[openssl.org #2988] Makefiles should (usually) remove target before re-generating

2013-02-13 Thread Salz, Rich via RT
Some targets need to be removed before rebuilding them: In apps/Makefile, add $(RM) $@ after progs.h line In crypt/bn/Makefile, something like this: bn_prime.h: bn_prime.pl $(RM) $@ $(PERL) bn_prime.pl $@

RE: [openssl.org #2988] Makefiles should (usually) remove target before re-generating

2013-02-13 Thread Salz, Rich via RT
Unfortunately some platforms can't automatically build the files e.g. WIN32, VMS. Okay, so those targets shouldn't get invoked? Or are you saying that you WANT the build to fail on those platforms? # objects.pl both reads and writes obj_mac.num obj_mac.h: objects.pl objects.txt

RE: [openssl.org #2988] Makefiles should (usually) remove target before re-generating

2013-02-14 Thread Salz, Rich via RT
We extract a tarball and make everything read-only. Sometimes an item in the distribution gets re-made. This can fail because of permissions. So, on platforms where this would happen, we'd like to remove the file first. I wasn't advocating to remove them from the distro, I understand we need

RE: [openssl.org #2988] Makefiles should (usually) remove target before re-generating

2013-02-17 Thread Salz, Rich via RT
Yes, it predates the latest release. I thin in general it's like a makefile hygiene thing -- if files are read-only, but can be created, then the target needs to be removed first. -- Principal Security Engineer Akamai Technology Cambridge, MA

RE: [openssl.org #3001] [PATCH] Reduce unnecessary verifying iteration in rsa_test.c

2013-02-26 Thread Salz, Rich via RT
You might want to read about timing attacks. -- Principal Security Engineer Akamai Technology Cambridge, MA __ OpenSSL Project http://www.openssl.org Development Mailing List

RE: [openssl.org #3320] Invalid large memory access in openssl due to a bug on the client side

2014-04-26 Thread Salz, Rich via RT
If the API requires the same buffer and count, then perhaps the SSL structure should hold those values, and require the user to send NULL/0 in subsequent calls? Or assert(). It's a programming error that requires source changes to fix. -- Principal Security Engineer Akamai Technologies,

[openssl.org #3388] Locking inefficiency

2014-06-07 Thread Salz, Rich via RT
A colleague here noticed that the pthreads-based locking loses the distinction between read and write locks. We've collected mutex contention data, and found that the CRYPTO_ERR lock, used while getting error info, is one of the biggest offenders. It turns out that pthreads_locking_callback

RE: [openssl.org #44] OpenSSL_add_all_algorithms problems in Win32

2014-06-28 Thread Salz, Rich via RT
From: owner-openssl-...@openssl.org [mailto:owner-openssl-...@openssl.org] On Behalf Of Erik Forsberg What would be the best equivalent yo pthread_once on Windows ? I was once looking for one, and back then, years ago, I didnt like the choices. Perhaps

RE: [openssl.org #3451] patch for x509.c

2014-07-15 Thread Salz, Rich via RT
The Globus syntax is strange. :) We should support the ISO date/time standard, and use that throughout and not invent yet another syntax, or yet another flag. It's fairly simple to parse, and handles timezones, relative times, date/time mixing, and so on. The XML XSD spec, for example, has a

[openssl.org #3498] RE: AW: Platform query

2014-08-22 Thread Salz, Rich via RT
So I would not understand that we go in a hurry to remove WCE compatibility I do not think we are in a hurry to do that. Your patch looks nice. I am CC'ing rt, so that this thread becomes an issue and we'll see the link to your mail. -- Principal Security Engineer Akamai Technologies,

RE: [openssl.org #2324] convert c_rehash from perl to POSIX shell

2014-08-27 Thread Salz, Rich via RT
i don't think that's really true. else, why is autoconf friends relying on a shell and not perl ? those see way more distribution than openssl. Last I looked, autoconf doesn't use anything that really wasn't in Version 7 Bourne shell. In my comment, I deliberately used the term posix

RE: [openssl.org #2324] convert c_rehash from perl to POSIX shell

2014-08-27 Thread Salz, Rich via RT
These all first appeared in ksh: functions, local, return, $((math)) But to my mind, the question is moot, since post-1.0.2 we'll almost definitely have c_rehash builtin to the openssl command. that would also work :) It will also be much much much faster, since it doesn't have to call

FW: [openssl.org #3271] OpenSSL 1.0.2 Beta 1 Solaris 10 Sparc Shell error during make install

2014-09-06 Thread Salz, Rich via RT
Fix isn't complete. Adding this message -- Principal Security Engineer Akamai Technologies, Cambridge MA IM: rs...@jabber.me Twitter: RichSalz -Original Message- From: owner-openssl-...@openssl.org [mailto:owner-openssl-...@openssl.org] On Behalf Of Rainer Jung Sent: Saturday,

[openssl.org #3517] Cipher suites should be case-insensitive

2014-09-07 Thread Salz, Rich via RT
Cipher suite names should be case-insenstive: TLSV1 should work as well as TLSv1. Not doing this makes valid, but weak, configurations more likely: TLSV1:RC4 for example. __ OpenSSL Project

RE: [openssl.org #3534] When I build openssl-1.0.1i on Solaris 10, there are some error, please help to check what is the reason. Thanks.

2014-09-24 Thread Salz, Rich via RT
The error makes no sense. The compiler is complaining about the include line? Do wc -l md2test.c -- Principal Security Engineer, Akamai Technologies IM: rs...@jabber.memailto:rs...@jabber.me Twitter: RichSalz __ OpenSSL Project

RE: RE: [openssl.org #3534] When I build openssl-1.0.1i on Solaris 10, there are some error, please help to check what is the reason. Thanks.

2014-09-25 Thread Salz, Rich via RT
Somehow the file that you have is corrupted. It is not corrupted in the tar file. It is a local error. I do not know what the error is but mdtest.c on your disk is WRONG. __ OpenSSL Project

RE: [openssl.org #3544] Remove MWERKS support

2014-11-28 Thread Salz, Rich via RT
Yes, I will revert the change. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

Re: [openssl-dev] [openssl.org #3627] Enhancement request: add more Protocol options for SSL_CONF_CTX

2014-12-08 Thread Salz, Rich via RT
I think magic names -- shorthands -- are a very bad idea. They are point-in-time statements whose meaning evolves, if not erodes, over time. ___ openssl-dev mailing list openssl-dev@openssl.org

Re: [openssl-dev] [openssl.org #3627] Enhancement request: add more Protocol options for SSL_CONF_CTX

2014-12-10 Thread Salz, Rich via RT
Personally i am willing to put enough trust in the OpenSSL team *even insofar* as i now do 'set ssl-protocol=ALL,-VULNERABLE' and leave the task of deciding what is VULNERABLE up to you. That is not a responsibility we want. No how, no way. It is enough to be responsible for the code.

Re: [openssl-dev] [openssl.org #3627] Enhancement request: add more Protocol options for SSL_CONF_CTX

2014-12-10 Thread Salz, Rich via RT
I'd love to see a version of bettercrypto.org that only has to say to configure OpenSSL version 1.0.3 and higher, you should use the string BEST_PRACTICE That can happen but not by embedding magic strings into code. See http://rt.openssl.org/Ticket/Display.html?id=3266

Re: [openssl-dev] [openssl.org #3627] Enhancement request: add more Protocol options for SSL_CONF_CTX

2014-12-11 Thread Salz, Rich via RT
So you want a separate openssl-conf package. Fine, then provide it and give an easy mechanism for applications to hook into it. And for users to be able to overwrite system defaults. But this has not that much to do with #3627. Yes it does. :) A newer simpler API that does what you want

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2014-12-15 Thread Salz, Rich via RT
For what it's worth, I have tested the Alexa top 1 million servers with the - trusted_first option and haven't found a single server that looses its trusted status, on the other hand, good few percent of servers do gain it. It's worth a great deal. Thanks! I love fact-based analysis. :)

Re: [openssl-dev] [openssl.org #3562] leading dots in nameConstraints ... bug report and patch

2015-01-01 Thread Salz, Rich via RT
This is a security issue in the sense that is a Type-II error (disallowing good guys). It affects thousands of sites and who-knows-how-many users. Well, kinda. It disallows good guys who made a mistake and are violating the RFC. Sure, they're not written in stone and that particular RFC

Re: [openssl-dev] [openssl.org #3695] DTLS Handshake issue (openssl-1.0.1e-dtls-ecc-ext.patch) leads to process crash

2015-02-10 Thread Salz, Rich via RT
Matt tried to explain this before. 1.0.1e-30 is not a version that OpenSSL provides. You will have to contact your vendor. The backtrace information is not usable as there are no function names; you will have to build a debugging version. We cannot help you. -- Principal Security Engineer,

Re: [openssl-dev] [openssl.org #3488] OPENSSL_config shouldn't exit()

2015-01-26 Thread Salz, Rich via RT
Yes. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3738] [PATCH] tell make running subcommands are make based

2015-03-08 Thread Salz, Rich via RT
Lets add + to the rules we know are make based. Isn't that a gnu-make-only thing? -- Senior Architect, Akamai Technologies IM: rs...@jabber.me Twitter: RichSalz ___ openssl-dev mailing list To unsubscribe:

[openssl-dev] [openssl.org #3769] Bug in v3_alt.c

2015-03-29 Thread Salz, Rich via RT
Found during internal code review. V3_alt.c has this proposed change: ret = X509V3_NAME_from_section(nm, sk, MBSTRING_ASC); - if (!ret) + if (!ret) { X509_NAME_free(nm); + nm = NULL; + } gen-d.dirn = nm; Kurt points out: This looks like a bugfix that should probably go to other branches.

Re: [openssl-dev] [openssl.org #3526] [Patch] Removed the dependency on the obsolete TERMIO.h for linux 32 and 64bits.

2015-02-24 Thread Salz, Rich via RT
I took this a bit further and made TERMIOS the default if nothing else is said. YEA! ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3717] Patch for IPv6 support in s_client/s_server

2015-03-24 Thread Salz, Rich via RT
The short answer is that nobody has come up with comprehensive cross-platform IPv6 support. Fixing the apps isn't enough; how does a server listen on IPv4, v6, both -- and make it work on our supported platforms? What should the various BIO API's do? Looking forward to diff's.

[openssl-dev] [openssl.org #3801] need NULL check in CMAC_CTX_free

2015-04-13 Thread Salz, Rich via RT
need to add these lines around 115 in cma.c void CMAC_CTX_free(CMAC_CTX *ctx) { +if (!ctx) +return; CMAC_CTX_cleanup(ctx); OPENSSL_free(ctx); } . ___ openssl-dev mailing list To unsubscribe:

[openssl-dev] [openssl.org #3798] null check in x509_lu.c:cleanup

2015-04-12 Thread Salz, Rich via RT
around line 218 add the if check: static void cleanup(X509_OBJECT *a) { + if (!a) +return; . ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3799] add null to check X509_STORE_CTX_free

2015-04-12 Thread Salz, Rich via RT
Around line 2226 add the NULL check. void X509_STORE_CTX_free(X509_STORE_CTX *ctx) { + if (!ctx) + return; ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3785] missing NULL check in X509_VERIFY_PARAM_free

2015-04-06 Thread Salz, Rich via RT
Need if (!param) return; at the start of X509_VERIFY_PARAM_free Found by Kurt while code-reviewing some of my changes on master. . ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3782] bug/leak in crypto/ec/ecp_smpl.c

2015-04-06 Thread Salz, Rich via RT
around line 135. The old code has a memory leak, only freeing the BN if it's NULL. - if (!group-field) - BN_free(group-field); - if (!group-a) - BN_free(group-a); - if (!group-b) - BN_free(group-b); + BN_free(group-field); + BN_free(group-a); + BN_free(group-b); .

[openssl-dev] [openssl.org #3783] missing null pointer check in x509_lu.c

2015-04-06 Thread Salz, Rich via RT
void X509_OBJECT_free_contents(X509_OBJECT *a) { + if (!a) + return; switch (a-type) { already done in master. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3784] bug in v3_alt.c

2015-04-06 Thread Salz, Rich via RT
In crypto/x509v3/v3_alt.c, around line 603: - if (!ret) + if (!ret) { X509_NAME_free(nm); +nm = NULL; + } Kurt points out: This looks like a bugfix that needs to go to other branches. We probably shouldn't even touch gen in case of an error. / .

Re: [openssl-dev] [openssl.org #3897] request: add BLAKE2 hash function (let's kill md5sum!)

2015-06-08 Thread Salz, Rich via RT
Blake2s is 256-bit, while Blake2d is 512-bit.  These are the ones I assume that would be best for addition.  The other two, Blake2sp and Blake2bp are multi-threaded, and are optimized for multi-core CPUs. It is unfortunate that 's' and 'd' mean different algorithms, while 2sp and 2bp are,

Re: [openssl-dev] [openssl.org #3897] request: add BLAKE2 hash function (let's kill md5sum!)

2015-06-08 Thread Salz, Rich via RT
So it's really a request to add four hash functions. Bummer. In practice the parallel mode works nicely on modern systems. Well, on clients. On servers, presumably, those cores would be busy ;) I'd support adding 2b and 2s, in spite of the fact that the names are really really bad. I'm

Re: [openssl-dev] [openssl.org #3891] [PATCH] Fix undefined behavior executed through OpenSSL tests

2015-06-02 Thread Salz, Rich via RT
Generally, these look good. I have concerns about three (that you raised); quoting from your README. Any comments from others? + err.c.patch The 'int_thread_del_item' function calls 'int_thread_release' that accesses (*hash), but this is invalid because 'int_thread_del_item' frees

Re: [openssl-dev] [openssl.org #3903] Infer run on openssl-1.0.2a

2015-06-11 Thread Salz, Rich via RT
This is great! Any chance you can run it against master? I'm hoping most of the ones in apps go away ... ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3883] [PATCH] Add IPv4/IPv6:port-based client cache

2015-05-31 Thread Salz, Rich via RT
(Documentation is in the source files, not a .pod) Do you have code to produce usable manpages from the embedded documentation? We can't ask users to read the source. I believe Todd meant for the test program. * The copyright notice does not refer to any license that would allow

Re: [openssl-dev] [openssl.org #3876] [PATCH] Do not complain if config file not found

2015-05-28 Thread Salz, Rich via RT
My suggestion is, at least for 1.1 (but I don't see why this can't be ported down to 1.0.2 and 1.0.1) remove the config loading code from openssl.c:main() and add the same code in req.c as you can find in ts.c or srp.c... possibly refactoring that code into a helper function in apps.c. Yes,

Re: [openssl-dev] [openssl.org #3976] Bug report

2015-07-31 Thread Salz, Rich via RT
My feeling is that you should not be copying an EVP if data is NULL and that the earlier null checks are erroneous. But I could be wrong. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4017] [PATCH] Implement Camellia GCM suites (RFC 6367)

2015-08-24 Thread Salz, Rich via RT
May I ask one question: Why? Excellent question. Because there is an RFC is not a good enough reason any more, I think. Does camellia offer any significant advantage in any situation that would justify increasing support? Yes, I'd like to know who needs it. GOST is going to move to an

Re: [openssl-dev] [openssl.org #3951] [RFC][PATCH] Allow certificate time checks to be disabled

2015-07-30 Thread Salz, Rich via RT
If requested, I can still provide a patch with the alternative variant of using a X509_V_FLAG_NO_CHECK_TIME flag if that's considered better than using a 'special' time of (time_t)-1 with X509_VERIFY_PARAM_set_time(). Yes, please. ___

Re: [openssl-dev] [openssl.org #3951] [RFC][PATCH] Allow certificate time checks to be disabled

2015-07-28 Thread Salz, Rich via RT
It seems that the simplest and most obvious thing is to indicate that you don't care about the dates, which is what this patch does. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3992] [PATCH] Allow RFC6962 Signed Certificate Timestamps to be disabled

2015-08-11 Thread Salz, Rich via RT
Yes. But skimping on security features is not a good way to deal with software/firmware bloat. And again, attacks on this layer are increasing in quantity and sophistication. The current protection mechanisms appear insufficient. Draw your own conclusions. But this isn't a general-purpose

Re: [openssl-dev] [openssl.org #3955] [PATCH] Reduce stack usage in PKCS7_verify()

2015-07-23 Thread Salz, Rich via RT
How about 256 on the stack? ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3956] SSL_accept() crashed in SSLv3 processing

2015-07-24 Thread Salz, Rich via RT
The first place to look is to see if your program has any pointers errors that are overwriting memory. Try something like valgrind or ASAN. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4103] Valgrind reported memory leak in X509_PUBKEY_get

2015-10-21 Thread Salz, Rich via RT
> I am trying figure out valgrind report leak. in openssl 1.0.1c. You don't have enough of the backtrace for us to reproduce it. Please add a simple demo program. ___ openssl-dev mailing list To unsubscribe:

Re: [openssl-dev] [openssl.org #4094] Nonsensical pointer comparison in PACKET_buf_init

2015-10-15 Thread Salz, Rich via RT
> PACKET_buf_init. This code can assume that |len| is from a trusted source. > > The purpose of the sanity check is not then for security, but to guard against > programmer error. For a correctly functioning program this test should never > fail. I would say that the combination of these two

Re: [openssl-dev] [openssl.org #4075] Enhancement request: Camellia ECDHE+GCM suites

2015-10-08 Thread Salz, Rich via RT
Also, note that the earliest this could happen is for 1.1 (it's a new feature), and it's not high on our priority list for that release right now. Patches that are regularly rebased against master would help. ___ openssl-dev mailing list To

Re: [openssl-dev] [openssl.org #4088] RE: [Bug] Openssl caused CPU high to 100%

2015-10-10 Thread Salz, Rich via RT
More information is needed. But this is most likely not an OpenSSL bug, it's the FIPS setup-testing. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3712] TLS Renegotiation with Java is broken

2015-10-12 Thread Salz, Rich via RT
> AFAICT if SSL_read returns between the first handshake and the second, you > don't get the problem. I think it should not matter when or what SSL_read returns. That should only be returning application-level data to the caller. All state manipulations, etc., should be done underneath and

Re: [openssl-dev] [openssl.org #4091] Openssl make depends gives errors when no-md5 is specified

2015-10-12 Thread Salz, Rich via RT
Yes, the various no-options don't work well. Not a high priority for 1.0.2 unless patches are provided. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3934] [PATCH] test: use _DEFAULT_SOURCE with newer glibc versions

2015-07-10 Thread Salz, Rich via RT
This is strange, since OpenSSL doesn't use gethostname which the comments mention. Can you add the exact error message? And why only that one file? More strangeness. ___ openssl-dev mailing list To unsubscribe:

Re: [openssl-dev] [openssl.org #3934] [PATCH] test: use _DEFAULT_SOURCE with newer glibc versions

2015-07-11 Thread Salz, Rich via RT
Ah, that explains my confusion; I was looking at master. So we need to make this fix for 1.0.x Thanks. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4028] about the chipersuite for CoAP

2015-09-04 Thread Salz, Rich via RT
> so will v1.1 be released in this year? More likely early 2016. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #4027] Return value in dh_pmeth.c

2015-09-03 Thread Salz, Rich via RT
A non-matching kdf_type moves from return 1 to return 0 if NO_CMS compiles out the KDF_X9_42 change - that is a different error return and that seems incorrect to be making that change as part of handling conditional compilation additions. Although it looks like that change is one that should

Re: [openssl-dev] [openssl.org #4033] Unable to build openssl git master branch on NetBSD for > 24 hours

2015-09-10 Thread Salz, Rich via RT
Please do "grep rehash Makefile" at the toplevel. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] Update RE: [openssl.org #4033] Unable to build openssl git master branch on NetBSD for > 24 hours

2015-09-15 Thread Salz, Rich via RT
Yes, it has two main functions, based on #ifdef unix. Not sure why netBSD doesn't -Dunix. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] Update RE: [openssl.org #4033] Unable to build openssl git master branch on NetBSD for > 24 hours

2015-09-16 Thread Salz, Rich via RT
> Hmmm. It used to build and test OK, did the check for -Dunix change > recently? No. > Is the -Dunix test in config script? No, it's in apps/rehash.c > For a quick fix I added -Dunix to CFLAGS in Makefile and I am able to make > and run tests. Sounds like the netBSD config needs to add

Re: [openssl-dev] [openssl.org #4033] Unable to build openssl git master branch on NetBSD for > 24 hours

2015-09-17 Thread Salz, Rich via RT
Since email re-opens the ticket, let's use this one :) What's the output of this command: HARNESS_VERBOSE=yes make 'TESTS=test_rehash' test ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4060] AutoReply: a crash happened inside SSL_Connect function

2015-09-28 Thread Salz, Rich via RT
> I want to know how it's going with the ticket [openssl.org #4060]? Nobody's looked at it yet. You need to include a backtrace. And a way to reproduce it (sample code) before anyone will really be interested. ___ openssl-dev mailing list To

Re: [openssl-dev] [openssl.org #4061] [PATCH] Request for new API to get role of SSL

2015-09-27 Thread Salz, Rich via RT
> if so, any plan to backport it? No, it's a new feature; only fixes go into releases. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3964] Fix OPENSSL_NO_STDIO build

2015-09-30 Thread Salz, Rich via RT
> OPENSSL_stderr() is such thing. Well, for a Unix person it's really > meaningless > function, but it was introduced to solve small but irritating problem in FIPS > module context on Windows. I removed it :) Since 1.1 doesn't support FIPS, that's okay. But we'll have something like that for

Re: [openssl-dev] [openssl.org #3964] Fix OPENSSL_NO_STDIO build

2015-09-30 Thread Salz, Rich via RT
> If you want to keep it can we make it return a BIO? Many platforms could use > it then for serial debug output etc. That's what I'm going to do. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3964] Fix OPENSSL_NO_STDIO build

2015-09-30 Thread Salz, Rich via RT
> If things like BIO_new_file() were inline, or macros, then the compiler could > *see* that they'd return NULL. And lots of code in the *calling* functions > (basically everything but the error path) could be elided from the compiled > result... Cool, will do that.

Re: [openssl-dev] [openssl.org #4033] Unable to build openssl git master branch on NetBSD for > 24 hours

2015-09-18 Thread Salz, Rich via RT
> YES! It's a one user box that I regularly update and install on, so rarely > run as > reduced/un-privileged user. > > If I switch to non-root, this passes. Glad we got it figured out. Perhaps we can add a warning to the test (running as root, expect to fail) or some such.

Re: [openssl-dev] [openssl.org #4175] Add new macro or PKCS7 flag to disable the check for both data and content

2015-12-08 Thread Salz, Rich via RT
I think that instead of the #ifdef being removed, the if() test should be removed. This was my mistake. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4165] 1.0.1q release busted, does not compile

2015-12-03 Thread Salz, Rich via RT
Also see as https://github.com/openssl/openssl/issues/492 ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4194] engine command regression in 1.1

2016-01-03 Thread Salz, Rich via RT
The old style of complete intermix of flags and parameters is not going to happen. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4194] engine command regression in 1.1

2016-01-02 Thread Salz, Rich via RT
Please see this: https://github.com/openssl/openssl/compare/master...richsalz:rt4194?expand=1 ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4194] engine command regression in 1.1

2015-12-29 Thread Salz, Rich via RT
Does this diff fix it? ; g diff apps/engine.c diff --git a/apps/engine.c b/apps/engine.c index c373df5..3c0ff96 100644 --- a/apps/engine.c +++ b/apps/engine.c @@ -312,12 +312,17 @@ int engine_main(int argc, char **argv) BIO *out; const char *indent = " "; OPTION_CHOICE o; -

Re: [openssl-dev] [openssl.org #4201] Feature Request: Support dumping session keys in NSS key log format

2016-01-09 Thread Salz, Rich via RT
> SSLKEYLOGFILE env var is a good current standard, so I think openssl should > use it as well. Patches to implement all of this would be helpful, otherwise it will probably not make it into the next relese. ___ openssl-dev mailing list To

Re: [openssl-dev] [openssl.org #4225] OpenSSL 1.1-pre2 EC_KEY_ex_data regression of functionality from 1.0.2 to 1.1

2016-01-09 Thread Salz, Rich via RT
> Any idea when these will be in github? Hopefully in time for the next alpha 1.1 release, in a week or two. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4194] engine command regression in 1.1

2016-01-03 Thread Salz, Rich via RT
Tweaked, sigh. ; ./util/opensslwrap.sh engine - dynamic -pre engine: Cannot mix flags and engine names. engine: Use -help for summary. exit 1 ___ openssl-dev mailing list To unsubscribe:

Re: [openssl-dev] [openssl.org #4194] engine command regression in 1.1

2016-01-03 Thread Salz, Rich via RT
So you're saying just close this ticket? ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4187] [Patch] Secure memory subsystem does not report actual size

2015-12-18 Thread Salz, Rich via RT
This is good. I changed it to size_t and will merge it as part of other "secmem" API cleanups I have in progress. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4201] Feature Request: Support dumping session keys in NSS key log format

2015-12-28 Thread Salz, Rich via RT
Yes we would be interested in this but someone would almost definitely have to be provided as a complete patch because it seems unlikely anyone on the team will get around to doing it by 1.1 release. ___ openssl-dev mailing list To unsubscribe:

Re: [openssl-dev] [openssl.org #4194] engine command regression in 1.1

2015-12-22 Thread Salz, Rich via RT
I don't know that I would call it a regression, but rather a difference. :) I'll fix the summary but not the old uncommon behavior. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4200] extra data for ec keys

2015-12-24 Thread Salz, Rich via RT
I fixed that, added docs. It's in code review now. Thanks! ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4151] [PATCH] Function pop_info in crypto/mem_dbg.c returns a dangling pointer

2015-11-22 Thread Salz, Rich via RT
We have another internal cleanup in-progress that will fix this in a different way. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4228] Feature request: Support AEAD ciphers in enc app

2016-01-11 Thread Salz, Rich via RT
> I have implemented it as a small part of my Master thesis, maybe I could > polish it and submit a PR. Please do this. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4227] openssl rand 10000000000 does not produce 10000000000 random bytes

2016-01-11 Thread Salz, Rich via RT
And also opt_int and opt_long in apps/opt.c are useful. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4227] openssl rand 10000000000 does not produce 10000000000 random bytes

2016-01-11 Thread Salz, Rich via RT
> I am a bit worried when I see C-beginner mistakes like this in a security > suite: > When using sscanf on data you have not produced yourself, you should > always assume they will be bigger that your largest buffer/variable and deal > correctly with that. That's a bit of an exaggeration here.

Re: [openssl-dev] [openssl.org #4227] openssl rand 10000000000 does not produce 10000000000 random bytes

2016-01-11 Thread Salz, Rich via RT
> The worry is not about this particular case (where it does not seem to be > possible to abuse), but as a general observation: If the rest of the code has > the same quality, then we will be screwed. Shrug. We do the best we can. We try to do a good job. Almost everyone would agree that the

Re: [openssl-dev] [openssl.org #4227] openssl rand 10000000000 does not produce 10000000000 random bytes

2016-01-12 Thread Salz, Rich via RT
> May I suggest the bug also becomes a wish for support for > 2GB numbers, > as that is what the user originally wanted? Unlikely to happen in 1.1 because of portability issues. Call it multiple times or, better, write a small program to generate a PRNG stream.

Re: [openssl-dev] [openssl.org #4568] Enhancement request: Capability vector accessor function for arm and ppc

2016-06-14 Thread Salz, Rich via RT
Doesn't it make more sense to have a single API that returns the platform-specific flags? -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4568 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe:

Re: [openssl-dev] [openssl.org #4571] SegFault when OBJ_create is called from multiple threads (despite setting up locking_function)

2016-06-14 Thread Salz, Rich via RT
> That's fine with me, though, it might bite someone in the future. Is there any > documentation or site listing which funcs would be thread-safe? (if this is > offtopic, please let me know, and we'll simply end the thread) Please take it to openssl-dev mailing list. It's a good discussion to

Re: [openssl-dev] [openssl.org #4038] SSLv2 session reuse is broken on the 1.0.2 branch

2016-06-15 Thread Salz, Rich via RT
So are we still fixing SSLv2 bugs? Or are they too low on the priority list? -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4038 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe:

Re: [openssl-dev] [openssl.org #4362] chacha-x86.pl has stricter aliasing requirements than other files

2016-06-15 Thread Salz, Rich via RT
Not defined means we make no guarantees. OpenSSL can depend on what it knows to be true. In the next release we can revisit this. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4362 Please log in as guest with password guest if prompted -- openssl-dev mailing list To

Re: [openssl-dev] [openssl.org #3502] nameConstraints bypass bug

2016-05-30 Thread Salz, Rich via RT
> Note that other implementations treated this as a bug and fixed it a long time > ago. What other implementations, and what did they do? Always treating a CN as a DNS name? We can't. > I'm not sure what "deprecated" and "mandated" mean in the openssl > context. If openssl actually

Re: [openssl-dev] [openssl.org #4457] apps/apps.c and apps/ocsp.c needs for fd_set

2016-05-31 Thread Salz, Rich via RT
Since it 'just works' for now, maybe remove the 1.1 milestone? -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4457 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4552] Bug report: hex string is too long, problem in set_hex()?

2016-05-31 Thread Salz, Rich via RT
> If the size multiplier is changed to, say, 4, then the problem goes away with > no apparent ill effects. Reading the code for set_hex() and its caller, it > does > not appear that the size multiplier is related to a buffer size or some other > limitation. Yes it is, it's the size of the buffer

Re: [openssl-dev] [openssl.org #3502] nameConstraints bypass bug

2016-05-31 Thread Salz, Rich via RT
I completely agree that nameconstraints are going to become a bigger deal, likely in the next 12-24 months, and certainly during the peak usage time of OpenSSL 1.1 -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3502 Please log in as guest with password guest if prompted --

Re: [openssl-dev] [openssl.org #4545] Resolved: Crash in crypto/rand/md_rand.c

2016-06-16 Thread Salz, Rich via RT
Ah, didn't realize you needed it in 1.0.2; will backport shortl. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4545 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4581] [1.0.2] Running tests in parallel results in failure

2016-06-21 Thread Salz, Rich via RT
This is not supported. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4581 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4580] "openssl verify -CAfile cacerts.pem cert.pem" fails if cacerts.pem is ordered in certain ways

2016-06-21 Thread Salz, Rich via RT
Having a mix of experied and unexpired certificates in the trust store for the same issuer/key seems to be undefined. I am not sure this is a bug. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4580 Please log in as guest with password guest if prompted -- openssl-dev mailing

Re: [openssl-dev] [openssl.org #4580] "openssl verify -CAfile cacerts.pem cert.pem" fails if cacerts.pem is ordered in certain ways

2016-06-21 Thread Salz, Rich via RT
Yes, it should not crash. But without more information it is hard/impossible to debug. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4580 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe:

  1   2   >