Which platforms will be supported in the future on which platforms will be removed?

2014-06-01 Thread Janpopan
Hi all, is there a list of currently supported platforms? Which platforms are deprecaded an could/should be removed in the sourcecode? MS-DOS? Windows 16 Bit? OS/2? Windows 95/98/ME? Windows NT/2000/XP? Cheers Jan __ OpenSSL

Re: Which platforms will be supported in the future on which platforms will be removed?

2014-06-01 Thread Matt Caswell
On 01/06/14 08:28, Janpopan wrote: Hi all, is there a list of currently supported platforms? Which platforms are deprecaded an could/should be removed in the sourcecode? MS-DOS? Windows 16 Bit? OS/2? Windows 95/98/ME? Windows NT/2000/XP? Hi Jan You raise an interesting and

[openssl.org #3371] Bug Report: asn.1 text encoding formats

2014-06-01 Thread D. Spindel via RT
For a time period of days I've been attempting to chase down why MBSTRING_UTF8 got utf-8 encoded strings turned into T.61 when generating a CSR with a library, but were utf8strings when using the openssl command line tool. Finally found it. crypto/asn1/a_strnid.c has the default global_mask set

[openssl.org #3361] [PATCH] inadequate buffer size in ssl3_send_certificate_request

2014-06-01 Thread Stephen Henson via RT
Patch applied, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project

[openssl.org #3313] [PATCH] Uninitialized pointer dereference in pkey_ctrl_gost()

2014-06-01 Thread Stephen Henson via RT
Patch applied, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project

Re: [openssl.org #3350] AutoReply: Problem using gost engine in Apache 2

2014-06-01 Thread Dr. Stephen Henson
On Tue, May 27, 2014, Dmitry Belyavsky wrote: Hello, I think it is not to be closed, the leak occurs. Have you tried this with a recent version of OpenSSL? I can no longer produce a memory leak mentioned in PR#2745. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer.

[openssl.org #3371] Bug Report: asn.1 text encoding formats

2014-06-01 Thread Stephen Henson via RT
FIxed now, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project

Re: [openssl.org #3350] AutoReply: Problem using gost engine in Apache 2

2014-06-01 Thread Dmitry Belyavsky
Hello Shephen, Thank you. I can't reproduce it either, the ticket may be closed. On Sun, Jun 1, 2014 at 6:01 PM, Dr. Stephen Henson st...@openssl.org wrote: On Tue, May 27, 2014, Dmitry Belyavsky wrote: Hello, I think it is not to be closed, the leak occurs. Have you tried this

[openssl.org #2745] Fwd: GOST engine memory problems

2014-06-01 Thread Stephen Henson via RT
Fixed in latest OpenSSL, ticket closed. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project

Re: [openssl.org #3336] 1.0.1g breaks IronPORT SMTP appliance (padding extension)

2014-06-01 Thread Viktor Dukhovni
On Sun, Jun 01, 2014 at 07:18:18PM +0200, Stephen Henson via RT wrote: I've updated OpenSSL so the padding extension is no longer used by default and the option SSL_OP_TLSEXT_PADDING enables it (it is part of the SSL_OP_ALL). This resolves this issue as applications can now decide whether to

RE: Which platforms will be supported in the future on which platforms will be removed?

2014-06-01 Thread Salz, Rich
The core team should come up with a list and announce the decision. SOON. Be firm. Say something like in xxx months, support for these platforms will be dropped and we will start to remove that code. Encourage folks interested in supporting those platforms to maintain a fork. I don't care

RE: [openssl.org #3336] 1.0.1g breaks IronPORT SMTP appliance (padding extension)

2014-06-01 Thread Salz, Rich
Thanks. In particular, since SSL_OP_ALL is a compile-time constant, applications compiled with older releases will not send the extension by default. Only applications compiled against 1.0.1g or later that use SSL_OP_ALL, or specifically enable this work-around, will send the extension.

Re: [openssl.org #3336] 1.0.1g breaks IronPORT SMTP appliance (padding extension)

2014-06-01 Thread Dr. Stephen Henson
On Sun, Jun 01, 2014, Viktor Dukhovni wrote: On Sun, Jun 01, 2014 at 07:18:18PM +0200, Stephen Henson via RT wrote: I've updated OpenSSL so the padding extension is no longer used by default and the option SSL_OP_TLSEXT_PADDING enables it (it is part of the SSL_OP_ALL). This resolves

[openssl.org #3289] base64 BIO decoding bug - patch supplied + examples

2014-06-01 Thread Stephen Henson via RT
Fixed now, resolving ticket. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project

[openssl.org #3345] potential bug in crypto/evp/bio_b64.c

2014-06-01 Thread Stephen Henson via RT
Fixed now, ticket resolved. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project

Re: [openssl.org #3336] 1.0.1g breaks IronPORT SMTP appliance (padding extension)

2014-06-01 Thread Viktor Dukhovni
On Sun, Jun 01, 2014 at 07:47:30PM +0200, Dr. Stephen Henson wrote: Thanks. In particular, since SSL_OP_ALL is a compile-time constant, applications compiled with older releases will not send the extension by default. Only applications compiled against 1.0.1g or later that use

Re: Which platforms will be supported in the future on which platforms will be removed?

2014-06-01 Thread Kurt Roeckx
On Sun, Jun 01, 2014 at 01:39:54PM -0400, Salz, Rich wrote: Make structures opaque when possible and provide accessor functions. Within openssl itself use macros if you want. This has been on my list of things I want to see happen for a long time too. Together we removing some APIs. I also

Re: [openssl.org #3336] 1.0.1g breaks IronPORT SMTP appliance (padding extension)

2014-06-01 Thread Dr. Stephen Henson
On Sun, Jun 01, 2014, Viktor Dukhovni wrote: On Sun, Jun 01, 2014 at 07:47:30PM +0200, Dr. Stephen Henson wrote: Thanks. In particular, since SSL_OP_ALL is a compile-time constant, applications compiled with older releases will not send the extension by default. Only applications

Re: Which platforms will be supported in the future on which platforms will be removed?

2014-06-01 Thread Dr. Stephen Henson
On Sun, Jun 01, 2014, Kurt Roeckx wrote: On Sun, Jun 01, 2014 at 01:39:54PM -0400, Salz, Rich wrote: Make structures opaque when possible and provide accessor functions. Within openssl itself use macros if you want. This has been on my list of things I want to see happen for a long time

Re: [openssl.org #3336] 1.0.1g breaks IronPORT SMTP appliance (padding extension)

2014-06-01 Thread Viktor Dukhovni
On Sun, Jun 01, 2014 at 08:32:55PM +0200, Dr. Stephen Henson wrote: Repurposing bits in this way is problematic if that bit meant something else in any OpenSSL-1.x.y release (notional ABI). If the bit is from 0.9.x, and was never used in 1.x.y, then it is OK. I think it is actually a

Re: Which platforms will be supported in the future on which platforms will be removed?

2014-06-01 Thread Matt Caswell
On 01/06/14 19:38, Dr. Stephen Henson wrote: On Sun, Jun 01, 2014, Kurt Roeckx wrote: On Sun, Jun 01, 2014 at 01:39:54PM -0400, Salz, Rich wrote: Make structures opaque when possible and provide accessor functions. Within openssl itself use macros if you want. This has been on my list

Re: Which platforms will be supported in the future on which platforms will be removed?

2014-06-01 Thread Richard Moore
On 1 June 2014 19:38, Dr. Stephen Henson st...@openssl.org wrote: On Sun, Jun 01, 2014 at 01:39:54PM -0400, Salz, Rich wrote: Make structures opaque when possible and provide accessor functions. Within openssl itself use macros if you want. This has been on my list of things I want to

New unbiased prime generator function fixes

2014-06-01 Thread Viktor Dukhovni
The new prime generator does not ensure that generated primes are safe modulo 2, 3, 5, 7 or 11. In particular (p-1)/2 might not be co-prime to 2310. The patch below my signature addresses this problem. -- Viktor. diff --git a/crypto/bn/bn_prime.c b/crypto/bn/bn_prime.c index

[openssl.org #3319] [Bug report Patch] Fix TLS export keying material generation for TLS 1.2 version

2014-06-01 Thread Matt Caswell via RT
Steve Henson has comitted this here: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4fdf917 Thanks Matt __ OpenSSL Project http://www.openssl.org Development Mailing List

Re: New unbiased prime generator function fixes

2014-06-01 Thread Viktor Dukhovni
On Sun, Jun 01, 2014 at 08:14:00PM +, Viktor Dukhovni wrote: The new prime generator does not ensure that generated primes are safe modulo 2, 3, 5, 7 or 11. In particular (p-1)/2 might not be co-prime to 2310. The patch below my signature addresses this problem. Oops, previous patch

Re: New unbiased prime generator function fixes

2014-06-01 Thread Ben Laurie
You didn't update the test... On 1 June 2014 21:26, Viktor Dukhovni openssl-us...@dukhovni.org wrote: On Sun, Jun 01, 2014 at 08:14:00PM +, Viktor Dukhovni wrote: The new prime generator does not ensure that generated primes are safe modulo 2, 3, 5, 7 or 11. In particular (p-1)/2 might

[openssl.org #3362] [PATCH] use-after-free bug in dtls1_buffer_record (ssl/d1_pkt.c)

2014-06-01 Thread Matt Caswell via RT
Hi David Patch applied: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=d1e1aee Many thanks for your contribution. Matt __ OpenSSL Project http://www.openssl.org Development Mailing

Re: Which platforms will be supported in the future on which platforms will be removed?

2014-06-01 Thread Dr. Stephen Henson
On Sun, Jun 01, 2014, Richard Moore wrote: On 1 June 2014 19:38, Dr. Stephen Henson st...@openssl.org wrote: On Sun, Jun 01, 2014 at 01:39:54PM -0400, Salz, Rich wrote: Make structures opaque when possible and provide accessor functions. Within openssl itself use macros if you want.

Re: New unbiased prime generator function fixes

2014-06-01 Thread Viktor Dukhovni
On Sun, Jun 01, 2014 at 09:45:15PM +0100, Ben Laurie wrote: You didn't update the test... You're right. The below should take care of that. -- Viktor. diff --git a/crypto/bn/bn_prime.c b/crypto/bn/bn_prime.c index 2d66b61..df50305 100644 --- a/crypto/bn/bn_prime.c +++

Re: New unbiased prime generator function fixes

2014-06-01 Thread Kurt Roeckx
On Sun, Jun 01, 2014 at 09:04:29PM +, Viktor Dukhovni wrote: @@ -1,21 +1,37 @@ -primes = [2, 3, 5, 7, 11] -safe = False # Not sure if the period's right on safe primes. +# Odd primes 13 +# +primes = [3, 5, 7, 11, 13, 17, 19] Maybe the comment is wrong? Kurt

[openssl.org #3349] Bug report: X509_check_akid() identifies non-self-signed certificate as its own issuer

2014-06-01 Thread Stephen Henson via RT
On Fri May 09 09:59:51 2014, s...@pdflib.com wrote: Am 09.05.14 00:53, schrieb Stephen Henson via RT: On Thu May 08 15:49:11 2014, s...@pdflib.com wrote: I can confirm that with this patch applied my use case with X509_verify_cert() works as expected (misidentification of signing

[openssl.org #3344] PATCH: don't crash or fail in ASN1_print from t_pkey.c

2014-06-01 Thread Matt Caswell via RT
On Thu May 29 08:28:24 2014, noloa...@gmail.com wrote: Matt - I have not forgot about this I can't find the machine I wrote the code on (my place probably looks a lot like your place - different computers and laptops with different OSes all over the place). My place does look a bit like

Re: New unbiased prime generator function fixes

2014-06-01 Thread Viktor Dukhovni
On Sun, Jun 01, 2014 at 11:12:53PM +0200, Kurt Roeckx wrote: On Sun, Jun 01, 2014 at 09:04:29PM +, Viktor Dukhovni wrote: @@ -1,21 +1,37 @@ -primes = [2, 3, 5, 7, 11] -safe = False # Not sure if the period's right on safe primes. +# Odd primes 13 +# +primes = [3, 5, 7, 11, 13,

Re: New unbiased prime generator function fixes

2014-06-01 Thread Felix Laurie von Massenbach
Only just joined the list and I see that there's been some follow up stuff to my contribution, but I submitted a follow up pull request to some of this stuff on GitHub (https://github.com/openssl/openssl/pull/118). So probably some duplication there :). -- Felix - http://www.erbridge.co.uk/ On

Re: Which platforms will be supported in the future on which platforms will be removed?

2014-06-01 Thread Viktor Dukhovni
On Sun, Jun 01, 2014 at 10:55:09PM +0200, Dr. Stephen Henson wrote: Well that's one of the issues we need to resolve. Apache now compiles with OPENSSL_NO_SSL_INTERN but it needed some additional accessor functions before it could. FWIW, Postfix TLS support predates OpenSSL 0.9.7, but the only

Re: [openssl.org #3371] Bug Report: asn.1 text encoding formats

2014-06-01 Thread D. Spindel via RT
Thanks a lot for fixing this! //D.S. On Sun, Jun 1, 2014 at 4:07 PM, Stephen Henson via RT r...@openssl.org wrote: FIxed now, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org