[openssl.org #356] Bug in CRLF translation in PKCS7_sign

2014-09-05 Thread Rich Salz via RT
Per the RT report, fixed back in the days of Dreadnoughtosaurus walked the earth. Or 0.9.8 days anyway -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Dev

[openssl.org #2564] PKCS7_cert_from_signer_info Enhancement Request

2014-09-05 Thread Rich Salz via RT
We're not adding new functionality to PKCS7; use the CMS API's. See RT389, for example :) -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mail

[openssl.org #2572] Correct help output in openssl cms

2014-09-05 Thread Rich Salz via RT
Don't know who/when fixed it. Closing ticket. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #1853] Bugs in ./crpto/x509/x509_vfy.c and ./crpto/x509/x509_cmp.c

2014-09-05 Thread Rich Salz via RT
Looking at the current code, it only returns a "strange" value if it cannot generate canonical form for either name. That really only happens when OOM. Otherwise it checks lengths (shorter name wins) and then memcmp. T his seems table to me, now. -- Rich Salz, OpenSSL dev team; rs...@openssl.org _

[openssl.org #1643] Less random source on windows due to wrong error handling of CryptoGenRandom

2014-09-05 Thread Rich Salz via RT
The win_rand code has been overhauled over time. There's no stoptime variable any more, for example. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Devel

[openssl.org #1819] Calls to OBJ_txt2nid for a non-registered objects adds bogus "first num too large" errors from a2d_ASN1_OBJECT

2014-09-05 Thread Rich Salz via RT
Quoting the RH ticket that initiated this: "The error is not quite bogus, although the error description is not accurate. The OBJ_txt2nid is not supposed to be called on unregistered objects so the zero return value indicates an error. You might as well call ERR_clear_error() in that case." -- Ric

[openssl.org #1164] BUG: namespace pollution in openssl 0.9.8

2014-09-05 Thread Rich Salz via RT
It's hard, all the "good names" are taken. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@open

[openssl.org #3516] OCSP Certificate Chain Response Handling

2014-09-05 Thread Mehner, Carl via RT
OCSP response handling in /apps/ocsp.c -- 2014-06-25 The OCSP Documentation States https://www.openssl.org/docs/apps/ocsp.html "Otherwise the OCSP responder certificate's CA is checked against the issuing CA certificate in the request. If there is a match and the OCSPSigning extended key