Re: Symmetric algorithms with Cell architecture

2010-04-06 Thread Peter Waltenberg
http://www.ibm.com/developerworks/power/library/pa-cellperf/ AES has been done before, unfortunately most of the links from that page don't work. Google also shows a few hits. Peter

[openssl.org #2221] [PATCH] DTLS Fragment reassembly

2010-04-06 Thread Daniel Mentz via RT
dtls1_process_out_of_seq_message() has two bugs: - Only one handshake message fragment per sequence number is saved. However, there may be multiple fragments with identical sequence numbers. All of them should be buffered. - Fragments with zero length are not saved. This is incorrect behavior

Re: [openssl.org #2215] crash in openssl-1.0.0 glibc detected httpd: free(): invalid pointer in libcrypto.so.1.0.0(CRYPTO_free)

2010-04-06 Thread Rainer M. Canavan via RT
On Apr 1, 2010, at 17:44 , Stephen Henson via RT wrote: That is most peculiar. If an ENGINE isn't in use I wouldn't expect that to happen unless something somewhere is loading one. OK, next step is to see what ENGINE it is. Can you in the debugger print out the engine structure for

[openssl.org #2222] RFC5081 support

2010-04-06 Thread Stephen Paul Weber via RT
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 I would really like OpenSSL to add support for RFC5081. - -- Stephen Paul Weber, @singpolyma Please see http://singpolyma.net for how I prefer to be contacted. edition right joseph -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.9 (GNU/Linux)

[openssl.org #2223] [PATCH] DTLS timeout bug

2010-04-06 Thread Robin Seggelmann via RT
To handle handshake message timeouts properly, DTLS sets the socket timeouts according to the currently remaining time until the next timeout occurs. However, in some cases this doesn't work because the operating system returns the socket call a few milliseconds before the DTLS timer expires.

[openssl.org #2224] Bug report: OpenSSL_add_all_algorithms() not documented properly in ssl/SSL_library_init/crypto

2010-04-06 Thread Matthias Andree via RT
I've recently received a report that my application, fetchmail, should call OpenSSL_add_all_algorithms(), see http://bugs.debian.org/576430 Apparently OpenSSL 0.9.8 does not load SHA256. If this is needed, please document this requirement on the manpages crypto(3), ssl(3), and

Re: [openssl.org #2215] crash in openssl-1.0.0 glibc detected httpd: free(): invalid pointer in libcrypto.so.1.0.0(CRYPTO_free)

2010-04-06 Thread Rainer M. Canavan via RT
On Apr 2, 2010, at 15:30 , Stephen Henson via RT wrote: This looks suspicious: #3 0x414a0787 in engine_pkey_asn1_meths_free (e=0x39) at tb_asnmth.c:165 165 EVP_PKEY_asn1_free(pkm); Not sure where the 0x39 is coming from. In frame#2: #2

Re: [openssl.org #2223] [PATCH] DTLS timeout bug

2010-04-06 Thread Daniel Mentz
Robin Seggelmann via RT wrote: To handle handshake message timeouts properly, DTLS sets the socket timeouts according to the currently remaining time until the next timeout occurs. However, in some cases this doesn't work because the operating system returns the socket call a few milliseconds

Re: [openssl.org #2223] [PATCH] DTLS timeout bug

2010-04-06 Thread Robin Seggelmann via RT
On Apr 6, 2010, at 10:56 AM, Daniel Mentz wrote: Robin Seggelmann via RT wrote: To handle handshake message timeouts properly, DTLS sets the socket timeouts according to the currently remaining time until the next timeout occurs. However, in some cases this doesn't work because the

[openssl.org #2215] crash in openssl-1.0.0 glibc detected httpd: free(): invalid pointer in libcrypto.so.1.0.0(CRYPTO_free)

2010-04-06 Thread Stephen Henson via RT
[rainer-open...@7val.com - Tue Apr 06 10:53:48 2010]: On Apr 2, 2010, at 15:30 , Stephen Henson via RT wrote: This looks suspicious: #3 0x414a0787 in engine_pkey_asn1_meths_free (e=0x39) at tb_asnmth.c:165 165EVP_PKEY_asn1_free(pkm);

[openssl.org #2215] crash in openssl-1.0.0 glibc detected httpd: free(): invalid pointer in libcrypto.so.1.0.0(CRYPTO_free)

2010-04-06 Thread Stephen Henson via RT
[rainer-open...@7val.com - Tue Apr 06 10:53:48 2010]: On Apr 2, 2010, at 15:30 , Stephen Henson via RT wrote: This looks suspicious: #3 0x414a0787 in engine_pkey_asn1_meths_free (e=0x39) at tb_asnmth.c:165 165EVP_PKEY_asn1_free(pkm);

TLS_DEBUG compilation causes crash. Fix proposal.

2010-04-06 Thread Philippe . Lhardy
Hi, For your information, bug fix proposal : I am currently working with openssl and i compile it with TLS_DEBUG. Using openssl library for a https connection terminated in core with SEGFAULT. Here my workaround, that is to disable a print : diff --git a/ssl/t1_enc.c b/ssl/t1_enc.c index

Re: [openssl.org #2215] crash in openssl-1.0.0 glibc detected httpd: free(): invalid pointer in libcrypto.so.1.0.0(CRYPTO_free)

2010-04-06 Thread Rainer M. Canavan
On Apr 2, 2010, at 15:30 , Stephen Henson via RT wrote: This looks suspicious: #3 0x414a0787 in engine_pkey_asn1_meths_free (e=0x39) at tb_asnmth.c:165 165 EVP_PKEY_asn1_free(pkm); Not sure where the 0x39 is coming from. In frame#2: #2

Re: [openssl.org #2220] Resolved: BUG REPORT - 1.0.0 won't compile with no-rc4 option

2010-04-06 Thread Mark Aldred via RT
How was this resolved? Is there a patch or new release? On Tue, Apr 6, 2010 at 7:21 AM, Stephen Henson via RT r...@openssl.orgwrote: According to our records, your request has been resolved. If you have any further questions or concerns, please respond to this message. -- Mark Aldred

Re: [openssl.org #2220] Resolved: BUG REPORT - 1.0.0 won't compile with no-rc4 option

2010-04-06 Thread Mounir IDRASSI
Steve has checked-in today a fix to this issue in CVS : http://cvs.openssl.org/chngview?cn=19520 and http://cvs.openssl.org/chngview?cn=19521 You can grab the source from CVS or wait for tomorrow's snapshot. Cheers, -- Mounir IDRASSI IDRIX http://www.idrix.fr On 4/6/2010 3:47 PM, Mark Aldred

[openssl.org #2225] OpenSSL 1.0.0 ignores -CApath

2010-04-06 Thread Rainer M. Canavan via RT
A clean build of openssl-1.0.0 (./config run without parameters) does not use the hashed certificate files from -CApath and fails certificate verification. The same behavior is seen when using openssl via the openssl s_client command as well as the library with curl 7.20.0. The system used here

[openssl.org #2225] OpenSSL 1.0.0 ignores -CApath

2010-04-06 Thread Stephen Henson via RT
[rainer-open...@7val.com - Tue Apr 06 16:56:50 2010]: A clean build of openssl-1.0.0 (./config run without parameters) does not use the hashed certificate files from -CApath and fails certificate verification. The same behavior is seen when using openssl via the openssl s_client command

Re: OpenSSL 1.0.0 released - VMS

2010-04-06 Thread Steven M. Schweda
http://antinode.info/ftp/openssl/1_0_0/test/tests.com If you have a working bc on your VMS system: http://antinode.info/ftp/openssl/1_0_0/test/bctest.com http://antinode.info/ftp/openssl/1_0_0/test/bntest.com http://antinode.info/ftp/openssl/1_0_0/test/tests.com With

Re: [openssl.org #2225] OpenSSL 1.0.0 ignores -CApath

2010-04-06 Thread Rainer M. Canavan via RT
On Apr 6, 2010, at 17:08 , Stephen Henson via RT wrote: [...] Please try rehashing the directories using the 1.0.0 version of OpenSSL. The certificate file hash algorithm changed in OpenSSL 1.0.0 and is not compatible with 0.9.8: this was needed to support some additional functionality. The

Re: [openssl.org #2225] OpenSSL 1.0.0 ignores -CApath

2010-04-06 Thread Rainer M. Canavan
On Apr 6, 2010, at 17:08 , Stephen Henson via RT wrote: [...] Please try rehashing the directories using the 1.0.0 version of OpenSSL. The certificate file hash algorithm changed in OpenSSL 1.0.0 and is not compatible with 0.9.8: this was needed to support some additional functionality. The

[openssl.org #2106] [PATCH] Mention STARTTLS support for XMPP in the s_client man page.

2010-04-06 Thread Sebastian Kayser via RT
This should be a bit more helpful. The patch below (against 1.0.0) adds the missing xmpp keyword to the list of supported -starttls keywords in the s_client man page. --- doc/apps/s_client.pod |2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/doc/apps/s_client.pod