[openssl.org #221] for ARM

2002-08-14 Thread
Dear Master of OpenSSL I would like to use openssl on arm7312. But many crypt algorithm is asm for x386, Could you tell me where I can get this code for arm7323? Best Regards. mailto:[EMAIL PROTECTED] Jack Luo __ OpenSSL

Re: [openssl.org #221] for ARM

2002-08-14 Thread Richard Levitte - VMS Whacker
In message [EMAIL PROTECTED] on Wed, 14 Aug 2002 09:31:15 +0200 (METDST), jackluomail via RT [EMAIL PROTECTED] said: rt I would like to use openssl on arm7312. rt But many crypt algorithm is asm for x386, rt rt Could you tell me where I can get this code rt for arm7323? Have you tried

Re: [openssl.org #221] for ARM

2002-08-14 Thread Richard Levitte - VMS Whacker via RT
In message [EMAIL PROTECTED] on Wed, 14 Aug 2002 09:31:15 +0200 (METDST), jackluomail via RT [EMAIL PROTECTED] said: rt I would like to use openssl on arm7312. rt But many crypt algorithm is asm for x386, rt rt Could you tell me where I can get this code rt for arm7323? Have you tried

[openssl.org #222] tests fail - OpenSSL, any modern version, on OpenVMS

2002-08-14 Thread Richard Levitte via RT
Entirely depending on the untar utility used, the resulting files may have variable length record format or stream_lf record format. Stream_lf record format is the format that C programs output by default. So, in testenc.com, it means that if Makefile.ssl has been unpacked in variable

Re: [openssl.org #221] AutoReply: for ARM

2002-08-14 Thread
- Original Message - From: OpenSSL-Bugs [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, August 14, 2002 3:31 PM Subject: [openssl.org #221] AutoReply: for ARM Greetings, This message has been automatically generated in response to the creation of a

Re: [openssl.org #221] for ARM

2002-08-14 Thread
I build it at a Linux RedHat R7.2 i386 machine, it build ok. I just find the crypts subdirectory have some asm directory. Not try to compile by cross-compile yet. Jack Luo - Original Message - From: Richard Levitte - VMS Whacker via RT [EMAIL PROTECTED] To: [EMAIL PROTECTED] Cc:

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Arne Ansper
Example: when working through the internal session cache we learn, that the linked list is corrupted, we have dangling pointers and don't know what is going on. This would touch all threads using the same SSL_CTX. Thus: we don't know how to repair it - abort(). to make it more extreme: why

Re: cvs commit: openssl CHANGES

2002-08-14 Thread Richard Levitte - VMS Whacker
In message [EMAIL PROTECTED] on Wed, 14 Aug 2002 12:49:35 +0200 (MET DST), [EMAIL PROTECTED] said: bodo bodo14-Aug-2002 12:49:35 bodo bodo Modified:.CHANGES bodo Log: bodo add 'TODO' items Don't these go into the STATUS file, usually? -- Richard Levitte \

Re: cvs commit: openssl CHANGES

2002-08-14 Thread Bodo Moeller
On Wed, Aug 14, 2002 at 12:52:37PM +0200, Richard Levitte - VMS Whacker wrote: bodo bodo14-Aug-2002 12:49:35 bodo bodo Modified:.CHANGES bodo Log: bodo add 'TODO' items Don't these go into the STATUS file, usually? Only when noone is really working on them at

[openssl.org #222] tests fail - OpenSSL, any modern version, on OpenVMS

2002-08-14 Thread Richard Levitte via RT
I just committed a fix to all active branches. The change is untested, but will be tomorrow morning. This ticket is now resolved. [levitte - Wed Aug 14 09:53:37 2002]: Entirely depending on the untar utility used, the resulting files may have variable length record format or stream_lf

Re: cvs commit: openssl CHANGES

2002-08-14 Thread Richard Levitte - VMS Whacker
In message [EMAIL PROTECTED] on Wed, 14 Aug 2002 13:07:15 +0200, Bodo Moeller [EMAIL PROTECTED] said: moeller On Wed, Aug 14, 2002 at 12:52:37PM +0200, Richard Levitte - VMS Whacker wrote: moeller moeller bodo bodo14-Aug-2002 12:49:35 moeller bodo moeller bodo Modified:.

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Bodo Moeller
On Wed, Aug 14, 2002 at 01:24:32PM +0300, Arne Ansper wrote: [...] what if some standalone application thinks that the best solution for _its own_ problems is to reboot the machine? (happens all the time under the windows btw, you install some crap and the installer happily

[openssl.org #216] Bugs in OPENSSL-0.9.7 beta 3

2002-08-14 Thread Richard Levitte via RT
[levitte - Tue Aug 13 08:20:51 2002]: [[EMAIL PROTECTED] - Tue Aug 13 00:08:25 2002]: To see what would happen next, I added a #else else if (strcmp(*argv, -dhe1024dsa) == 0) {} in the option test sequence. It now runs all the tests quite happily but crashes with several error

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Ben Laurie
Bodo Moeller wrote: On Wed, Aug 14, 2002 at 01:24:32PM +0300, Arne Ansper wrote: [...] what if some standalone application thinks that the best solution for _its own_ problems is to reboot the machine? (happens all the time under the windows btw, you install some crap and the

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Kenneth R. Robinette
Date sent: Wed, 14 Aug 2002 13:51:43 +0100 From: Ben Laurie [EMAIL PROTECTED] To: Arne Ansper [EMAIL PROTECTED] Copies to: [EMAIL PROTECTED], Bodo Moeller [EMAIL PROTECTED] Subject:Re: cvs commit: openssl/util

Re: [openssl.org #217] bug in util/pod2mantest (openssl-0.9.6g)

2002-08-14 Thread Bodo Moeller via RT
On Tue, Aug 13, 2002 at 12:28:06PM +0200, via RT wrote: Line 14 in util/pod2mantest should read: try_without_dir=true otherwise 'first iteration' in the for-loop is never executed. The code as it currently is doesn't make too much sense (try_without_dir could be totally abolished), but

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Arne Ansper
On Wed, 14 Aug 2002, Ben Laurie wrote: The point is that the application is now in an inconsistent state and cannot reliably know anything. Even returning from a function could cause an exploit. The only safe thing to do is abort (now I think about it, probably die() shouldn't even print

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Ben Laurie
Lutz Jaenicke wrote: On Tue, Aug 13, 2002 at 07:45:30PM +0200, Bodo Moeller wrote: On Tue, Aug 13, 2002 at 05:10:34PM +0100, Ben Laurie wrote: Yes, and the application will continue as if it were sensible to do so. In fact it *is* often sensible to do so because such supposedly impossible

[openssl.org #217] bug in util/pod2mantest (openssl-0.9.6g)

2002-08-14 Thread Bodo Moeller via RT
We now call pod2man directly if this works (without explicit invocation of perl). __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED]

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Harald Koch
The buffer is _supposed_ to be big enough. We know of no path through the code that should cause it to be not big enough. So if this condition occurs something we don't understand has happened. Continuing under these circumstances as if nothing were wrong strikes me as foolhardy. If you

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Ben Laurie
Bodo Moeller wrote: On Tue, Aug 13, 2002 at 05:10:34PM +0100, Ben Laurie wrote: Bodo Moeller wrote: Ben Laurie [EMAIL PROTECTED]: As noted elsewhere, I really object to returning internal errors! It makes no sense to attempt to continue after the impossible has occurred. If we could be

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Ben Laurie
Bodo Moeller wrote: On Tue, Aug 13, 2002 at 08:09:02PM +0200, Lutz Jaenicke wrote: On Tue, Aug 13, 2002 at 07:45:30PM +0200, Bodo Moeller wrote: On Tue, Aug 13, 2002 at 05:10:34PM +0100, Ben Laurie wrote: Yes, and the application will continue as if it were sensible to do so. In fact it

Length error in EVP_DecodeBlock

2002-08-14 Thread Chris Brook
EVP_DecodeBlock() [in crypto/evp/encode.c] returns the length of the result of the base-64 decode. However this length is not the true length of the result but includes any trailing fills ('=') so it's always 0 mod 3. This obviously can cause errors in any processing on the result, e.g.

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Vadim Fedukovich
On Wed, Aug 14, 2002 at 05:05:27PM +0300, Arne Ansper wrote: On Wed, 14 Aug 2002, Ben Laurie wrote: The point is that the application is now in an inconsistent state and cannot reliably know anything. Even returning from a function could cause an exploit. The only safe thing to do is

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Ben Laurie
Arne Ansper wrote: Example: when working through the internal session cache we learn, that the linked list is corrupted, we have dangling pointers and don't know what is going on. This would touch all threads using the same SSL_CTX. Thus: we don't know how to repair it - abort(). to make

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Bodo Moeller
On Wed, Aug 14, 2002 at 01:53:29PM +0100, Ben Laurie wrote: The consistency checks don't detect that memory *has* been corrupted. They detect that memory *would* be corrupted if the library simply continued to do what it is doing. But if we return an internal error, this does not actually

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Bodo Moeller
On Wed, Aug 14, 2002 at 01:57:32PM +0100, Ben Laurie wrote: [...] But for various other potential errors, we do know what happened (e.g. a buffer has insufficient size) and we do know how to continue without doing significant harm (abort this one TLS/SSL connection, and in a way such that we

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Harald Koch
For most of the consistency checks that your patch added, a failure would very likely indicate that there is an inconsistency in the OpenSSL source code similar to the potential inconsistency discussed above. Precisely what happened with AES was added to OpenSSL; I reported an internal

[openssl.org #223] Length error in EVP_DecodeBlock

2002-08-14 Thread
EVP_DecodeBlock() [in crypto/evp/encode.c] returns the length of the result of the base-64 decode. However this length is not the true length of the result but includes any trailing fills ('=') so it's always 0 mod 3. This obviously can cause errors in any processing on the result, e.g.

fail to run nmake -f ms\ntdll.mak

2002-08-14 Thread gai phouthavongxay
Hi Below is the error I got when I tried to build it perl Configure VC-WIN32 ... ms\do_ms ... ... nmake -f ms\ntdll.mak ... ... and error.. link /nologo /subsystem:console /machine:I386 /opt:ref /dll /out:out32dl l\ssleay32.dll /def:ms/SSLEAY32.def

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Ben Laurie
Kenneth R. Robinette wrote: Date sent:Wed, 14 Aug 2002 13:51:43 +0100 From: Ben Laurie [EMAIL PROTECTED] To: Arne Ansper [EMAIL PROTECTED] Copies to:[EMAIL PROTECTED], Bodo Moeller [EMAIL PROTECTED] Subject: Re:

sc_clnt.c changes from 0.9.6d to 0.9.6g

2002-08-14 Thread Bill Pringlemeir
Sorry, I don't know exactly which version these changes were made in. I am upgrading from version `d' to version `g'. I have the following differences in s3_clnt.c. The problems are that the cryptlib.h header is in the crypto directory. Should I put this on the include path when building the

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Bodo Moeller
On Wed, Aug 14, 2002 at 03:39:03PM +0100, Ben Laurie wrote: So how did the buffer get to be too small? Well, in one of the cases it was improper protocol data checking (fixed in 0.9.6f). The others should really be impossible, but if they ever become possible, this most likely is because of

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Ben Laurie
Arne Ansper wrote: On Wed, 14 Aug 2002, Ben Laurie wrote: The point is that the application is now in an inconsistent state and cannot reliably know anything. Even returning from a function could cause an exploit. The only safe thing to do is abort (now I think about it, probably die()

Re: cvs commit: openssl/util mkerr.pl

2002-08-14 Thread Ben Laurie
Bodo Moeller wrote: On Wed, Aug 14, 2002 at 03:39:03PM +0100, Ben Laurie wrote: So how did the buffer get to be too small? Well, in one of the cases it was improper protocol data checking (fixed in 0.9.6f). The others should really be impossible, but if they ever become possible,