Re: [openssl.org #2293] OpenSSL dependence on external threading functions is a critical design flaw

2010-06-24 Thread Ger Hobbelt via RT
The only critical bit here is opinion replacing analysis. As you said so yourself, and I quote: When both an application and a library ([...]) both initialize and register their own threading functions, bad things happen and the application can crash.) Indeed. Spot on, I'd say. That is /exactly/

[openssl.org #2275] CVS HEAD: BIO b_sock: ioctl(FIONBIO) is not available everywhere; completed BIO_socket_nbio() so the #ifdef clutter in apps/* and other spots can be discarded after this

2010-05-26 Thread Ger Hobbelt via RT
patch attached, of course. Even in UNIX County, ioctl(FIONBIO) isn't everywhere. Let alone abroad. Since the days of yore OpenSSL has implicitly known this as there exists a BIO_socket_nbio() but since it was far from complete the more or less complete #ifdef portability hacks litter the

Re: [openssl.org #2275] CVS HEAD: BIO b_sock: ioctl(FIONBIO) is not available everywhere; completed BIO_socket_nbio() so the #ifdef clutter in apps/* and other spots can be discarded after this

2010-05-26 Thread Ger Hobbelt via RT
The CRLF and paths bit is most probably due to the fact that I do my diff/merge/dev work on Win32/64 boxes mostly - that's where all my toolkit sits anyway; hadn't realized your patch was that picky. When I do it on a *nix box, I always run 'patch -l' which doesn't complain; when code looks a real

[openssl.org #2258] CVS HEAD: evp/bio_b64.c: memcpy() vs. memmove() bug + retry-on-write bug + typo fix + misc

2010-05-02 Thread Ger Hobbelt via RT
patch file attached. Subitems: - { +#if 0 /* [i_a] ERROR: some intrinsic memcpy() ops can copy DOWN, thus corrupting the data here */ memcpy((unsigned char *)ctx-tmp, (unsigned char *)(ctx-tmp[jj]),i-jj); +#else +

[openssl.org #2250] CVS HEAD: x509_cmp.c bug: error path does not return 0 like it should; strlen() is in the way

2010-05-01 Thread Ger Hobbelt via RT
Side note: You may want to ignore the 'const' in the prototype for now; we have an in-house copy of OpenSSL which is quite severely const-ified and size_t-ified. --- h:\prj\1original\openssl\openssl\crypto\x509\x509_cmp.c2010-01-12 19:29:33.0 +-0200 +++

[openssl.org #2251] CVS HEAD: x509v3\v3_pci.c: fix a memleak and a BIO chain leak + couple of realloc check fixes

2010-05-01 Thread Ger Hobbelt via RT
Bug Fix: See attached diff. -- Met vriendelijke groeten / Best regards, Ger Hobbelt -- web:http://www.hobbelt.com/ http://www.hebbut.net/ mail: g...@hobbelt.com mobile: +31-6-11 120 978

[openssl.org #2252] CVS HEAD: bug in BIO_f_buffer.pod: documentation not up to date since 0.9.6b

2010-05-01 Thread Ger Hobbelt via RT
Changelog says: Changes between 0.9.6a and 0.9.6b [9 Jul 2001] [...] *) In crypto/bio/bf_buff.c, increase DEFAULT_BUFFER_SIZE to 4096 (previously it was 1024). [Bodo Moeller] However, the corresponding .pod hasn't been updated yet. .pod fix/patch attached. Also note that the

[openssl.org #2253] CVS HEAD: err_prn.c: bug: check callback return value so you don't keep hammering BIO_printf() on a failing error BIO.

2010-05-01 Thread Ger Hobbelt via RT
The callback calls BIO_printf(); it's return value is properly propagated but is not checked in the error chain dumper func; when the errors are streamed through any BIO which fails, such failure hence remains undetected and the BIO is being hammered instead of aborting the error dump. Different

[openssl.org #2254] CVS HEAD: engines\ccgost\gost94_keyx.c: bug: i2d call can return error code 0 which isn't caught

2010-05-01 Thread Ger Hobbelt via RT
fix attached. -- Met vriendelijke groeten / Best regards, Ger Hobbelt -- web:http://www.hobbelt.com/ http://www.hebbut.net/ mail: g...@hobbelt.com mobile: +31-6-11 120 978 -- fix

[openssl.org #2255] CVS HEAD: engines\e_ubsec.c bug: variable of RSA-dependent type instantiated outside #ifndef NO_RSA precomp check

2010-05-01 Thread Ger Hobbelt via RT
fix attached. -- Met vriendelijke groeten / Best regards, Ger Hobbelt -- web:http://www.hobbelt.com/ http://www.hebbut.net/ mail: g...@hobbelt.com mobile: +31-6-11 120 978 -- fix

[openssl.org #2256] CVS HEAD: question: must this be hardcoded '8' or is it 'md_len' in disguise? :-S

2010-05-01 Thread Ger Hobbelt via RT
ssl\s3_clnt.c: since the hash length lands in 'md_len' and the entire hash would/should/might be used as the IV... What do the protocol wizards have to say about this? --- h:\prj\1original\openssl\openssl\ssl\s3_clnt.c2010-02-28 02:24:04.0 +-0200 +++

[openssl.org #2257] CVS HEAD: [quite probable] bug in ssl3_write: does not indirect through callback like it sibling ssl3_read

2010-05-01 Thread Ger Hobbelt via RT
ssl3_read() does indirect, while ssl3_write does not. Doesn't seem intentional to me, on the contrary. Tick choice: [ ] Correct reasoning fix? [ ] Dead wrong, buster! just in case: patch attached --- h:\prj\1original\openssl\openssl\ssl\s3_lib.c2009-11-19 02:34:54.0 +-0200 +++

[openssl.org #2248] CVS HEAD: bug in evp_locl.h - wrong number of bytes/bits passed to encrypt routine in loop

2010-04-30 Thread Ger Hobbelt via RT
Was doing another merge and while doing so had a look at the differences between my local copy and CVS HEAD of yesterday (2010/04/29) and one of 'em was odd as it used 'inl' while counting 'chunk'. This is the patch for #define BLOCK_CIPHER_func_cfb(cname, cprefix, cbits, kstruct, ksched) \

Re: [openssl.org #2245] [PATCH] Add /Zi to VC++ CFLAG in debug configuration (1.0.0 and 0.9.8)

2010-04-28 Thread Ger Hobbelt via RT
On Thu, Apr 29, 2010 at 12:31 AM, Ger Hobbelt g...@hobbelt.com wrote: And for those that like this to be like this to be -- liking this to :-( On Thu, Apr 29, 2010 at 12:31 AM, Ger Hobbelt g...@hobbelt.com wrote: And for those that like this to be like this to be -- liking this to:-(

Re: [openssl.org #2245] [PATCH] Add /Zi to VC++ CFLAG in debug configuration (1.0.0 and 0.9.8)

2010-04-28 Thread Ger Hobbelt via RT
Steve, In answer to your question: On Wed, Apr 28, 2010 at 3:19 PM, Stephen Henson via RT r...@openssl.orgwrote: Note that it is also possible to add -Zi on the command line to Configure for non-debug builds to avoid needing to modify OpenSSL of the generated Makefile. Is anyone aware of

[openssl.org #2112] Build incorrect crypt/decrypt in Win32. x86. MSVC 2003. MinGW.

2009-11-27 Thread Ger Hobbelt via RT
On Fri, Nov 27, 2009 at 10:31 AM, Nick via RT r...@openssl.org wrote: As you understand now, troubles in key generation. It's time to dip into sources. Most probably troubles in correct usage of APIs. Read on. Cipher context initialization (and simultaneous key definition) perform in call

Re: [openssl.org #1992] RAND_poll() and CreateToolhelp32Snapshot() stability (also for 1.0.0.b3)

2009-09-22 Thread Ger Hobbelt via RT
Sorry for late reply; been under the weather lately, healthwise, so this is my first 'on-line' experience in a while ;-) As far as the brain is operational again... I'd say the quickest way to fix this is to wrap the __try/__except chunk in a compiler-specific preproc check a la: #if

[openssl.org #1992] RAND_poll() and CreateToolhelp32Snapshot() stability (also for 1.0.0.b3)

2009-07-23 Thread Ger Hobbelt via RT
Bumped and fed to RT as this bugger doesn't seem to have a ticket # while the fix is available, and I just got an enquiry about this and whether did it make it into the latest. (Nope, it did not. Yet?) See also the dev@ mail trail at the subject line time shown below for how it got to this.

Re: [openssl.org #1786] Resolved: 0.9.9 HEAD: X509_POLICY_DATA/NODE function implementations missing - fix included

2009-04-13 Thread Ger Hobbelt via RT
Resolved. Thanks for all your hard work on OpenSSL! Ger On Mon, Apr 13, 2009 at 1:40 PM, Stephen Henson via RT r...@openssl.org wrote: According to our records, your request has been resolved. If you have any further questions or concerns, please respond to this message. -- Met

[openssl.org #1895] [patch] ./util/mkerr.pl: +documentation; +copyright; +extras

2009-04-10 Thread Ger Hobbelt via RT
patchfile included. 1) Adds documentation (--help) to mkerr.pl; very handy for the folks who like to use this nice tool within and without OpenSSL (e.g. me ;-) ). 2) The patch also fixes the error number assignment, now _really_ starting at 100 (as hinted at in other sections of OpenSSL

[openssl.org #1897] [patch] ./util/selftest.pl: +shut up gcc by including the correct header files in the generated src

2009-04-10 Thread Ger Hobbelt via RT
1) shut up GCC (and other compilers) about implicit definition of printf() by including the headerfile delivering its prototype as well in the generated code: stdlib.h -- Met vriendelijke groeten / Best regards, Ger Hobbelt -- web:

[openssl.org #1898] [patch] ./util/selftest.pl: +shut up gcc by including the correct header files in the generated src

2009-04-10 Thread Ger Hobbelt via RT
1) shut up GCC (and other compilers) about implicit definition of printf() by including the headerfile delivering its prototype as well in the generated code: stdlib.h -- Met vriendelijke groeten / Best regards, Ger Hobbelt -- web:

[openssl.org #1899] [patch] something that didn't make it into HEAD, related to OpenSSL Security Advisory [07-Jan-2009] CVE2008-5077

2009-04-10 Thread Ger Hobbelt via RT
Error result code check in ./crypto/x509/x509_vfy.c: error return value can be negative. (My personal lesson from this: don't wait to see if one of the Top Dogs bother asking 'hm, shouldn't this change as well?' - I waited for the O.G., then forgot. And now I'm still not 110% sure if I saw

[openssl.org #1894] [patch] typos / linguistic bugs in docs/comments

2009-04-09 Thread Ger Hobbelt via RT
Simple stuff, but best to get this out of the way finally. Patch file included, of course. -- Met vriendelijke groeten / Best regards, Ger Hobbelt -- web:http://www.hobbelt.com/ http://www.hebbut.net/ mail: g...@hobbelt.com mobile:

Re: [openssl.org #1847] Bug in Openssl 0.9.8j CA.sh script

2009-03-11 Thread Ger Hobbelt via RT
Kim's fix as diff for CA.sh for when anyone wants to incorporate this in 0.9.9 CVS HEAD On Tue, Feb 24, 2009 at 9:46 PM, Nguyen, Kim via RT r...@openssl.org wrote: The CA.sh script in 0.9.8j is missing the -extensions v3_ca flag. This doesn't seem to be a problem in CA.pl In comparision,

[openssl.org #1863] sk_SSL_COMP_find() in SSL_COMP_add_compression_method()? (Victor Duchovni)

2009-03-11 Thread Ger Hobbelt via RT
As originally posted to users@ by Victor Duchovni @ 2009/02/11 Attached is this as a patch file against todays 0.9.9 CVS HEAD; patch includes assert() -- OPENSSL_assert() fixes as well. On Wed, Feb 11, 2009 at 10:41 AM, Ger Hobbelt g...@hobbelt.com wrote: Good find! This is indeed wrong

[openssl.org #1864] crypto/x509v3/v3_cpols.c -- patch: add check for error condition (heap alloc failure)

2009-03-11 Thread Ger Hobbelt via RT
patch attached: return value was not checked, causing havoc later along the line (under particular memory conditions). diff produced inspected against latest 0.9.9 CVS HEAD. -- Met vriendelijke groeten / Best regards, Ger Hobbelt -- web:

[openssl.org #1865] BIO printf() - floating point BIO_printf() et al support bug fix + extras (patch included)

2009-03-11 Thread Ger Hobbelt via RT
The bugfix core in the attached diff are these bits: @@ -351,6 +361,8 @@ fvalue = va_arg(args, LDOUBLE); else fvalue = va_arg(args, double); +fmtfp(sbuffer, buffer, currlen, maxlen, + fvalue, min, max,

Re: [openssl.org #1866] openssl verify needs better error reporting

2009-03-11 Thread Ger Hobbelt via RT
On Wed, Mar 11, 2009 at 1:49 PM, Vladimir Kotal vladimir.ko...@sun.com wrote: Hello, In case the openssl verify command is not able to process input file, it reports the usage even if the usage is perfectly okay: $ openssl verify -CAfile /local/Saved/SMI_SSL_CA-chain.pem cert.cer Error

[openssl.org #1816] bug in DES_xcbc_encrypt() for decrypting 8 bytes of input (?)

2009-01-12 Thread Ger Hobbelt via RT
L.S., please have a look at crypto/des/xcbc_enc.c: function void DES_xcbc_encrypt(...) in 0.9.9 CVS HEAD at line 165 the loop reads: for (l-=8; l0; l-=8) shouldn't this read as: for (l-=8; l=0; l-=8) as happens for all other cbc loops out there (not only in

[openssl.org #1803] bugfix for BIO_nwrite()

2008-12-25 Thread Ger Hobbelt via RT
wrong statistic (read instead of write) is updated when calling BIO_nwrite(). The fix: --- \\Debbie\ger\prj\1original\openssl\openssl\crypto\bio\bss_bio.c 2003-08-06 11:36:25.0 +-0100 +++ \\Debbie\ger\prj\3actual\openssl\crypto\bio\bss_bio.c 2008-12-24 22:35:22.0

Re: [openssl.org #1803] bugfix for BIO_nwrite()

2008-12-25 Thread Ger Hobbelt via RT
On Thu, Dec 25, 2008 at 11:25 PM, Richard Levitte via RT r...@openssl.org wrote: Patch applied. Thanks. You're welcome. Just saw it pop up on CVS. That was fast! :-) Cheers, Ger -- Richard Levitte levi...@openssl.org -- Met vriendelijke groeten / Best regards, Ger Hobbelt

[openssl.org #1786] 0.9.9 HEAD: X509_POLICY_DATA/NODE function implementations missing - fix included

2008-11-13 Thread Ger Hobbelt via RT
The corresponding DECLARE_... statements are in pcy_int.h and x509v3.h respectively BTW. --- \\Debbie\ger\prj\1original\openssl\openssl\crypto\x509v3\pcy_lib.c 2008-11-12 20:36:05.0 +-0100 +++ \\Debbie\ger\prj\3actual\openssl\crypto\x509v3\pcy_lib.c2008-11-12 22:12:48.0

[openssl.org #1785] 0.9.9 HEAD: possible coredump in DSA; fix included

2008-11-12 Thread Ger Hobbelt via RT
When the malloc() fails, the original code would still try to access the (invalid) pointer. --- \\Debbie\ger\prj\1original\openssl\openssl\crypto\dsa\dsa_asn1.c 2008-11-12 20:36:01.0 +-0100 +++ \\Debbie\ger\prj\3actual\openssl\crypto\dsa\dsa_asn1.c 2008-11-12 21:29:50.0

[openssl.org #1773] cannot compile camelia cmll_crt.c -- patch/diff included

2008-11-02 Thread Ger Hobbelt via RT
VERSION: todays CVS for 0.9.9 (bleeding edge) ISSUE: first assert() included an unknown variable called 'counter'. --- \\Debbie\ger\prj\1original\openssl\openssl\crypto\camellia\cmll_ctr.c 2008-11-01 20:08:48.0 +-0100 +++ \\Debbie\ger\prj\3actual\openssl\crypto\camellia\cmll_ctr.c

[openssl.org #1774] engines/e_padlock.c -- compile issue with size_t vs int -- patch/diff included

2008-11-02 Thread Ger Hobbelt via RT
VERSION: todays' CVS 0.9.9 (bleeding edge) ISSUE: a function (padlock_rand_bytes) with int parameter, which function pointer prototype requires size_t (which is different size on several platforms). Patch to correct this: --- \\Debbie\ger\prj\1original\openssl\openssl\engines\e_padlock.c

[openssl.org #1775] 0.9.9-today: bug: size_tification missed a few spots -- compile issues on native Win32/64 + SuSE64: patch/diff included

2008-11-02 Thread Ger Hobbelt via RT
size_t issues + assert--OPENSSL_assert: --- \\Debbie\ger\prj\1original\openssl\openssl\crypto\bn\bn_asm.c 2005-10-22 21:20:06.0 +-0100 +++ \\Debbie\ger\prj\3actual\openssl\crypto\bn\bn_asm.c 2008-11-01 23:10:36.0 +-0100 @@ -66,16 +70,17 @@ #include cryptlib.h #include

[openssl.org #1776] Re: cannot compile camelia cmll_crt.c -- patch/diff included

2008-11-02 Thread Ger Hobbelt via RT
And exactly the same for AES: --- \\Debbie\ger\prj\1original\openssl\openssl\crypto\aes\aes_ctr.c 2008-11-01 20:25:22.0 +-0100 +++ \\Debbie\ger\prj\3actual\openssl\crypto\aes\aes_ctr.c 2008-11-01 22:53:56.0 +-0100 @@ -117,16 +123,16 @@ unsigned char

Re: [openssl.org #1776] AutoReply: Re: cannot compile camelia cmll_crt.c -- patch/diff included -- (combines with #1773) resolved

2008-11-02 Thread Ger Hobbelt via RT
Has been resolved in todays CVS by Ben Laurie. Thanks! On Sun, Nov 2, 2008 at 9:13 PM, The default queue via RT [EMAIL PROTECTED] wrote: Greetings, This message has been automatically generated in response to the creation of a trouble ticket regarding: Re: cannot compile camelia

Re: [openssl.org #1774] AutoReply: engines/e_padlock.c -- compile issue with size_t vs int -- patch/diff included -- resolved.

2008-11-02 Thread Ger Hobbelt via RT
Fixed in todays CVS by Dr. S. Hanson. (this and the others were filed yesterday, but only made it through rt@ a few hours ago. Sorry.) On Sun, Nov 2, 2008 at 9:13 PM, The default queue via RT [EMAIL PROTECTED] wrote: Greetings, This message has been automatically generated in response to