Re: [openssl-dev] [openssl.org #4410] [PATCH] add calculation of M1, M2 in srp, based on 1_0_2g(Internet mail)

2016-03-10 Thread Salz, Rich via RT
Sorry, no, it's too late to get this into 1.1 -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4410 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4410] [PATCH] add calculation of M1, M2 in srp, based on 1_0_2g(Internet mail)

2016-03-10 Thread taochen via RT
Sorry for no documentation. In SRP6a, after the client and server calculate a common session key, they must prove to each other that their keys are idential to finish authentication. That is client send the M1, and server verifies M1 and responses with M2, then client verifies M2. I notice that

Re: [openssl-dev] [openssl.org #4410] [PATCH] add calculation of M1, M2 in srp, based on 1_0_2g

2016-03-10 Thread Salz, Rich via RT
We need a little more explanation. Is this a new feature? Being added to 1.0.2? (That won't be accepted, only fixes go into released branches.) Or is this something that was dropped and should be restored? Unfortunately, the 1.1 freeze deadline is in 24 hours. This won't make it into 1.1

[openssl-dev] [openssl.org #4410] [PATCH] add calculation of M1, M2 in srp, based on 1_0_2g

2016-03-10 Thread taochen via RT
-- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4410 Please log in as guest with password guest if prompted add_srp_m1_m2.patch Description: Binary data add_srp_m1_m2.patch Description: Binary data -- openssl-dev mailing list To unsubscribe: