I am porting Openssl 1.0.1g in Embedded which is developed with OpenWRT -
MIPS64 CPU.
I found SHA is not working and it will always dead when calling
sha1_block_data_order defined in sha1-mips.pl. If I ./configure with no-asm
then everything is fine.
My questions is does
Hi,
I've found a bug in the Client Hello cipher suites list corresponding to RFC
2246. Always the last cipher suite in the list contains an additional byte
0xFF, so the rest of the record cannot be read correctly and connections, which
use the following Client Hello Extensions, fail.
I'm note
Running `make test` with Clang sanitizers results in some issues with
unaligned pointers surrounding some uses of buffers cast to a size_t*.
The sanitizers used were `-fsanitize=undefined -fsanitize=address`.
Those are conscious choices based on the fact that some CPUs, x86_64
included, are
On Sun, Jul 06, 2014 at 10:18:29AM +0200, Kaufmann Stephan via RT wrote:
- TLSCipherSuites: Unknown Cipher { 0x00,0xFF }
That is TLS_EMPTY_RENEGOTIATION_INFO_SCSV.
Hope, I could explain the problem and you can fix it soon and the fix will be
applied soon to all
On Sun, Jul 06, 2014 at 10:25:19AM +0200, Andy Polyakov via RT wrote:
Running `make test` with Clang sanitizers results in some issues with
unaligned pointers surrounding some uses of buffers cast to a size_t*.
The sanitizers used were `-fsanitize=undefined -fsanitize=address`.
Those are
Does anyone use it?
We're considering removing or refactoring it...
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List
On Sun, Jul 6, 2014 at 1:37 PM, Ben Laurie b...@links.org wrote:
Does anyone use it?
Not that I'm aware of. It was never enabled in OpenSSH.
We're considering removing or refactoring it...
__
OpenSSL Project
On Fri Jul 04 20:33:35 2014, pspa...@redhat.com wrote:
[I'm re-sending this e-mail again because I haven't received any reply
and it
didn't appeared neither on http://rt.openssl.org/NoAuth/Buglist.html
nor on
-devel list.]
Attached patch set adds support for key wrapping mode described in
Running `make test` with Clang sanitizers results in some issues with
unaligned pointers surrounding some uses of buffers cast to a size_t*.
The sanitizers used were `-fsanitize=undefined -fsanitize=address`.
Those are conscious choices based on the fact that some CPUs, x86_64
included, are
On Sun, Jul 06, 2014 at 05:12:42PM +0200, Andy Polyakov via RT wrote:
Running `make test` with Clang sanitizers results in some issues with
unaligned pointers surrounding some uses of buffers cast to a size_t*.
The sanitizers used were `-fsanitize=undefined -fsanitize=address`.
Those are
Not sure if this is stil an issue. Very old release. Closing the ticket.
Is OpenSSL on netware still deployed and useful? Please reply if so.
__
OpenSSL Project http://www.openssl.org
Development
... So that above results
don't tell anything about benefits of STRICT_ALIGNMENT being undefined.
And it's usually around 10%. And indeed, I just measured 12.5% on my
computer. [You have to configure with no-asm, and rig apps/speed.c to
use misaligned buffers].
If I then turn on strict
ควยไร ฮะ เหี้ย
From: rs...@akamai.com
To: openssl-dev@openssl.org
Date: Sat, 5 Jul 2014 12:45:34 -0400
Subject: argv/Argv hacks in openssl.c
There’s a bunch of hacks in apps/openssl.c to work around some old VMS
releases; the coment is dated 2011-03-22.I am going to delete it.Speak up now
if
From: ann-i...@hotmail.com
To: openssl-dev@openssl.org
Subject: RE: argv/Argv hacks in openssl.c
Date: Mon, 7 Jul 2014 01:15:18 +0700
ควยไร ฮะ เหี้ย
From: rs...@akamai.com
To: openssl-dev@openssl.org
Date: Sat, 5 Jul 2014 12:45:34 -0400
Subject: argv/Argv hacks in openssl.c
There’s a bunch
I am not subscribed to the openssl-dev mailing list and I do not think I
want to be subscribed.
I can offer a HP-UX account to a PA-RISC2 HP-UX 11.23 system
Do contact me off-list for details
I understand that you close the RT ticket, but I saw no other contact
e-mail to post my reaction to.
On Sun, Jul 06, 2014 at 06:57:57PM +0200, Andy Polyakov via RT wrote:
... So that above results
don't tell anything about benefits of STRICT_ALIGNMENT being undefined.
And it's usually around 10%. And indeed, I just measured 12.5% on my
computer. [You have to configure with no-asm, and rig
Basically this discussion applies even to tickets #3422 and #3423. This
means that I'm not going to comment on those tickets, but do whatever we
agree on doing here and close them simultaneously.
I think the main question is if this speed difference is a good
excuse to use undefined behavior or
Please raise this issue on the openssl-users list - this is preferred way of
raising support questions.
If there is a definite bug then please re-raise a ticket in RT. Closing this
ticket for now.
Matt
__
OpenSSL Project
Please raise this issue on the openssl-users list - this is the preferred way of
raising support questions.
If there is a definite bug then please re-raise a ticket in RT. Closing this
ticket for now.
Matt
__
OpenSSL Project
Copying Kurt Roeckx response to this below (which only went to the openssl-dev
list, and not to RT).
Based on Kurt's response I am closing this ticket for now. Please re-open by
responding to this email if you still think this is a defect.
Matt
On Sun, Jul 06, 2014 at 10:18:29AM +0200,
Resolved (finally!).
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
Old FIPS version, no longer maintained. Marked as resolved.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project
No further feedback, assuming resolved.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project
Interesting idea but not really needed now as you can specify -pre and -post
commands in the config file.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
Not a bug report, should be in openssl-users.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project
Not sure what you're pointing out. That there are different return values? This
is a local API, so warning users to not expose detail errors would address
this, right?
__
OpenSSL Project
Resolved now. OpenSSL no longer uses MD5 in the supported signature algorithms
list.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL
The last patents for IDEA expired in 2012. Now it's free to use.
On 3 July 2014 21:24, Rich Salz via RT r...@openssl.org wrote:
As the changelog says for 0.9.8,
(IDEA remains enabled despite being patented. This is because IDEA
is frequently required for interoperability, and there is no
28 matches
Mail list logo