocsp_prn.c which avoided the warning in that file: though

[openssl-dev] [openssl.org #2369] mail/rfc822Mailbox should be encoded as IA5String, not DirectoryString

2016-05-27 Thread Stephen Henson via RT
Fixed now, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2369 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4329] OpenSSL 1.1.0 pre3: internal error in tls_post_process_client_key_exchange during reneg

2016-05-24 Thread Stephen Henson via RT
On Sun Feb 21 13:55:35 2016, rainer.j...@kippdata.de wrote: > Running the Apache test suite for Apache 2.4 with OpenSSL 1.1.0 > adjustments, I get > Can you please check to see if this issue is still present in the latest OpenSSL 1.1.0? Steve. -- Dr Stephen N. Henson. OpenSSL project core

[openssl-dev] [openssl.org #4471] 1.1.0-pre4 safestack.h compilation errors with -Wcast-qual

2016-05-24 Thread Stephen Henson via RT
On Mon May 16 18:32:13 2016, bwell...@xbill.org wrote: > This is fixed, but there are similar problems that still exist, for > example: > > — > #include > #include > I've addresses some, but not all the warnings now. Some of them would require signiicant changes to the way STACK works. We'll

[openssl-dev] [openssl.org #2383] OpenSSL line break bugs

2016-05-19 Thread Stephen Henson via RT
On Tue Nov 30 11:20:30 2010, donz4...@donz.ru wrote: > Hello. > I use OpenSSL 1.0.0a 1 Jun 2010 version. > > 1)Command "openssl smime -sign ..." generates output with added headers > and meta-data in body with '\n' as line terminator but > http://www.faqs.org/rfcs/rfc2822.html demands using only

[openssl-dev] [openssl.org #1817] smime does not add CRs

2016-05-19 Thread Stephen Henson via RT
Now fixed for smime and cms utilities. Thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=1817 Please log in as guest with password

[openssl-dev] [openssl.org #1797] re: unable to verify timestamps sgined with a certificate that is now expired

2016-05-18 Thread Stephen Henson via RT
The master version of the ts utility now supports the full set of verification options including the -attime option which can set the verification time. Ticket resolved. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see:

[openssl-dev] [openssl.org #4215] Results of regression for some apps

2016-05-16 Thread Stephen Henson via RT
On Mon May 16 22:17:57 2016, beld...@gmail.com wrote: > Dear Stephen, > > There was one more bugreport merged to this ticket regarding the OCSP > (#4216). > Could you take a look at it? > That should be fixed by commit 6302bbd21a79bd2ed Steve. -- Dr Stephen N. Henson. OpenSSL project core

[openssl-dev] [openssl.org #4215] Results of regression for some apps

2016-05-16 Thread Stephen Henson via RT
On Sat May 14 21:43:05 2016, beld...@gmail.com wrote: > > Yes. The bug is still reproducable with the req command. > > To reproduce it, you need to specify the OPENSSL_CONF variable. > (You have to load the engine via config to enable the algorithms on > startup > of the openssl). > The engine you

[openssl-dev] [openssl.org #4471] 1.1.0-pre4 safestack.h compilation errors with -Wcast-qual

2016-05-13 Thread Stephen Henson via RT
Fixed in commit afdd82fb567db Thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4471 Please log in as guest with password guest if

[openssl-dev] [openssl.org #4215] Results of regression for some apps

2016-05-13 Thread Stephen Henson via RT
On Mon Jan 04 14:07:23 2016, beld...@gmail.com wrote: > Hello! > > I found the following problems running my cipher suite with openssl 1.1.0 > > 1. Some apps try to load the default config file twice. In case when we > load an engine via the config file and the engine prevents itself from >

[openssl-dev] [openssl.org #4302] Documentation error in apps/x509.html: -[digest] option

2016-05-13 Thread Stephen Henson via RT
Fixed in commit 0b2d4755d67eece48d1 Thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4302 Please log in as guest with password

[openssl-dev] [openssl.org #4540] openssl make test

2016-05-12 Thread Stephen Henson via RT
It's caused by the S/MIME test certificates expiring. This is fixed in commit 24762dee178bace3c3 either apply that, use a recent snapshot or just copy the test/smime-certs directory from a recent snapshot. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now

[openssl-dev] [openssl.org #4207] engine key format in 1.1

2016-05-12 Thread Stephen Henson via RT
The remaining cases should be fixed now by commit d18ba3cc36d5fed032d. Thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4207

[openssl-dev] [openssl.org #4403] [PATCH] prevent OPENSSL_realloc() from clobbering old pointer value on failure in OpenSSL-1.1 pre-4

2016-05-12 Thread Stephen Henson via RT
Fixed now, along with a few similar cases. Thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4403 Please log in as guest with

[openssl-dev] [openssl.org #4246] OpenSSL-1.1-pre2 openssl req fails to use engine

2016-05-12 Thread Stephen Henson via RT
Fixed now, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4246 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4438] GOST ciphersuites and DTLS

2016-05-12 Thread Stephen Henson via RT
Fixed now, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4438 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4104] A bug in the crl2pkc7 command in master

2016-05-12 Thread Stephen Henson via RT
On Wed Oct 21 19:41:57 2015, beld...@gmail.com wrote: > Hello, > > I've found a bug in the crl2pkc7 command in the master branch. > > openssl crl2pkcs7 -in test.crl -certfile cert.pem -out p7.pem > > Output: > > error opening the file, -in > error loading certificates >

[openssl-dev] [openssl.org #4236] SSL_connect() crash with CRL

2016-05-11 Thread Stephen Henson via RT
On Wed May 11 22:16:00 2016, dan...@haxx.se wrote: > > > Sorry, that problem was fixed at some later point and I've not seen it > trigger > recently. I forgot to mark it as such in the bug. OK, thanks for the update. Ticket closed. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer.

[openssl-dev] [openssl.org #4442] PATCH: fix typo in AF_ALG engine name

2016-05-11 Thread Stephen Henson via RT
Thanks, applied. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4442 Please log in as guest with password guest if prompted -- openssl-dev mailing

[openssl-dev] [openssl.org #4363] [PATCH] Adding missing BN_CTX_(start/end) in crypto/ec/ec_key.c

2016-05-11 Thread Stephen Henson via RT
Applied, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4363 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4236] SSL_connect() crash with CRL

2016-05-11 Thread Stephen Henson via RT
On Thu Jan 14 17:08:13 2016, dan...@haxx.se wrote: > Hey > > I've had this crash for a while with current openssl git master. It is > perfectly reproducable using curl test 313 and I have an openssl build > here > with debug symbols so I can provide more info to help someone diagnose > this, >

[openssl-dev] [openssl.org #4224] [PATCH] ciphers command does not list supported SRP suites

2016-05-10 Thread Stephen Henson via RT
Applied now. Thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4224 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4538] Possible typo on https://www.openssl.org/docs/manmaster/apps/x509v3_config.html

2016-05-10 Thread Stephen Henson via RT
Fixed now, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4538 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4173] help to check whether handshake negociates SRP or PSK ciphersuite

2016-05-10 Thread Stephen Henson via RT
This is now supported in the master branch with the SSL_CIPHER_get_auth_nid() function. The equivalent cannot be added to 1.0.2 as we do not add new features to stable branches. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see:

[openssl-dev] [openssl.org #4390] [PATCH] Don't send signature algorithms when client_version is below TLS 1.2.

2016-05-09 Thread Stephen Henson via RT
Applied (in slightly modified form) thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4390 Please log in as guest with password

[openssl-dev] [openssl.org #4462] FEATURE: enable 'make test' to respond to 'V=1' or 'VERBOSE=1'

2016-05-09 Thread Stephen Henson via RT
Support added now for VERBOSE and V. Closing ticket, Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4462 Please log in as guest with password guest if

[openssl-dev] [openssl.org #4435] Pull request: Update EVP_CIPHER_CTX_set_padding documentation.

2016-05-08 Thread Stephen Henson via RT
This has now been applied, thanks for the contribution. Ticket closed. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4435 Please log in as guest with

[openssl-dev] [openssl.org #3826] Contribution/Patch

2016-05-08 Thread Stephen Henson via RT
Fixed now, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3826 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4147] TSA: SHA-1 update

2016-05-08 Thread Stephen Henson via RT
No problems reported, ticket closed. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4147 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4510] SSL certificate problem: unable to get local issuer certificate. Bug?

2016-05-07 Thread Stephen Henson via RT
On Fri May 06 22:37:55 2016, nbh...@gmail.com wrote: > Hello Steve, > > *If I do not indicate the location of the cert* > > > > > PS C:\OpenSSL-Win32\bin> .\openssl s_client -connect > > www.googleapis.com:443 > > CONNECTED(0088) > > depth=2

[openssl-dev] [openssl.org #4510] SSL certificate problem: unable to get local issuer certificate. Bug?

2016-05-06 Thread Stephen Henson via RT
On Fri May 06 00:33:47 2016, nbh...@gmail.com wrote: > > I updated the openssl version to 1.0.2h and reran. Was able to > reproduce. *Old > pem works newer pem fails*. > Can you reproduce this using s_client? Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support

[openssl-dev] [openssl.org #4449] PATCH: fix PKCS12_newpass does not take a cont char[]

2016-05-06 Thread Stephen Henson via RT
Fixed now, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4449 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4466] Memory leak in PKCS12_newpass function

2016-05-06 Thread Stephen Henson via RT
Fixed, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4466 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4478] DOCUMENTATION: PKCS12_newpass

2016-05-06 Thread Stephen Henson via RT
Added now. Thanks for the contribution. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4478 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4429] Cannot decrypt RC4-encrypted CMS object

2016-05-06 Thread Stephen Henson via RT
The bug was that to support CMS a cipher needs to be able to handle the ASN.1 associated with the cipher and (AFAIK) no standard exists for RC4. The decrypt code checked to see if ASN.1 handling was supported and threw the error because it was not. The encrypt side only tried to use ASN.1 if the

[openssl-dev] [openssl.org #4503] RSA: the docs still talk about RSA_PKCS1_SSLeay

2016-05-06 Thread Stephen Henson via RT
Looks like this was addressed with commit a6eef4c81b62bbab8d. Thanks for the contribution. Closing ticket. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here:

[openssl-dev] [openssl.org #4504] Openssl cms encrypt bug.

2016-05-05 Thread Stephen Henson via RT
Fixed now, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4504 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4510] SSL certificate problem: unable to get local issuer certificate. Bug?

2016-05-05 Thread Stephen Henson via RT
On Tue Apr 12 13:41:51 2016, nbh...@gmail.com wrote: > On my test server running OpenSSL 1.0.2e on Windows Server 2012. The > "newest" cacert.pem fails with an error "SSL certificate problem: unable to > get local issuer certificate", however, the one from 2014 works. I am > attaching both. > Can

[openssl-dev] [openssl.org #4466] Memory leak in PKCS12_newpass function

2016-05-05 Thread Stephen Henson via RT
On Mon Mar 21 13:02:56 2016, ramunas.jurgi...@gmail.com wrote: > I did write function which changes PKCS12 passphrase. I noticed that > PKCS12_newpass function leaks memory. Memory leak disappears when > commenting out line where is PKCS12_newpass func. > > Below I posted this code which I am

[openssl-dev] [openssl.org #4493] [PATCH] crypto/ec: fix setting the private key.

2016-05-05 Thread Stephen Henson via RT
Fixed in commit acde647fb0347f64af8 Thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4493 Please log in as guest with password

[openssl-dev] [openssl.org #4535] BUG: X509_NAME_MAX too small for CRL processing

2016-05-05 Thread Stephen Henson via RT
On Thu May 05 12:54:11 2016, howard.m.kash@mail.mil wrote: > > OpenSSL 1.0.2h fails to process large CRLs (anything over 1MB) with the > error "X509_NAME_EX_D2I:too long:x_name.c:203" due to X509_NAME_MAX being > set to 1024*1024. The CRLs I'm examining with "openssl crl -in > -nextupdate

[openssl-dev] [openssl.org #4514] [BUG] PKCS12_key_gen_uni() crashes when used with Blake

2016-05-04 Thread Stephen Henson via RT
This has now been fixed. I've addred checks for the block length and set the Blake2 block length properly. Thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here:

[openssl-dev] [openssl.org #4527] Bug in d2i_PrivateKey (openssl-1.1.0-pre5)

2016-05-04 Thread Stephen Henson via RT
Fixed, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4527 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4529] Output of -hash option incompatible 64-bit Linux vs 32-bit Linux

2016-05-02 Thread Stephen Henson via RT
On Mon May 02 19:00:03 2016, john.with...@irs.gov wrote: > > I successfully built and deployed to a 64-bit RHEL 5.11 server (using > a local installation path) and was able to configure the issuer > certificate cache for my applications. I built a separate package for > 32-bit RHEL 5.11 (again,

[openssl-dev] [openssl.org #4524] [BUG] TLS 1.2 handshake hangs for TLS 1.0 only hosts

2016-05-01 Thread Stephen Henson via RT
On Sun May 01 07:32:17 2016, hen...@newdawn.dk wrote: > Thank you all for the assistance - trying to convince Qt/C++ SSL > sockets to do as you've described by cutting down on ciphers. I did > check std Google Chrome ClientHello which does only contain about 10 > cipher suites - where Qt seems to

[openssl-dev] [openssl.org #4524] [BUG] TLS 1.2 handshake hangs for TLS 1.0 only hosts

2016-04-30 Thread Stephen Henson via RT
On Sat Apr 30 21:23:30 2016, hen...@newdawn.dk wrote: > Since this is a MS IIS 7.0 server I would argue that it'd be in the > interest of openssl to handle the situation rather than accept this > scenario - since IIS is likely powering more than a few hosts? It is > possible to have the host

[openssl-dev] [openssl.org #4517] [PATCH] Fix EC_KEY_set_private_key() to call key->group->meth->set_private() [GitHub PR #986]

2016-04-22 Thread Stephen Henson via RT
Fixed, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4517 Please log in as guest with password guest if prompted --

[openssl-dev] [openssl.org #4472] [PATCH] alllowing wrap mode using enc command

2016-03-25 Thread Stephen Henson via RT
On Tue Mar 22 21:51:05 2016, michel.sa...@free.fr wrote: > Hi, > > Here attached is some test data files and a patch against today's git repo > to allow for the use of wrap mode using the OpenSSL 'enc' command. > > The 'raw*.dat' files contains the NIST test vectors, and the '*.ok.enc' the >

[openssl-dev] [openssl.org #4436] [Openssl 1.1.0] ECDSA_SIG_get0() for const ECDSA_SIG *

2016-03-19 Thread Stephen Henson via RT
Fixed now. Closing ticket. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4436 Please log in as guest with password guest if prompted -- openssl-dev

[openssl-dev] [openssl.org #4446] [openssl 1.1.0] Memory handling inside ASN1_item_sign_ctx()

2016-03-19 Thread Stephen Henson via RT
Your fix has now been applied to the master branch. Thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4446 Please log in as guest

[openssl-dev] [openssl.org #3676] [PATCH] Export ASN1 templates for DH and ECDH groups

2016-03-09 Thread Stephen Henson via RT
On Wed Mar 09 23:50:40 2016, matthias.st.pie...@ncp-e.com wrote: > > According to our records, your request has been resolved. If you have > > any > > further questions or concerns, please respond to this message. > > Thanks a lot for finally adding the patch. Since our software is not > ready for

[openssl-dev] [openssl.org #3676] [PATCH] Export ASN1 templates for DH and ECDH groups

2016-03-05 Thread Stephen Henson via RT
On Sat Mar 05 19:58:57 2016, matthias.st.pie...@ncp-e.com wrote: > > These functions, although internal, appear to me to be the natural way > to serialize > and deserialize private ECDH groups. They are well tested and reusable > and the only > reason why they are not public is probably because

[openssl-dev] [openssl.org #3676] [PATCH] Export ASN1 templates for DH and ECDH groups

2016-03-05 Thread Stephen Henson via RT
On Sat Mar 05 09:01:48 2016, matthias.st.pie...@ncp-e.com wrote: > Is there any chance that this change will find it's way into OpenSSL > 1.1 ? > The fact we don't export the DHparameters item I'd regard as a bug which should be fixed. The EC one I'm less sure about. This ends up exposing what

[openssl-dev] [openssl.org #4376] pull request 785

2016-03-04 Thread Stephen Henson via RT
On Fri Mar 04 14:35:30 2016, darovskikh.and...@gmail.com wrote: > Hi > > I'm using openssl 1.0.2 library for SSL connection. > For supporting TLS1.2 protocol with client cert from windows cert store I > modified openssl capi engine. In method capi_rsa_sign I initialize > Microsoft Enhanced RSA and

[openssl-dev] [openssl.org #4343] master: EC_KEY_priv2buf (): check parameter sanity

2016-02-26 Thread Stephen Henson via RT
On Wed Feb 24 12:07:05 2016, mo...@computer.org wrote: > Hi, > > I have PR https://github.com/openssl/openssl/pull/739 with the below > changes, please have a look. > > - In EC_KEY_priv2buf(), check for pbuf sanity. > - If invoked with NULL, gracefully returns the key length. > If you're doing

[openssl-dev] [openssl.org #4303] OpenSSL 1.1.0 renegotiation problem (s_server/s_client)

2016-02-13 Thread Stephen Henson via RT
On Fri Feb 12 18:41:41 2016, rainer.j...@kippdata.de wrote: > Using OpenSSL 1.1.0pre2 I see renegotiation problems between s_client > and s_server (but also in Apache mod_ssl). > Fixed in commit 5b326dc529e19194 Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech

[openssl-dev] [openssl.org #4266] OpenSSL-1.1-pre2 cms can not use engine with parameters to sign cms msg

2016-02-11 Thread Stephen Henson via RT
Now applied as commit 43db7aa2de68e0 Thanks for the report, Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4266 Please log in as guest with password

[openssl-dev] [openssl.org #4301] [BUG] OpenSSL 1.1.0-pre2 fails to parse x509 certificate in DER format

2016-02-11 Thread Stephen Henson via RT
On Thu Feb 11 07:11:17 2016, bcri...@gmail.com wrote: > This is the Endorsement Key certificate extracted from a TPM device. > Does it always do that or is this just an oddity? Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see:

[openssl-dev] [openssl.org #4301] [BUG] OpenSSL 1.1.0-pre2 fails to parse x509 certificate in DER format

2016-02-11 Thread Stephen Henson via RT
On Thu Feb 11 21:38:18 2016, bcri...@gmail.com wrote: > The EK certificate is generated and burned into the TPM during > manufacturing. The extraction operation always returns the same certificate. > I meant do you have any other examples of this anomalous encoding or is it some rare glitch in

[openssl-dev] [openssl.org #4301] [BUG] OpenSSL 1.1.0-pre2 fails to parse x509 certificate in DER format

2016-02-10 Thread Stephen Henson via RT
On Wed Feb 10 21:59:12 2016, bcri...@gmail.com wrote: > Version: "OpenSSL 1.1.0-pre2 (alpha) 14 Jan 2016" > > Command: "openssl x509 -inform der -in sample_ekcert.der" > > Result: > "unable to load certificate > 140618483803816:error:0D0E20DD:asn1 encoding routines:c2i_ibuf:illegal >

[openssl-dev] [openssl.org #4274] OpenSSL 1.1 X509_NAME_der()

2016-02-03 Thread Stephen Henson via RT
On Fri Jan 29 19:14:50 2016, h...@symas.com wrote: > > Just to be clear - in our use case we already know the length. But if > the > function you're proposing is returning only a success/error code, then > the > function should probably also provide the length as a return > parameter, for > more

[openssl-dev] [openssl.org #4274] OpenSSL 1.1 X509_NAME_der()

2016-02-03 Thread Stephen Henson via RT
OK thanks for the update, ticket resolved. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org ___ openssl-dev mailing list To unsubscribe:

[openssl-dev] [openssl.org #3557] -nameopt utf8 behaviour in openssl 1.0.1i

2016-02-03 Thread Stephen Henson via RT
Duplicate of ticket #2397 which is now resolved. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org ___ openssl-dev mailing list To unsubscribe:

[openssl-dev] [openssl.org #3699] openssl-1.0.2, fips sparc multiply defined _sparcv9_vis1_instrument_bus, _sparcv9_vis1_instrument_bus2

2016-02-02 Thread Stephen Henson via RT
On Tue Feb 02 21:46:59 2016, rsalz wrote: > Sorry, we can't touch the FIPS code any more without sponsorship. Though if this is still a problem a workaround is to rename the symbols on the OpenSSL side outside the FIPS code. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer.

[openssl-dev] [openssl.org #4287] Option -attime for "openssl ts -verify"

2016-02-02 Thread Stephen Henson via RT
On Tue Feb 02 15:56:01 2016, frank.br...@ipb-halle.de wrote: > Hi, > please find my pull request on > https://github.com/openssl/openssl/pull/610 > > These two patches add an -attime option to "openssl ts -verify" > similar to the same option in "openssl verify". This allows checking > of

[openssl-dev] [openssl.org #3641] [PATCH] EC_KEY_generate always overwrites private key All OS 1.0.1j

2016-02-02 Thread Stephen Henson via RT
The existing functionality reuses an EC_KEY structure and generates a new key. We can't really change this because any application relying on that would end up getting the same key back instead of a new one. However I think a separate function which calculates the public key based on the set

[openssl-dev] [openssl.org #3713] Bug: openssl-1.0.1l, FIPS, HP-UX ia64, Duplicate Symbol "AES_Te" and "AES_Td"

2016-02-02 Thread Stephen Henson via RT
On Tue Feb 02 23:38:51 2016, stuart.k...@microfocus.com wrote: > The SecurityPolicy.pdf claims that HP-UX 11i IA64 is a Supported > Configuration; how can this claim be made when the code does nto even > compile correctly? The FIPS module compiles correctly but there is the duplicated symbol

[openssl-dev] [openssl.org #4280] OpenSSL 1.1.0 pre 2: feature request: ECDSA_SIG_set0(const ECDSA_SIG*, BIGNUM *, BIGNUM *) is needed

2016-01-29 Thread Stephen Henson via RT
On Fri Jan 29 09:59:23 2016, alek...@aleksey.com wrote: > Hello, > > At the moment, there is no way to set r/s in the ECDSA_SIG structure > manually to verify the signature encoded into a different format. > Would be great to add a simple function: > > void ECDSA_SIG_set0(const ECDSA_SIG*, BIGNUM

[openssl-dev] [openssl.org #4274] OpenSSL 1.1 X509_NAME_der()

2016-01-29 Thread Stephen Henson via RT
On Fri Jan 29 15:08:47 2016, h...@highlandsun.com wrote: > Howard Chu via RT wrote: > > In OpenLDAP we reference X509_NAME->bytes->data directly, we want the > > DER > > bytes which we then pass thru our own DN validator/formatter. This no > > longer > > works with OpenSSL 1.1 and I don't see any

[openssl-dev] [openssl.org #4274] OpenSSL 1.1 X509_NAME_der()

2016-01-29 Thread Stephen Henson via RT
On Fri Jan 29 17:35:05 2016, steve wrote: > On Fri Jan 29 15:08:47 2016, h...@highlandsun.com wrote: > > Howard Chu via RT wrote: > > > In OpenLDAP we reference X509_NAME->bytes->data directly, we want > > > the > > > DER > > > bytes which we then pass thru our own DN validator/formatter. This > >

[openssl-dev] [openssl.org #4280] OpenSSL 1.1.0 pre 2: feature request: ECDSA_SIG_set0(const ECDSA_SIG*, BIGNUM *, BIGNUM *) is needed

2016-01-29 Thread Stephen Henson via RT
On Fri Jan 29 17:59:59 2016, alek...@aleksey.com wrote: > > Do you have plan to change the behavior of DSA_SIG_new() as well > to pre-create r and s? Currently both are NULL. > That seems like a reasonable change. In 1.0.x we can't do that because it would result in compatibility issues. For

[openssl-dev] [openssl.org #4277] DSAPublicKey should use dsa_cb in 1.1.0

2016-01-28 Thread Stephen Henson via RT
Thanks for the report, fixed now. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org ___ openssl-dev mailing list To unsubscribe:

  1   2   3   4   5   6   7   8   9   10   >