With the introduction of public key cryptography into the Network Time
Protocol (NTP v4, cf. http://www.ntp.org/), the current version of NTP
became a heavy user of OpenSSL.
NTP developers strive to keep the sources warning-free with gcc (using
-Wall -Wcast-qual -Wmissing-prototypes -Wpointer-ari
I get it, Think you very much.
- Original Message -
From: "Richard Levitte via RT" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Thursday, August 15, 2002 5:20 PM
Subject: [openssl.org #221] for ARM
>
> [[EMAIL PROTECTED] - Wed Aug 14 10:43:15 2002]:
>
>
[[EMAIL PROTECTED] - Mon Aug 12 17:59:26 2002]:
> This mail is regarding CERT-23 that was reported recently.
>
> As per the CERT, to fix the reported vulnerabilities, either we
> should
> upgrade to version Openssl09.6.e or apply the patch from version
> Openssl0.9.6d.
Yes.
>
[[EMAIL PROTECTED] - Thu Aug 8 09:43:45 2002]:
> I'm trying to install open-ssh 34p1 on an Aix server, running 4.3.3..
> I compiled openssh 0.9.6d and zlib 1.1.4. on the server , and also
>created
> the a bff pancake using the contrib/aix/buildbff.sh script.
> I can't start sshd either ins
[jaenicke - Tue Aug 13 15:16:11 2002]:
> On Mon, Aug 12, 2002 at 06:44:26PM +0200, Geoff Thorpe via RT wrote:
> > I think it's unlikely, but I'd guess off the top of my head that
> > something like the following would be less risky;
> >
> > if (a->sessions != NULL)
> >
[[EMAIL PROTECTED] - Tue Aug 6 17:38:38 2002]:
>
> nexus@thune[4:34pm]src/openssl/openssl-0.9.7-beta3(539) grep rt2.html
README
> (http://www.openssl.org/rt2.html) by mail to:
>
>
> should be org/support/rt2
Thanks, fixed.
Lutz
How about adding a high-level function in 0.9.7 a la SHA1() and MD5(), for
example EVP_Decode() and EVP_Encode()? I suspect that a majority if base 64
encodes/decodes are on a single chunk so the Init/Update/Final/defining EVP
context mechanism is overkill at the app level.
Chris Brook
-Ori
While some OpenSSL "objects" (DH, DSA, RSA) offer an *_up_ref function
to increase the reference count, others have their internal structure
publicly available (EVP_PKEY, X509, etc), so you can use CRYPTO_add() to
increase the reference count.
In the process of writing wrapper classes for vari
[[EMAIL PROTECTED] - Fri Aug 16 13:44:38 2002]:
> "Unchecked return from gmtime in ASN1 time set routine can cause
core
> dump on
> Windows"
[...]
> Those hundred years in the -days argument seem to bee too much for
> Windows. The
> time value t in the
> ASN1_UTCTIME *ASN1_UTCTIME_set(ASN
Hello all
"Unchecked return from gmtime in ASN1 time set routine can cause core dump on
Windows"
I found this problem when debugging 'nmake test' for Net::SSLeay.
openssl is called:
openssl.exe req
-config examples/req.conf
-x509
-day
> Note that the solaris-sparcv9-cc and solaris-sparcv9-gcc configurations
> actually use just sparcv8plus code (32 bit); see Configure.
I did not know that, since I looked at config only, but not at Configure. But still:
is it assured that every sun4u machine has the
sparcv8plus instruction se
On Fri, Aug 16, 2002 at 09:34:10AM +0200, [EMAIL PROTECTED] wrote:
> ulf 16-Aug-2002 09:34:09
>
> Modified:support faq.wml
> Log:
> hm...
>
> Revision ChangesPath
> 1.3 +1 -1 openssl-web/support/faq.wml
>
> Index: faq.wml
>
This ticket is resolved.
--
Richard Levitte
[EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager
In message <[EMAIL PROTECTED]> on Thu, 15 Aug
2002 19:17:27 -0700 (PDT), Doug Kaufman <[EMAIL PROTECTED]> said:
dkaufman> I recently tried to build the August 9th snapshot of openssl 0.9.7 on
dkaufman> a sun sparc machine running sunos 4.1.3_U1. This failed in several
dkaufman> areas. Here are
In message <[EMAIL PROTECTED]> on Thu, 15 Aug
2002 18:53:11 -0700 (PDT), Doug Kaufman <[EMAIL PROTECTED]> said:
dkaufman> I recently tried to compile the August 9th snapshot of openssl 0.9.7
dkaufman> with static zlib enabled. The build failed because Configure only adds
dkaufman> "-lz" for dyn
On Thu, Aug 15, 2002 at 04:01:57PM +0200, [EMAIL PROTECTED] wrote:
> I have read your OpenSSL Security Advisory (30 July 2002), where there is
> the recommendation to upgrade to OpenSSL 0.9.6e for those using 0.9.6d and
> earlier.
>
> We are using OpenSSL version 0.9.6a-9 and OpenSSH version 2.9
I recently tried to build the August 9th snapshot of openssl 0.9.7 on
a sun sparc machine running sunos 4.1.3_U1. This failed in several
areas. Here are the changes I made to allow it to compile, but I am
not sure that these are the correct fixes. The main problems: this
version of sunos doesn't
I recently tried to compile the August 9th snapshot of openssl 0.9.7
with static zlib enabled. The build failed because Configure only adds
"-lz" for dynamic zlib. I think that this patch fixes the problem.
Doug
--- openssl-0.9.7-beta3/Configure.orig Thu Aug 1 14:06:26
18 matches
Mail list logo