RAND_Status lock

2002-06-14 Thread David Pineda

I'm using a DLL that encrypt/Decrypt files, when I execute the DLL using a
foreground application works, but when I execute the DLL running under a
background program It is locking calling RAND_Status function.

This is under WinNT environment,  I use the DLL in services and ATL COM
Servers and always I got this lock. I don't know much about this issue so I
appreciate any help.


David Pineda




__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #96] bug in config script (gcc 3.1)

2002-06-14 Thread Richard Levitte - VMS Whacker

In message [EMAIL PROTECTED] on Thu, 13 Jun 2002 14:52:11 -0700, 
Allen Hopkins [EMAIL PROTECTED] said:

allenh I'm afraid this was not a fix.  Have you tried it with gcc-3.1?
allenh I encountered this problem with the 0.9.6d snapshot.

I tried it just now, GCCVER becamse 31, and my output was

--
gcc (GCC) 3.1.1 20020606 (Debian prerelease)
Copyright (C) 2002 Free Software Foundation, Inc.
This is free software; see the source for copying conditions.  There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

--

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
\  SWEDEN   \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See http://www.stacken.kth.se/~levitte/mail/ for more info.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #85] 0.9.7 prototype constification problems

2002-06-14 Thread Avery Pennarun

On Thu, Jun 13, 2002 at 01:26:42PM +0200, Bodo Moeller via RT wrote:

 [[EMAIL PROTECTED] - Thu Jun  6 18:39:34 2002]:
  It appears the openssl guys goofed in 0.97beta.  The prototype for the
  d2i_RSAPrivateKey function in 0.9.6c, which I use, is like this:
  
  d2i_RSAPrivateKey(RSA **a, unsigned char **pp, long length);
  
  ie., without a const on the second parameter.  The const should have
  been done like this (I think):
  const unsigned char * const *pp
  ...which would be entirely backwards-compatible with old versions of
  openssl.
 
 Could you explain why you think this would improve compatibility
 (compared with 'const unsigned char **pp', which is how 'pp' should
 be declared in 0.9.7-beta1, although the exact definition is
 hidden behind macros)?

Any variable that could be passed to a function taking unsigned char **
could also be passed to a function taking const unsigned char * const *. 
Thus, using the above declaration would make openssl's api 100%
source-compatible with previous versions, while promising an increased level
of constness.

Using const unsigned char **, however, is not 100% api-compatible, because
you can't safely pass an unsigned char ** to it, for complicated reasons
explained in the URL I sent earlier.

 In fact the second 'const' would be wrong because the pointer that
 'pp' points to is updated to reflect how much of the encoded data
 has been processed by the d2i_... function.  I.e., it is not
 at all constant.

Now, you caught me there.  The change I proposed earlier (adding an additional
const) would fix API compatibility, but promises a level of constness that
you're not actually providing.

Unfortunately, I don't know a way around it: the problem is that the beta1
level of constness looks right, but doesn't _actually_ promise the constness
that it looks like it does, due to the crazy hackery described in the URL I
sent earlier.  It also makes the API incompatible with older versions.  I
can't pass the address of unsigned char *p to the new function.

On the other hand, I can't pass the address of const unsigned char *p to
the old-style function.

Neither situation is desirable... but it looks like you might have to just
use two different functions with two different APIs, unfortunately.  I don't
know another way out.

Have fun,

Avery
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #96] bug in config script (gcc 3.1)

2002-06-14 Thread Richard Levitte - VMS Whacker via RT


In message [EMAIL PROTECTED] on Thu, 13 Jun 2002 14:52:11 -0700, 
Allen Hopkins [EMAIL PROTECTED] said:

allenh I'm afraid this was not a fix.  Have you tried it with gcc-3.1?
allenh I encountered this problem with the 0.9.6d snapshot.

I tried it just now, GCCVER becamse 31, and my output was

--
gcc (GCC) 3.1.1 20020606 (Debian prerelease)
Copyright (C) 2002 Free Software Foundation, Inc.
This is free software; see the source for copying conditions.  There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

--

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
\  SWEDEN   \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See http://www.stacken.kth.se/~levitte/mail/ for more info.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #65] Ticket Resolved

2002-06-14 Thread Bodo Moeller

On Thu, Jun 13, 2002 at 06:05:34PM +0200,  Kambez Sadeq  via RT wrote:

 Any idea why web browsers such as MSIE and Opera work okay with the server? 
 I'm guessing that these browsers ignore invalid records.

No, the server (actually a broken proxy to a real server apparently)
does not send invalid records under certain conditions.  I used
s_client to send the following lines and it worked:


GET / HTTP/1.1
Host: ebmx.extra.daimlerchrysler.com



But when faced with inappropriate Host lines, the server behaves
erratically.  I can connect to it using Netscape, but if I tunnel
through localhost (so that the real target host is not named in
Host) I get plaintext error messages; see the following partial
connection transcript (the  lines are an SSL encrypted HTTP
request [so you can't read anything], the  lines are the server's
response, which is sent in cleartext).

 000114  17 03 00 01 26 42 fc 09 da 38 85 b8 60 98 ea b1  B...8..`...
 000124  be 49 13 66 71 42 ab 11 b9 25 df 47 f1 d9 69 7c  .I.fqB...%.G..i|
 000134  a6 f2 72 a0 2e e2 7c 0a 2b 91 a8 e5 6b 77 ef 95  ..r...|.+...kw..
 000144  fe 64 e2 e3 db a6 12 4b 8c 96 ed c4 f9 16 2b 05  .d.K..+.
 000154  9a 4d d6 59 2a f9 cf 68 7d a6 04 ba 87 bd 83 f4  .M.Y*..h}...
 000164  24 16 e9 71 f0 b9 b6 b8 16 e9 16 24 5c c5 a6 8b  $..q...$\...
 000174  81 84 14 77 28 4e 4b eb a4 94 13 52 76 c1 5b 39  ...w(NKRv.[9
 000184  8e bc 96 6f fa 1c ca 4e ee ec 69 a6 85 7c 7d 6e  ...o...N..i..|}n
 000194  73 a5 54 8a de 9c 82 2d 9e 25 82 4a 46 3e 06 79  s.T-.%.JF.y
 0001a4  0c cc 8b 1f c0 9f 5c 95 40 e7 51 b6 d2 38 75 b7  ..\.@.Q..8u.
 0001b4  68 91 60 f1 f8 1a c3 d1 97 13 c6 63 28 37 93 65  h.`c(7.e
 0001c4  aa b4 f2 d1 49 6b 5f cf 66 e1 40 cc 66 01 b1 44  Ik_.f.@.f..D
 0001d4  4e 24 2b 04 23 26 2e bf a1 ff 57 6c 2a 52 01 68  N$+.#Wl*R.h
 0001e4  3e 99 b7 1b 5e 7b c3 6d 72 6a ce 3e 89 98 9f 38  ...^{.mrj8
 0001f4  17 6d 5a dd 3a f7 52 cd 9b cc 5c a4 a4 83 02 a9  .mZ.:.R...\.
 000204  50 36 32 b2 44 11 f9 45 b7 c7 d8 5f 9d 6c 24 e6  P62.D..E..._.l$.
 000214  22 58 9a 01 58 ba 2b a8 f7 d0 ca 78 a8 2b cc d4  X..X.+x.+..
 000224  29 75 fd 24 38 1d c6 30 df b5 f0 48 5d cd d2 01  )u.$8..0...H]...
 000234  51 21 cf d8 99 ac 6b 3e 1b 66 90 Q!k.f.
 000c63  48 54 54 50 2f 31 2e 30 20 35 30 30 20 45 72 72  HTTP/1.0 500 Err
 000c73  6f 72 20 66 72 6f 6d 20 70 72 6f 78 79 0d 0a 4d  or from proxy..M
 000c83  69 6d 65 2d 76 65 72 73 69 6f 6e 3a 20 31 2e 30  ime-version: 1.0
 000c93  0d 0a 50 72 6f 78 79 2d 61 67 65 6e 74 3a 20 4e  ..Proxy-agent: N
 000ca3  65 74 73 63 61 70 65 2d 50 72 6f 78 79 2f 33 2e  etscape-Proxy/3.
 000cb3  35 33 0d 0a 43 6f 6e 74 65 6e 74 2d 74 79 70 65  53..Content-type
 000cc3  3a 20 74 65 78 74 2f 68 74 6d 6c 0d 0a 0d 0a 3c  : text/html
 000cd3  48 54 4d 4c 3e 0a 3c 48 45 41 44 3e 3c 54 49 54  HTML.HEADTIT
 000ce3  4c 45 3e 45 72 72 6f 72 3c 2f 54 49 54 4c 45 3e  LEError/TITLE
 000cf3  3c 2f 48 45 41 44 3e 0a 3c 42 4f 44 59 3e 0a 3c  /HEAD.BODY.
 000d03  48 31 3e 45 72 72 6f 72 3c 2f 48 31 3e 0a 3c 42  H1Error/H1.B
 000d13  4c 4f 43 4b 51 55 4f 54 45 3e 3c 42 3e 0a 3c 48  LOCKQUOTEB.H
 000d23  52 20 53 49 5a 45 3d 34 3e 3c 50 3e 0a 54 68 65  R SIZE=4P.The
 000d33  20 72 65 71 75 65 73 74 65 64 20 69 74 65 6d 20   requested item 
 000d43  63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 6c 6f 61  could not be loa
 000d53  64 65 64 20 62 79 20 74 68 65 20 70 72 6f 78 79  ded by the proxy
 000d63  2e 3c 50 3e 0a 54 68 69 73 20 4c 6f 63 61 74 69  .P.This Locati
 000d73  6f 6e 20 28 55 52 4c 29 20 69 73 20 6e 6f 74 20  on (URL) is not 
 000d83  72 65 63 6f 67 6e 69 7a 65 64 3a 0a 20 20 66 69  recognized:.  fi
 000d93  6c 65 3a 2f 0a 0a 43 68 65 63 6b 20 74 68 65 20  le:/..Check the 
 000da3  4c 6f 63 61 74 69 6f 6e 20 61 6e 64 20 74 72 79  Location and try
 000db3  20 61 67 61 69 6e 2e 3c 50 3e 0a 0a 3c 48 52 20   again.P..HR 
 000dc3  53 49 5a 45 3d 34 3e 0a 3c 2f 42 3e 3c 2f 42 4c  SIZE=4./B/BL
 000dd3  4f 43 4b 51 55 4f 54 45 3e 0a 0a 3c 50 3e 0a 3c  OCKQUOTE..P.
 000de3  41 44 44 52 45 53 53 3e 50 72 6f 78 79 20 73 65  ADDRESSProxy se
 000df3  72 76 65 72 20 61 74 20 6f 64 73 70 6e 70 72 34  rver at odspnpr4
 000e03  2d 68 6d 65 30 2e 65 78 74 72 61 2e 64 61 69 6d  -hme0.extra.daim
 000e13  6c 65 72 63 68 72 79 73 6c 65 72 2e 63 6f 6d 20  lerchrysler.com 
 000e23  6f 6e 20 70 6f 72 74 20 34 34 33 3c 2f 41 44 44  on port 443/ADD
 000e33  52 45 53 53 3e 0a 3c 2f 42 4f 44 59 3e 3c 2f 48  RESS./BODY/H
 000e43  54 4d 4c 3e 0a   TML.





-- 
Bodo Möller [EMAIL PROTECTED]
PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/0x36d2c658.html
* TU Darmstadt, Theoretische Informatik, Alexanderstr. 10, D-64283 Darmstadt
* Tel. +49-6151-16-6628, Fax +49-6151-16-6036
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL 

Re: [openssl.org #85] 0.9.7 prototype constification problems

2002-06-14 Thread Avery Pennarun via RT


On Thu, Jun 13, 2002 at 01:26:42PM +0200, Bodo Moeller via RT wrote:

 [[EMAIL PROTECTED] - Thu Jun  6 18:39:34 2002]:
  It appears the openssl guys goofed in 0.97beta.  The prototype for the
  d2i_RSAPrivateKey function in 0.9.6c, which I use, is like this:
  
  d2i_RSAPrivateKey(RSA **a, unsigned char **pp, long length);
  
  ie., without a const on the second parameter.  The const should have
  been done like this (I think):
  const unsigned char * const *pp
  ...which would be entirely backwards-compatible with old versions of
  openssl.
 
 Could you explain why you think this would improve compatibility
 (compared with 'const unsigned char **pp', which is how 'pp' should
 be declared in 0.9.7-beta1, although the exact definition is
 hidden behind macros)?

Any variable that could be passed to a function taking unsigned char **
could also be passed to a function taking const unsigned char * const *. 
Thus, using the above declaration would make openssl's api 100%
source-compatible with previous versions, while promising an increased level
of constness.

Using const unsigned char **, however, is not 100% api-compatible, because
you can't safely pass an unsigned char ** to it, for complicated reasons
explained in the URL I sent earlier.

 In fact the second 'const' would be wrong because the pointer that
 'pp' points to is updated to reflect how much of the encoded data
 has been processed by the d2i_... function.  I.e., it is not
 at all constant.

Now, you caught me there.  The change I proposed earlier (adding an additional
const) would fix API compatibility, but promises a level of constness that
you're not actually providing.

Unfortunately, I don't know a way around it: the problem is that the beta1
level of constness looks right, but doesn't _actually_ promise the constness
that it looks like it does, due to the crazy hackery described in the URL I
sent earlier.  It also makes the API incompatible with older versions.  I
can't pass the address of unsigned char *p to the new function.

On the other hand, I can't pass the address of const unsigned char *p to
the old-style function.

Neither situation is desirable... but it looks like you might have to just
use two different functions with two different APIs, unfortunately.  I don't
know another way out.

Have fun,

Avery
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: getpid()

2002-06-14 Thread Bodo Moeller

On Thu, Jun 13, 2002 at 05:20:42PM +0100, Ben Laurie wrote:

 However, the number of calls is astonishing - and must be significantly 
 expensive, too.

Memory debugging *is* expensive.  It is only enabled by default in
debug configurations, where (starting with 0.9.7) it can be disabled
by setting environment variable OPENSSL_DEBUG_MEMORY to off.  (In
non-debug configurations, it can be enabled by setting
OPENSSL_DEBUG_MEMORY to a string other than off.)


-- 
Bodo Möller [EMAIL PROTECTED]
PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/0x36d2c658.html
* TU Darmstadt, Theoretische Informatik, Alexanderstr. 10, D-64283 Darmstadt
* Tel. +49-6151-16-6628, Fax +49-6151-16-6036
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #97] About 0.9.6a(b) and des_encrypt1()

2002-06-14 Thread Jani Taskinen via RT



From CHANGES:

 *) Rename 'des_encrypt' to 'des_encrypt1'.  This avoids the clashes
 with des_encrypt() defined on some operating systems, like Solaris
 and UnixWare.
 [Richard Levitte]


Just wanted to let you guys know, that also
this symbol is in use by Solaris (7), libcrypt:

# nm /usr/lib/libcrypt.a | grep des_encrypt
 U _des_encrypt
des_encrypt.o:
 T _des_encrypt1
 W des_encrypt1
025c T _des_encrypt
 U _des_encrypt1
025c W des_encrypt
01bc t des_encrypt_nolock


--Jani


__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #97] About 0.9.6a(b) and des_encrypt1()

2002-06-14 Thread Geoff Thorpe via RT


On Wed, 8 Aug 2001, [iso-8859-1] Götz Babin-Ebell wrote:

 Richard Levitte - VMS Whacker wrote:
  
  Hmm, it feels like it's really time for a rename (basically, change
  des to DES in all names, and thereby follow the convention used
  everywhere else in OpenSSL), or this becomes an impossible task.
 
 openssl_des_... ?
 
 in the sources we can have a
 #define des_...() openssl_des_...()

If a change is going to be made, it makes sense to bring the naming in line with
the rest of the code, thus DES_*** makes more sense. (IMHO, IANAL, etc :-)

Cheers,
Geoff


__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #97] About 0.9.6a(b) and des_encrypt1()

2002-06-14 Thread Götz Babin-Ebell via RT


Richard Levitte - VMS Whacker wrote:
 
 From: Jani Taskinen [EMAIL PROTECTED]
 
 sniper From CHANGES:
 sniper 
 sniper  *) Rename 'des_encrypt' to 'des_encrypt1'.  This avoids the clashes
 sniper  with des_encrypt() defined on some operating systems, like Solaris
 sniper  and UnixWare.
 sniper  [Richard Levitte]
 sniper 
 sniper
 sniper Just wanted to let you guys know, that also
 sniper this symbol is in use by Solaris (7), libcrypt:
 sniper
 sniper # nm /usr/lib/libcrypt.a | grep des_encrypt
 sniper  U _des_encrypt
 sniper des_encrypt.o:
 sniper  T _des_encrypt1
 sniper  W des_encrypt1
 sniper 025c T _des_encrypt
 sniper  U _des_encrypt1
 sniper 025c W des_encrypt
 sniper 01bc t des_encrypt_nolock
 
 Hmm, it feels like it's really time for a rename (basically, change
 des to DES in all names, and thereby follow the convention used
 everywhere else in OpenSSL), or this becomes an impossible task.

openssl_des_... ?

in the sources we can have a
#define des_...() openssl_des_...()

By

Goetz

-- 
Goetz Babin-Ebell, TC TrustCenter AG, http://www.trustcenter.de
Sonninstr. 24-28, 20097 Hamburg, Germany
Tel.: +49-(0)40 80 80 26 -0,  Fax: +49-(0)40 80 80 26 -126
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #97] About 0.9.6a(b) and des_encrypt1()

2002-06-14 Thread Richard Levitte - VMS Whacker via RT


From: Jani Taskinen [EMAIL PROTECTED]

sniper From CHANGES:
sniper 
sniper  *) Rename 'des_encrypt' to 'des_encrypt1'.  This avoids the clashes
sniper  with des_encrypt() defined on some operating systems, like Solaris
sniper  and UnixWare.
sniper  [Richard Levitte]
sniper 
sniper 
sniper Just wanted to let you guys know, that also
sniper this symbol is in use by Solaris (7), libcrypt:
sniper 
sniper # nm /usr/lib/libcrypt.a | grep des_encrypt
sniper  U _des_encrypt
sniper des_encrypt.o:
sniper  T _des_encrypt1
sniper  W des_encrypt1
sniper 025c T _des_encrypt
sniper  U _des_encrypt1
sniper 025c W des_encrypt
sniper 01bc t des_encrypt_nolock

Hmm, it feels like it's really time for a rename (basically, change
des to DES in all names, and thereby follow the convention used
everywhere else in OpenSSL), or this becomes an impossible task.

For source compatibility, it's of course perfectly possible to provide
macros so older applications don't break immediately.

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
\  SWEDEN   \ or +46-733-72 88 11
Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/
Software Engineer, GemPlus: http://www.gemplus.com/

Unsolicited commercial email is subject to an archival fee of $400.
See http://www.stacken.kth.se/~levitte/mail/ for more info.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #97] About 0.9.6a(b) and des_encrypt1()

2002-06-14 Thread Lutz Jaenicke via RT


[[EMAIL PROTECTED] - Fri Jun 14 12:02:20 2002]:

 
 From CHANGES:
 
  *) Rename 'des_encrypt' to 'des_encrypt1'.  This avoids the clashes
  with des_encrypt() defined on some operating systems, like Solaris
  and UnixWare.
  [Richard Levitte]
 
 
 Just wanted to let you guys know, that also
 this symbol is in use by Solaris (7), libcrypt:

This problem has been resolved for 0.9.7...

Is it worthwile to make a small adjustment for 0.9.6e (in case it will
be released)?

Best regards,
Lutz 

__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: About the des_encrypt1() problem with Solaris..

2002-06-14 Thread Lutz Jaenicke

On Thu, Jun 13, 2002 at 10:58:43PM +0300, Jani Taskinen wrote:
 
 This problem described here: 
 
   http://marc.theaimsgroup.com/?l=openssl-devm=99720385817987w=2
 
 Still exists in 0.9.6d release..when can this be expected to be fixed?

As you will note, I have injected the old thread into the request tracker.

Best regards,
Lutz
-- 
Lutz Jaenicke [EMAIL PROTECTED]
http://www.aet.TU-Cottbus.DE/personen/jaenicke/
BTU Cottbus, Allgemeine Elektrotechnik
Universitaetsplatz 3-4, D-03044 Cottbus
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #87] Ticket #87, #90 resolved (empty fragments for CBC)

2002-06-14 Thread Bodo Moeller via RT


The CBC vulnerability countermeasure that cannot be handled by some
broken SSL/TLS implementations can now be disabled with the new
SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS option, which is also part of
SSL_OP_ALL and thus will be automatically enabled in many OpenSSL
applications designed to be compatible with weird implementations.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #65] 0.9.6d: SSL3_GET_RECORD:wrong version number

2002-06-14 Thread Bodo Moeller via RT


Status was (automatically?) changed from resolved to open by
additional correspondance.  The actual status is resolved.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #34] SSL through Netscape Proxy server

2002-06-14 Thread Bodo Moeller via RT


Not a bug in OpenSSL, should have been sent to openssl-users
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #27] Legalizing OpenSSL in France

2002-06-14 Thread Bodo Moeller via RT


Not an OpenSSL bug, this should be discussed elsewhere (openssl-users).
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #87] openssl 0.9.6b to 0.9.6d with IE5.5 and IE6 and 3DES-CBC-SHA hangs

2002-06-14 Thread \\ E.I.Sarmas \ via RT\



Dear Mr. Moeller,

I totally agree that it is an IE bug but unfortunately
we have to live with IE(!) and so by Microsoft doctrine (!)
it's the other programs that interact with IE that have bugs ...

Seriously, I wish to thank you and the other people in the ssl
development team for your effort and resolve to fix this annoyance,

Thanks a lot,

E.I.Sarmas

- Original Message -
From: Bodo Moeller via RT [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: ÐÝìðôç, 13 Éïõíßïõ 2002 12:18 ìì
Subject: [openssl.org #87] openssl 0.9.6b to 0.9.6d with IE5.5 and IE6 and
3DES-CBC-SHA hangs



 [[EMAIL PROTECTED] - Fri Jun  7 14:22:15 2002]:

  even though Netscape still works, this should be considered a bug
 since
  IE is now broken when in the past it worked fine

 It is a bug in IE, not in OpenSSL.  Note that the problem is avoided
 when using RC4 ciphersuites, and these are typically preferred by most
 clients anyway.  However OpenSSL clients prefer 3DES ciphersuites by
 default, so interoperability problems of OpenSSL clients with broken
 servers must be expected.

 Future versions of OpenSSL will be modified so that the CBC security
 workaround that caused these problems with some broken SSL/TLS
 implementations can be disabled.  We have to decide whether to give
 higher priority to security (enable the workaround by default and let
 applications that don't need it, such is Apache with mod_ssl or
 Apache-SSL, disable it) or to interoperability (disable the workaround
 by default and rely on applications to enable it when it is needed).


__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Linking the libraries.

2002-06-14 Thread Henri van Riel

Hello,

I'm new to openssl (sort of) and I have a problem/question.

I am trying to compile fetchmail-5.9.12 with ssl support but something
strange is happening. Compilation goes ok but when it's all done I do a
'ldd ./fetchmail' and it turns out the libraries are dynamically linked to
the fetchmail binary but with the full filename. The output of ldd says:

  libcrypto.so.0.9.6 = /usr/local/ssl/lib/libcrypto.so.0.9.6

I would expect something like this:

  libcrypto.so.0 = /usr/local/ssl/lib/libcrypto.0

It's the same with libssl (ofcourse). I would expect the linker to use
the symlinks pointing to the 'real' files but somehow it doesn't.

Yes, the symlinks are there, 'make install' created them. I've build the
libraries with './config shared threads; make'.

Is there a solution for this?

-- 
Best regards,
 Henri  mailto:[EMAIL PROTECTED]


__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #97] About 0.9.6a(b) and des_encrypt1()

2002-06-14 Thread Jani Taskinen via RT


On Fri, 14 Jun 2002, Lutz Jaenicke via RT wrote:


[[EMAIL PROTECTED] - Fri Jun 14 12:02:20 2002]:

 
 From CHANGES:
 
  *) Rename 'des_encrypt' to 'des_encrypt1'.  This avoids the clashes
  with des_encrypt() defined on some operating systems, like Solaris
  and UnixWare.
  [Richard Levitte]
 
 
 Just wanted to let you guys know, that also
 this symbol is in use by Solaris (7), libcrypt:

This problem has been resolved for 0.9.7...

Great. 

Is it worthwile to make a small adjustment for 0.9.6e (in case it will
be released)?

If 0.9.7 is due to be released soon (?) then I don't think 
that's necessary..but of course if there will be another
release of 0.9.6 then it would be nice to have this in it.

--Jani


__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #96] bug in config script (gcc 3.1)

2002-06-14 Thread Allen Hopkins via RT


Richard-

Strange.  I guess it's time to compare what we're looking at.
I'm running on a Sun Ultra-60 w/ SunOS 5.8.
I downloaded openssl-0.9.6d.tar.gz from http://www.openssl.org/source/.
I then ran the following command:

./config --prefix=/usr/local/openssl-0.9.6d \
 --openssldir=/usr/local/openssl-0.9.6d

The output from that was:

Operating system: sun4u-whatever-solaris2
./config: test: unknown operator (GCC)

The config script is dated Mar 15 08:47 (which I think is 15:47 GMT,
since I'm in California and we're on Daylight Savings Time).
Its size is 17352 bytes.

The line that errors out for me is line 613:

if [ $OUT = solaris-sparcv9-gcc -a $GCCVER -lt 28 ]

I put the following in front of it to see the value of GCCVER:

echo GCCVER = \$GCCVER\; exit

and got this output:

Operating system: sun4u-whatever-solaris2
GCCVER = gcc (GCC) 31

With the value of GCCVER having embedded whitespace, you can see why
test would give up on it.

I hope this helps.  Let me know if you need anything else from me.

-Allen


Richard Levitte - VMS Whacker via RT wrote:
 
 In message [EMAIL PROTECTED] on Thu, 13 Jun 2002 14:52:11 -0700, 
Allen Hopkins [EMAIL PROTECTED] said:
 
 allenh I'm afraid this was not a fix.  Have you tried it with gcc-3.1?
 allenh I encountered this problem with the 0.9.6d snapshot.
 
 I tried it just now, GCCVER becamse 31, and my output was
 
 --
 gcc (GCC) 3.1.1 20020606 (Debian prerelease)
 Copyright (C) 2002 Free Software Foundation, Inc.
 This is free software; see the source for copying conditions.  There is NO
 warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
 
 --
 
 --
 Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
 Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
 \  SWEDEN   \ or +46-708-26 53 44
 Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED]
 Member of the OpenSSL development team: http://www.openssl.org/
 
 Unsolicited commercial email is subject to an archival fee of $400.
 See http://www.stacken.kth.se/~levitte/mail/ for more info.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



problem config

2002-06-14 Thread Eric Vanborren

Hi openssl-dev,

~~/src/openssl-0.9.6d.src

root@galilee gcc --version
gcc (GCC) 3.1
Copyright (C) 2002 Free Software Foundation, Inc.
This is free software; see the source for copying conditions.  There is
NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR
PURPOSE.

vi config
   383  # figure out if gcc is available and if so we use it otherwise
   384  # we fallback to whatever cc does on the system
   385  GCCVER=`(gcc --version) 2/dev/null`
   386  if [ $GCCVER !=  ]; then
   387CC=gcc
   388# then strip off whatever prefix Cygnus prepends the number
with...
   389GCCVER=`echo $GCCVER | sed 's/^[a-z]*\-//'`
   390GCCVER=`echo $GCCVER | sed 's/(GCC)//'`
   391GCCVER=`echo $GCCVER | sed 's/^[a-z]*//'`
   392# peak single digit before and after first dot, e.g. 2.95.1
gives 29
   393GCCVER=`echo $GCCVER | sed 's/\([0-9]\)\.\([0-9]\).*/\1\2/'`
   394  else
   395CC=cc
   396  fi
...
 
Add line 390, 391

-- 
Regards CETELEM - Equipe système Unix / Xnet.  [2-2329]
Eric Vanborren  20 av. Georges Pompidou - 92595 Levallois Perret -
FRANCE
Tél: +33 1.46.39.2329 - e-mail: [EMAIL PROTECTED]
May The OpenSource be with you !
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #96] bug in config script (gcc 3.1)

2002-06-14 Thread Allen Hopkins

Richard-

Strange.  I guess it's time to compare what we're looking at.
I'm running on a Sun Ultra-60 w/ SunOS 5.8.
I downloaded openssl-0.9.6d.tar.gz from http://www.openssl.org/source/.
I then ran the following command:

./config --prefix=/usr/local/openssl-0.9.6d \
 --openssldir=/usr/local/openssl-0.9.6d

The output from that was:

Operating system: sun4u-whatever-solaris2
./config: test: unknown operator (GCC)

The config script is dated Mar 15 08:47 (which I think is 15:47 GMT,
since I'm in California and we're on Daylight Savings Time).
Its size is 17352 bytes.

The line that errors out for me is line 613:

if [ $OUT = solaris-sparcv9-gcc -a $GCCVER -lt 28 ]

I put the following in front of it to see the value of GCCVER:

echo GCCVER = \$GCCVER\; exit

and got this output:

Operating system: sun4u-whatever-solaris2
GCCVER = gcc (GCC) 31

With the value of GCCVER having embedded whitespace, you can see why
test would give up on it.

I hope this helps.  Let me know if you need anything else from me.

-Allen


Richard Levitte - VMS Whacker via RT wrote:
 
 In message [EMAIL PROTECTED] on Thu, 13 Jun 2002 14:52:11 -0700, 
Allen Hopkins [EMAIL PROTECTED] said:
 
 allenh I'm afraid this was not a fix.  Have you tried it with gcc-3.1?
 allenh I encountered this problem with the 0.9.6d snapshot.
 
 I tried it just now, GCCVER becamse 31, and my output was
 
 --
 gcc (GCC) 3.1.1 20020606 (Debian prerelease)
 Copyright (C) 2002 Free Software Foundation, Inc.
 This is free software; see the source for copying conditions.  There is NO
 warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
 
 --
 
 --
 Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
 Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
 \  SWEDEN   \ or +46-708-26 53 44
 Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED]
 Member of the OpenSSL development team: http://www.openssl.org/
 
 Unsolicited commercial email is subject to an archival fee of $400.
 See http://www.stacken.kth.se/~levitte/mail/ for more info.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #89] missing prototypes for functions

2002-06-14 Thread Lutz Jaenicke via RT


Ok, I have now finished applying the patches including the changed 
prototypes for ASN1 using the DECLARE macro.
Please test the next snapshot (or beta2, which will probably be built 
on Sunday evening).

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #96] problem config

2002-06-14 Thread Eric Vanborren via RT


Hi openssl-dev,

~~/src/openssl-0.9.6d.src

root@galilee gcc --version
gcc (GCC) 3.1
Copyright (C) 2002 Free Software Foundation, Inc.
This is free software; see the source for copying conditions.  There is
NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR
PURPOSE.

vi config
   383  # figure out if gcc is available and if so we use it otherwise
   384  # we fallback to whatever cc does on the system
   385  GCCVER=`(gcc --version) 2/dev/null`
   386  if [ $GCCVER !=  ]; then
   387CC=gcc
   388# then strip off whatever prefix Cygnus prepends the number
with...
   389GCCVER=`echo $GCCVER | sed 's/^[a-z]*\-//'`
   390GCCVER=`echo $GCCVER | sed 's/(GCC)//'`
   391GCCVER=`echo $GCCVER | sed 's/^[a-z]*//'`
   392# peak single digit before and after first dot, e.g. 2.95.1
gives 29
   393GCCVER=`echo $GCCVER | sed 's/\([0-9]\)\.\([0-9]\).*/\1\2/'`
   394  else
   395CC=cc
   396  fi
...
 
Add line 390, 391

-- 
Regards CETELEM - Equipe système Unix / Xnet.  [2-2329]
Eric Vanborren  20 av. Georges Pompidou - 92595 Levallois Perret -
FRANCE
Tél: +33 1.46.39.2329 - e-mail: [EMAIL PROTECTED]
May The OpenSource be with you !
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: can't compile on solaris 9 - gcc

2002-06-14 Thread Lutz Jaenicke

On Thu, Jun 13, 2002 at 03:46:42PM +, Gustavo A. Baratto wrote:
 I'm not being successful in compiling openssl-0.9.6d on solaris 9 with
 gcc 3.1.

We are aware that problems exist with respect to GCC 3.1. Several different
changes to config have been proposed and one fix has already been applied
to the snapshots. Discussion is however not closed, yet:
http://www.aet.tu-cottbus.de/rt2/Ticket/Display.html?id=96

Best regards,
Lutz
-- 
Lutz Jaenicke [EMAIL PROTECTED]
http://www.aet.TU-Cottbus.DE/personen/jaenicke/
BTU Cottbus, Allgemeine Elektrotechnik
Universitaetsplatz 3-4, D-03044 Cottbus
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #96] bug in config script (gcc 3.1)

2002-06-14 Thread Lutz Jaenicke via RT


Different solutions have been proposed and I am not sure whether the 
currently checked in version will finally work.
I am not sure for how long -dumpversion was supported (at least since 
1994 as was reported) and I strongly consider to use -dumpversion.
Richard: you seem to have a beta version of 3.1.1 around. Will its 
output for -dumpversion somehow fit into the model?

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #97] About 0.9.6a(b) and des_encrypt1()

2002-06-14 Thread Lutz Jaenicke via RT


On Fri, Jun 14, 2002 at 08:34:06PM +0200, Jani Taskinen via RT wrote:
 On Fri, 14 Jun 2002, Lutz Jaenicke via RT wrote:
 This problem has been resolved for 0.9.7...
 
 Great. 
 
 Is it worthwile to make a small adjustment for 0.9.6e (in case it will
 be released)?
 
 If 0.9.7 is due to be released soon (?) then I don't think 
 that's necessary..but of course if there will be another
 release of 0.9.6 then it would be nice to have this in it.

There will not be another release of 0.9.6 before 0.9.7 will be out.
We still maintain the 0.9.6 tree, because we anticipate that due to
incompatible changes between 0.9.6 and 0.9.7 several people will stay
with 0.9.6x for some more time, so we are prepared to release another
0.9.6e version, if important bugs are found. It is however not clear,
whether there will really be a 0.9.6e release. If 0.9.7 is accepted
fast by our user base, it will never appear.

The change that is required will break binary compatibility between 0.9.6d
and 0.9.6e (because that's the purpose of the change :-). Even though
we try to make clear that we don't promise binary compatibility, a lot
of people expect it. I am therefore a bit reluctant to make the change
and will keep the issue as an open ticket in the request tracker, until
0.9.6e becomes reality or some other member of the team makes a final
decision.

Best regards,
Lutz
-- 
Lutz Jaenicke [EMAIL PROTECTED]
http://www.aet.TU-Cottbus.DE/personen/jaenicke/
BTU Cottbus, Allgemeine Elektrotechnik
Universitaetsplatz 3-4, D-03044 Cottbus
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #96] bug in config script (gcc 3.1)

2002-06-14 Thread Allen Hopkins via RT


I agree that simply using -dumpversion makes more sense, on the
assumption that it will always only output the number.
--version appears to be intended to be human-readable, not
machine-readable, and its format may change at any time, as it
just did.  Why keep adding sed commands that say, oh, and if
it has this in front of it, get rid of that, too?  It might just
break again with the next gcc version.

Having said that, I think I'll bow out of the discussion.  I'm
just an end-user, and may never have to install it again.

-Allen

Lutz Jaenicke via RT wrote:
 
 Different solutions have been proposed and I am not sure whether the
 currently checked in version will finally work.
 I am not sure for how long -dumpversion was supported (at least since
 1994 as was reported) and I strongly consider to use -dumpversion.
 Richard: you seem to have a beta version of 3.1.1 around. Will its
 output for -dumpversion somehow fit into the model?
 
 Best regards,
 Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



OpenSSL engine ctrl: handling of strings

2002-06-14 Thread Gtz Babin-Ebell

Hello folks,

There is a possible problem with the string param handling of ENGINE_ctrl():
(At least I will get a problem...)

In the ..._ctrl()-Function of the engines a passed string
is only referenced and not copyed.
This is bad if the buffer with the passed data is overwritten...

Since in the BIO interface passed string params are copied
to an internal (allocated) buffer (at least in the modules I
checked...), the ENGINE -interface should act the same way.

Please have a look at the attached patch...

Bye

Goetz

-- 
Goetz Babin-Ebell, TC TrustCenter AG, http://www.trustcenter.de
Sonninstr. 24-28, 20097 Hamburg, Germany
Tel.: +49-(0)40 80 80 26 -0,  Fax: +49-(0)40 80 80 26 -126


diff -r openssl-0.9.7-stable-SNAP-20020613/crypto/engine/eng_dyn.c 
openssl-0.9.7-stable-SNAP-20020613_new/crypto/engine/eng_dyn.c
159a160,163
 if (ctx-DYNAMIC_LIBNAME)
OPENSSL_free((void*)(ctx-DYNAMIC_LIBNAME));
 if (ctx-engine_id)
OPENSSL_free((void*)(ctx-engine_id));
172c176
   if(!ctx)
---
   if(!c)
313,314c317,323
   ctx-DYNAMIC_LIBNAME = (const char *)p;
   return 1;
---
 if (ctx-DYNAMIC_LIBNAME)
OPENSSL_free((void*)(ctx-DYNAMIC_LIBNAME));
 if (p)
ctx-DYNAMIC_LIBNAME = BUF_strdup(p);
 else
ctx-DYNAMIC_LIBNAME = NULL;
 return ctx-DYNAMIC_LIBNAME != NULL ? 1 : 0;
322,323c331,337
   ctx-engine_id = (const char *)p;
   return 1;
---
 if (ctx-engine_id)
OPENSSL_free((void*)(ctx-engine_id));
 if (p)
ctx-engine_id = BUF_strdup(p);
 else
ctx-engine_id = NULL;
 return ctx-engine_id != NULL ? 1 : 0;
diff -r openssl-0.9.7-stable-SNAP-20020613/crypto/engine/hw_4758_cca.c 
openssl-0.9.7-stable-SNAP-20020613_new/crypto/engine/hw_4758_cca.c
127,128c127,147
 static const char def_CCA4758_LIB_NAME[] = CCA_LIB_NAME;
 static const char *CCA4758_LIB_NAME = def_CCA4758_LIB_NAME;
---
 static const char *CCA4758_LIB_NAME = NULL;
 static const char *get_CCA4758_LIB_NAME()
 {
if (CCA4758_LIB_NAME)
   return CCA4758_LIB_NAME;
else
   return CCA_LIB_NAME;
 }
 static void free_CCA4758_LIB_NAME()
 {
if (CCA4758_LIB_NAME)
   OPENSSL_free((char*)CCA4758_LIB_NAME);
CCA4758_LIB_NAME = NULL;
 }
 static long set_CCA4758_LIB_NAME(const char *newName)
 {
if (CCA4758_LIB_NAME)
   OPENSSL_free((char*)CCA4758_LIB_NAME);
return (CCA4758_LIB_NAME = BUF_strdup(newName)) != NULL ? 1 : 0;
 }
 
234a254
 free_CCA4758_LIB_NAME();
246c266
   dso = DSO_load(NULL, CCA4758_LIB_NAME , NULL, 0);
---
   dso = DSO_load(NULL, get_CCA4758_LIB_NAME() , NULL, 0);
302c322,323
   if(dso)
---
   free_CCA4758_LIB_NAME();
   if(!dso)
322c343
   return 1;
---
 return 1;
343,344c364
   CCA4758_LIB_NAME = (const char *)p;
   return 1;
---
   return set_CCA4758_LIB_NAME((const char*)p);
diff -r openssl-0.9.7-stable-SNAP-20020613/crypto/engine/hw_aep.c 
openssl-0.9.7-stable-SNAP-20020613_new/crypto/engine/hw_aep.c
73a74
 #include openssl/buffer.h
366c367,386
 static const char *AEP_LIBNAME = aep;
---
 static const char *AEP_LIBNAME = NULL;
 static const char *get_AEP_LIBNAME()
 {
if (AEP_LIBNAME)
   return AEP_LIBNAME;
else
   return aep;
 }
 static void free_AEP_LIBNAME()
 {
if (AEP_LIBNAME)
   OPENSSL_free((char*)AEP_LIBNAME);
AEP_LIBNAME = NULL;
 }
 static long set_AEP_LIBNAME(const char *newName)
 {
if (AEP_LIBNAME)
   OPENSSL_free((char*)AEP_LIBNAME);
return (AEP_LIBNAME = BUF_strdup(newName)) != NULL ? 1 : 0;
 }
415c435
   aep_dso = DSO_load(NULL, AEP_LIBNAME, NULL, 0);
---
   aep_dso = DSO_load(NULL, get_AEP_LIBNAME(), NULL, 0);
476a497
   free_AEP_LIBNAME();
485a507
   free_AEP_LIBNAME();
552,553c574
   AEP_LIBNAME = (const char *)p;
   return 1;
---
   return set_AEP_LIBNAME((const char*)p);
diff -r openssl-0.9.7-stable-SNAP-20020613/crypto/engine/hw_atalla.c 
openssl-0.9.7-stable-SNAP-20020613_new/crypto/engine/hw_atalla.c
289,290c289,309
 static const char def_ATALLA_LIBNAME[] = atasi;
 static const char *ATALLA_LIBNAME = def_ATALLA_LIBNAME;
---
 static const char *ATALLA_LIBNAME = NULL;
 static const char *get_ATALLA_LIBNAME()
 {
if (ATALLA_LIBNAME)
   return ATALLA_LIBNAME;
else
   return atasi;
 }
 static void free_ATALLA_LIBNAME()
 {
if (ATALLA_LIBNAME)
   OPENSSL_free((char*)ATALLA_LIBNAME);
ATALLA_LIBNAME = NULL;
 }
 static long set_ATALLA_LIBNAME(const char *newName)
 {
if (ATALLA_LIBNAME)
   OPENSSL_free((char*)ATALLA_LIBNAME);
return (ATALLA_LIBNAME = BUF_strdup(newName) )!= NULL ? 1 : 0;
 }
 
301a321
   free_ATALLA_LIBNAME();
327c347
   

[openssl.org #98] OpenSSL engine ctrl: handling of strings

2002-06-14 Thread Götz Babin-Ebell via RT


__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: can't compile on solaris 9 - gcc

2002-06-14 Thread Gustavo A. Baratto

Thank you for your answer...

I got the latest CVS and the config works fine now.

great work you guys are doing.

On Fri, 2002-06-14 at 19:09, Lutz Jaenicke wrote:
 On Thu, Jun 13, 2002 at 03:46:42PM +, Gustavo A. Baratto wrote:
  I'm not being successful in compiling openssl-0.9.6d on solaris 9 with
  gcc 3.1.
 
 We are aware that problems exist with respect to GCC 3.1. Several different
 changes to config have been proposed and one fix has already been applied
 to the snapshots. Discussion is however not closed, yet:
 http://www.aet.tu-cottbus.de/rt2/Ticket/Display.html?id=96
 
 Best regards,
   Lutz
 -- 
 Lutz Jaenicke [EMAIL PROTECTED]
 http://www.aet.TU-Cottbus.DE/personen/jaenicke/
 BTU Cottbus, Allgemeine Elektrotechnik
 Universitaetsplatz 3-4, D-03044 Cottbus
 __
 OpenSSL Project http://www.openssl.org
 Development Mailing List   [EMAIL PROTECTED]
 Automated List Manager   [EMAIL PROTECTED]
-- 

--
 Gustavo Baratto - Programming and Technical Support
 [EMAIL PROTECTED] * (604) 638-2525 ext. 408

 Technical support web-site: http://support.superb.net
 Superb Internet Corp. Ahead of the Rest

-

__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #97] About 0.9.6a(b) and des_encrypt1()

2002-06-14 Thread Jani Taskinen via RT


On Fri, 14 Jun 2002, Lutz Jaenicke via RT wrote:

There will not be another release of 0.9.6 before 0.9.7 will be out.
We still maintain the 0.9.6 tree, because we anticipate that due to
incompatible changes between 0.9.6 and 0.9.7 several people will stay
with 0.9.6x for some more time, so we are prepared to release another

Perfectly understandable. btw. is there any list of those
changes anywhere? Just thinking if there are some issues
we should be aware of with PHP's openssl extension..

The change that is required will break binary compatibility between 0.9.6d
and 0.9.6e (because that's the purpose of the change :-). Even though
we try to make clear that we don't promise binary compatibility, a lot

Heh, of course. 

of people expect it. I am therefore a bit reluctant to make the change
and will keep the issue as an open ticket in the request tracker, until
0.9.6e becomes reality or some other member of the team makes a final
decision.

For me it's okay to close this. I've already told the people
who reported this problem to bugs.php.net that this is fixed in 
openssl 0.9.7.. :)

--Jani


__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[openssl.org #97] About 0.9.6a(b) and des_encrypt1()

2002-06-14 Thread Lutz Jaenicke via RT


[[EMAIL PROTECTED] - Fri Jun 14 22:02:06 2002]:

 On Fri, 14 Jun 2002, Lutz Jaenicke via RT wrote:
 
 There will not be another release of 0.9.6 before 0.9.7 will be out.
 We still maintain the 0.9.6 tree, because we anticipate that due to
 incompatible changes between 0.9.6 and 0.9.7 several people will stay
 with 0.9.6x for some more time, so we are prepared to release another
 
 Perfectly understandable. btw. is there any list of those
 changes anywhere? Just thinking if there are some issues
 we should be aware of with PHP's openssl extension..

There is a change in the EVP interface: appliations must now call
EVP_CIPHER_CTX_cleanup() explicitly. Up to and including 0.9.6x,
all data was part of the EVP_CIPHER_CTX, starting with 0.9.7, some
data are allocated on the fly and memory leaks may occur, if the
cleanup is not called.
The OID (Object Identifier) table has experienced some changes to
become conformant to RFC2256 (LDAP). Some entries had to be renamed.
 
 For me it's okay to close this. I've already told the people
 who reported this problem to bugs.php.net that this is fixed in 
 openssl 0.9.7.. :)

Ok, case closed.
   Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: cvs commit: openssl/crypto/evp c_all.c evp.h

2002-06-14 Thread Richard Levitte - VMS Whacker

In message [EMAIL PROTECTED] on Fri, 14 Jun 2002 20:59:59 
+0200 (MET DST), [EMAIL PROTECTED] said:

jaenicke   diff -u -r1.7.8.1 -r1.7.8.2
jaenicke   --- c_all.c 2002/02/23 02:09:25 1.7.8.1
jaenicke   +++ c_all.c 2002/06/14 18:59:53 1.7.8.2
jaenicke   @@ -61,6 +61,7 @@
jaenicke#include openssl/evp.h
jaenicke
jaenicke#undef OpenSSL_add_all_algorithms
jaenicke   +void OpenSSL_add_all_algorithms(void);
jaenicke
jaenickevoid OpenSSL_add_all_algorithms(void)
jaenicke   {

Please explain why you need to declare that function just before you
define it.  I can't see how that makes sense...

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
\  SWEDEN   \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See http://www.stacken.kth.se/~levitte/mail/ for more info.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #96] bug in config script (gcc 3.1)

2002-06-14 Thread Richard Levitte - VMS Whacker

In message [EMAIL PROTECTED] on Fri, 14 Jun 2002 21:14:43 +0200 
(METDST), Lutz Jaenicke via RT [EMAIL PROTECTED] said:

rt Richard: you seem to have a beta version of 3.1.1 around. Will its 
rt output for -dumpversion somehow fit into the model?

: ; gcc -dumpversion
3.1.1


I see no problem.

-- 
Richard Levitte   \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken  \ S-168 35  BROMMA  \ T: +46-8-26 52 47
\  SWEDEN   \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See http://www.stacken.kth.se/~levitte/mail/ for more info.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: [openssl.org #75] DJGPP (DOS) Patch for 0.9.7

2002-06-14 Thread Doug Kaufman

On Thu, 13 Jun 2002, Doug Kaufman wrote:

 On Thu, 13 Jun 2002, Richard Levitte via RT wrote:
 
  I finally committed most of your changes.  Please download the next 
  snapshot of 0.9.7 and check that it works as intended.
  
  I'm keeping this ticket open until you have confirmed that it works 
  (perhaps after further changes).
 
 Thanks. I'll try to do this in the next few days.

The snapshot doesn't work under DJGPP, but I think that this patch
will fix it. There were several problems. In Configure, you tried to
use ENV{DJDIR}, but this puts in a DOS style path such as c:/djgpp.
The extra : throws off each of the subsequent parameters by one
field. This was one of the reasons that the /dev/env notation was
developed. make depend gave quite a few warnings, since the include
directives from CFLAG were not utilized. This led to a number of
header files not being found under DJGPP (and presumably for anyone
else not using standard locations for header files). This patch
adds the CFLAG directives for make depend. Lastly, as I mentioned
previously, make depend doesn't fix the problem of no testfiles for
excluded algorithms, so compilation stops with errors in the test
directory, even after running make depend.

I think I finally came up with an acceptable method of putting the
header and test files for excluded algoritms in include/openssl and
test respectively. If this is accepted, there should be no need to
run make depend after excluding algorithms. I didn't put it in the
patch, but I would consider removing the notice to run make depend,
which was just added.

I also found a problem I had previously overlooked in
crypto/engine/hw_aep.c. Which MSDOS compiler needs the section that
doesn't apply to DJGPP?

With this patch, the snapshot from 13 June does Configure, make, and
make test without problems under DJGPP. make depend also completes
without warnings, but it doesn't seem necessary to run it.

Patch attached to avoid problems with long lines in the archive.
Doug
__ 
Doug Kaufman
Internet: [EMAIL PROTECTED]


--- openssl-0.9.7/Configure.orig2002-06-13 22:07:24.0 +

+++ openssl-0.9.7/Configure 2002-06-14 20:03:22.0 +

@@ -517,7 +517,7 @@

 Cygwin, gcc:-DTERMIOS -DL_ENDIAN -fomit-frame-pointer -O3 -m486 
-Wall:::CYGWIN32::BN_LLONG ${x86_gcc_des} 
${x86_gcc_opts}:${x86_out_asm}:win32:cygwin-shared:::.dll,

 

 # DJGPP

-DJGPP, gcc:-I/dev/env/DJDIR/watt32/inc -DTERMIOS -DL_ENDIAN -fomit-frame-pointer 
-O2 -Wall:::MSDOS:-L$ENV{DJDIR}/watt32/lib -lwatt:BN_LLONG ${x86_gcc_des} 
${x86_gcc_opts}::,

+DJGPP, gcc:-I/dev/env/DJDIR/watt32/inc -DTERMIOS -DL_ENDIAN -fomit-frame-pointer 
+-O2 -Wall:::MSDOS:-L/dev/env/DJDIR/watt32/lib -lwatt:BN_LLONG ${x86_gcc_des} 
+${x86_gcc_opts}::,

 

 # Ultrix from Bernhard Simon [EMAIL PROTECTED]

 ultrix-cc,cc:-std1 -O -Olimit 1000 -DL_ENDIAN::(unknown):::,

@@ -1438,10 +1438,14 @@

 } else {

my $make_command = make -f Makefile.ssl PERL=\'$perl\';

my $make_targets = ;

+   my $skip_dir;

$make_targets .=  links if $symlink;

$make_targets .=  depend if $depflags ne   $make_depend;

(system $make_command.$make_targets) == 0 or exit $?

if $make_targets ne ;

+   foreach $skip_dir (@skip) {

+   system (cd crypto/$skip_dir; make links PERL=\'$perl\' -f Makefile.ssl);

+}

if ( $perl =~ m@^/@) {

dofile(tools/c_rehash,$perl,'^#!/', '#!%s','^my \$dir;$', 'my $dir = ' 
. $openssldir . ';');

dofile(apps/der_chop,$perl,'^#!/', '#!%s');

--- openssl-0.9.7/Makefile.org.orig 2002-06-12 05:02:08.0 -0800

+++ openssl-0.9.7/Makefile.org  2002-06-14 07:52:36.0 -0800

@@ -598,7 +598,7 @@

do \

if [ -d $$i ]; then \

(cd $$i  echo making dependencies $$i...  \

-   $(MAKE) SDIRS='${SDIRS}' DEPFLAG='${DEPFLAG}' 
MAKEDEPPROG='${MAKEDEPPROG}' KRB5_INCLUDES='${KRB5_INCLUDES}' PERL='${PERL}' depend ) 
|| exit 1; \

+   $(MAKE) SDIRS='${SDIRS}' CFLAG='${CFLAG}' DEPFLAG='${DEPFLAG}' 
+MAKEDEPPROG='${MAKEDEPPROG}' KRB5_INCLUDES='${KRB5_INCLUDES}' PERL='${PERL}' depend ) 
+|| exit 1; \

fi; \

done;

 

--- openssl-0.9.7/crypto/Makefile.ssl.orig  2002-06-10 04:04:58.0 -0800

+++ openssl-0.9.7/crypto/Makefile.ssl   2002-06-14 07:38:20.0 -0800

@@ -141,7 +141,7 @@

@for i in $(SDIRS) ;\

do \

(cd $$i  echo making depend in crypto/$$i...  \

-   $(MAKE) MAKEFILE='${MAKEFILE}' INCLUDES='${INCLUDES}' DEPFLAG='${DEPFLAG}' 
PERL='${PERL}' depend ); \

+   $(MAKE) MAKEFILE='${MAKEFILE}' INCLUDES='${INCLUDES}' CFLAG='${CFLAG}' 
+DEPFLAG='${DEPFLAG}' PERL='${PERL}' depend ); \

done;

 

 clean:

--- openssl-0.9.7/crypto/engine/hw_aep.c.orig   2002-03-07 20:07:44.0 +

+++ openssl-0.9.7/crypto/engine/hw_aep.c

Re: [openssl.org #75] DJGPP (DOS) Patch for 0.9.7

2002-06-14 Thread Doug Kaufman

On Fri, 14 Jun 2002, Doug Kaufman wrote:

 With this patch, the snapshot from 13 June does Configure, make, and
 make test without problems under DJGPP. make depend also completes
 without warnings, but it doesn't seem necessary to run it.
 
 Patch attached to avoid problems with long lines in the archive.

It looks like I sent a patch with DOS eol's. Here is the patch in better
format. Sorry.
  Doug
__ 
Doug Kaufman
Internet: [EMAIL PROTECTED]


--- openssl-0.9.7/Configure.orig2002-06-13 22:07:24.0 +
+++ openssl-0.9.7/Configure 2002-06-14 20:03:22.0 +
@@ -517,7 +517,7 @@
 Cygwin, gcc:-DTERMIOS -DL_ENDIAN -fomit-frame-pointer -O3 -m486 
-Wall:::CYGWIN32::BN_LLONG ${x86_gcc_des} 
${x86_gcc_opts}:${x86_out_asm}:win32:cygwin-shared:::.dll,
 
 # DJGPP
-DJGPP, gcc:-I/dev/env/DJDIR/watt32/inc -DTERMIOS -DL_ENDIAN -fomit-frame-pointer 
-O2 -Wall:::MSDOS:-L$ENV{DJDIR}/watt32/lib -lwatt:BN_LLONG ${x86_gcc_des} 
${x86_gcc_opts}::,
+DJGPP, gcc:-I/dev/env/DJDIR/watt32/inc -DTERMIOS -DL_ENDIAN -fomit-frame-pointer 
+-O2 -Wall:::MSDOS:-L/dev/env/DJDIR/watt32/lib -lwatt:BN_LLONG ${x86_gcc_des} 
+${x86_gcc_opts}::,
 
 # Ultrix from Bernhard Simon [EMAIL PROTECTED]
 ultrix-cc,cc:-std1 -O -Olimit 1000 -DL_ENDIAN::(unknown):::,
@@ -1438,10 +1438,14 @@
 } else {
my $make_command = make -f Makefile.ssl PERL=\'$perl\';
my $make_targets = ;
+   my $skip_dir;
$make_targets .=  links if $symlink;
$make_targets .=  depend if $depflags ne   $make_depend;
(system $make_command.$make_targets) == 0 or exit $?
if $make_targets ne ;
+   foreach $skip_dir (@skip) {
+   system (cd crypto/$skip_dir; make links PERL=\'$perl\' -f Makefile.ssl);
+}
if ( $perl =~ m@^/@) {
dofile(tools/c_rehash,$perl,'^#!/', '#!%s','^my \$dir;$', 'my $dir = ' 
. $openssldir . ';');
dofile(apps/der_chop,$perl,'^#!/', '#!%s');
--- openssl-0.9.7/Makefile.org.orig 2002-06-12 05:02:08.0 -0800
+++ openssl-0.9.7/Makefile.org  2002-06-14 07:52:36.0 -0800
@@ -598,7 +598,7 @@
do \
if [ -d $$i ]; then \
(cd $$i  echo making dependencies $$i...  \
-   $(MAKE) SDIRS='${SDIRS}' DEPFLAG='${DEPFLAG}' 
MAKEDEPPROG='${MAKEDEPPROG}' KRB5_INCLUDES='${KRB5_INCLUDES}' PERL='${PERL}' depend ) 
|| exit 1; \
+   $(MAKE) SDIRS='${SDIRS}' CFLAG='${CFLAG}' DEPFLAG='${DEPFLAG}' 
+MAKEDEPPROG='${MAKEDEPPROG}' KRB5_INCLUDES='${KRB5_INCLUDES}' PERL='${PERL}' depend ) 
+|| exit 1; \
fi; \
done;
 
--- openssl-0.9.7/crypto/Makefile.ssl.orig  2002-06-10 04:04:58.0 -0800
+++ openssl-0.9.7/crypto/Makefile.ssl   2002-06-14 07:38:20.0 -0800
@@ -141,7 +141,7 @@
@for i in $(SDIRS) ;\
do \
(cd $$i  echo making depend in crypto/$$i...  \
-   $(MAKE) MAKEFILE='${MAKEFILE}' INCLUDES='${INCLUDES}' DEPFLAG='${DEPFLAG}' 
PERL='${PERL}' depend ); \
+   $(MAKE) MAKEFILE='${MAKEFILE}' INCLUDES='${INCLUDES}' CFLAG='${CFLAG}' 
+DEPFLAG='${DEPFLAG}' PERL='${PERL}' depend ); \
done;
 
 clean:
--- openssl-0.9.7/crypto/engine/hw_aep.c.orig   2002-03-07 20:07:44.0 +
+++ openssl-0.9.7/crypto/engine/hw_aep.c2002-06-14 20:22:30.0 +
@@ -60,7 +60,7 @@
 #include string.h
 
 #include openssl/e_os2.h
-#ifndef OPENSSL_SYS_MSDOS
+#if !defined(OPENSSL_SYS_MSDOS) || defined(__DJGPP__)
 #include sys/types.h
 #include unistd.h
 #else
--- openssl-0.9.7/util/domd.orig2002-06-05 00:09:16.0 -0800
+++ openssl-0.9.7/util/domd 2002-06-14 07:54:22.0 -0800
@@ -17,7 +17,7 @@
 if [ $MAKEDEPEND = gcc ]; then
 sed -e '/^# DO NOT DELETE.*/,$d'  Makefile.ssl  Makefile.tmp
 echo '# DO NOT DELETE THIS LINE -- make depend depends on it.'  Makefile.tmp
-gcc -D OPENSSL_DOING_MAKEDEPEND -M $@  Makefile.tmp
+gcc -D OPENSSL_DOING_MAKEDEPEND -M ${CFLAG} $@  Makefile.tmp
 ${PERL} $TOP/util/clean-depend.pl  Makefile.tmp  Makefile.new
 rm -f Makefile.tmp
 else