I'm also working on IPv6 support (also for the openssl s_client and
s_server apps). I use code like
#if OPENSSL_USE_IPV6
struct sockaddr_storage server, client;
#else
struct sockaddr_in server, client;
#endif
This should be portable.
Best regards
Michael
On Sep 18, 2009, at 5:02
On Fri, Sep 18, 2009 at 4:40 AM, Stephen Henson via RT wrote:
>> [openssl-...@openssl.org - Thu Sep 17 16:32:23 2009]:
>>
>> Hi, list
>> I downloaded OpenSSL 1.0 beta3 and found a bug in the function
>> BIO_get_accept_socket(), when dealing with an IPv6 address.
>>
>> The line below copies the con
On Fri, Sep 18, 2009 at 4:40 AM, Stephen Henson via RT wrote:
>> [openssl-...@openssl.org - Thu Sep 17 16:32:23 2009]:
>>
>> Hi, list
>> I downloaded OpenSSL 1.0 beta3 and found a bug in the function
>> BIO_get_accept_socket(), when dealing with an IPv6 address.
>>
>> The line below copies the con
I've checked the beta3 code against the code we use (successfully).
In aes, the only differences are entry point changes caused by IBM
namespacing our variant of OpenSSL.
In sha1 there's an additional .align 16 directive here in Beta3
.globl sha1_block_data_order
.type sha1_block_data_order,
> [openssl-...@openssl.org - Thu Sep 17 16:32:23 2009]:
>
> Hi, list
> I downloaded OpenSSL 1.0 beta3 and found a bug in the function
> BIO_get_accept_socket(), when dealing with an IPv6 address.
>
> The line below copies the content of `res->ai_addr' to `server', but
> sizeof(server) = 16, while
On Thu, Sep 17, 2009, john blair wrote:
> Version information is missing from win64 dlls for openssl-0.9.8j,
> openssl-0.9.8k. The following patch should fix this:
> --- openssl-0.9.8k.orig\util\mk1mf.pl Thu Sep 17 11:32:28 2009
> +++ openssl-0.9.8k\util\mk1mf.pl Thu Sep 17 11:48:17 2009
> @@ -86
Im having trouble getting the linkage of using the bio pair for an ssl server
client.
Bio pair seems to be the way I should code my non blocking server. There
are plenty of examples of blocking client and server code out there , and I
have reviewed the ssltest.c application. Not sure what I am
Version information is missing from win64 dlls for openssl-0.9.8j,
openssl-0.9.8k. The following patch should fix this:
--- openssl-0.9.8k.orig\util\mk1mf.pl Thu Sep 17 11:32:28 2009
+++ openssl-0.9.8k\util\mk1mf.pl Thu Sep 17 11:48:17 2009
@@ -863,7 +863,7 @@
}
# hack to add version info on
>> Could you complement back-trace with 'info reg' output?
>
> (gdb) bt
> #0 _x86_64_Camellia_encrypt () at cmll-x86_64.s:74
> #1 0x77a7a4b4 in Camellia_cbc_encrypt () at cmll-x86_64.s:1686
> #2 0x7fffca30 in ?? ()
> #3 0x0068e190 in ?? ()
> #4 0x in ??
Ok I fixed it. My bad server code,ugh!
--- On Thu, 9/17/09, gary clark wrote:
> From: gary clark
> Subject: Explanation of output strange characters in openSSL
> To: openssl-dev@openssl.org
> Date: Thursday, September 17, 2009, 9:24 AM
> Hello,
>
> I'm passing information from a client to a s
Hello,
I'm passing information from a client to a server via open-ssl. Its just file
of ascii characters nothing fancy.
At the receving server side I dump out the data. I noticed that some of the
data is not lost, but it looks like data is inserted to the stream.
I have no idea what it could be
Doesn't help much, but we do use that code, and at least slightly older
versions do compile and run on 64 bit Z.
(I had to backport it from a later OpenSSL to 0.9.8, so I can't be sure I'm
using exactly the same asm at this point).
I'll double check tomorrow and see if there are differences betwe
> I kicked off some builds last night as I was curious as to the answer to
> the question - 0.9.8d fails in make test, 0.9.8k passes in make test.
The 1.0.0 beta 3 fails with the SHA1 asm code and in the AES asm code.
I haven't had a chance to look into this in any detail - just noting that the
I'll be moving on to an HTTPS client next so I may be able to test the same
point in the TLS handshake for the TCP case.
I don't have a time estimate for this work yet.
Regards,
David
-Original Message-
From: Alan DeKok via RT [mailto:r...@openssl.org]
Sent: Wednesday, September 09, 20
14 matches
Mail list logo