Re: [openssl-users] [openssl-announce] Forthcoming OpenSSL releases

2015-03-18 Thread Jakob Bohm
On 18/03/2015 10:14, Matt Caswell wrote: On 18/03/15 07:59, Jakob Bohm wrote: (Resend due to MUA bug sending this to -announce) On 16/03/2015 20:05, Matt Caswell wrote: Forthcoming OpenSSL releases The OpenSSL project team would like to announce the forthcoming

Re: [openssl-users] [openssl-announce] Forthcoming OpenSSL releases

2015-03-18 Thread Matt Caswell
On 18/03/15 07:59, Jakob Bohm wrote: (Resend due to MUA bug sending this to -announce) On 16/03/2015 20:05, Matt Caswell wrote: Forthcoming OpenSSL releases The OpenSSL project team would like to announce the forthcoming release of OpenSSL versions 1.0.2a,

Re: [openssl-users] [openssl-announce] Forthcoming OpenSSL releases

2015-03-18 Thread Jakob Bohm
(Resend due to MUA bug sending this to -announce) On 16/03/2015 20:05, Matt Caswell wrote: Forthcoming OpenSSL releases The OpenSSL project team would like to announce the forthcoming release of OpenSSL versions 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf. These releases

Re: [openssl-users] [openssl-announce] Forthcoming OpenSSL releases

2015-03-18 Thread Matt Caswell
On 18/03/15 10:45, Jakob Bohm wrote: However the patch rebasing instructions are *completely useless* for those of us whomaintain private patches against releases tarballs. We *don't* have any of this in a clone of your gitand we *have no way* to access intermediary git steps from your

Re: [openssl-users] [openssl-announce] Forthcoming OpenSSL releases

2015-03-18 Thread John Foley
We maintain our own derivative of OpenSSL and haven't had any significant issues due to the code reformat. We simply run the reformat script on our downstream derivative. We can then generate patch files of our changes and reapply them to new OpenSSL releases. It was fairly straight forward.

Re: [openssl-users] Forthcoming OpenSSL releases

2015-03-18 Thread Matt Caswell
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 16/03/15 19:05, Matt Caswell wrote: Forthcoming OpenSSL releases The OpenSSL project team would like to announce the forthcoming release of OpenSSL versions 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf. These releases

Re: [openssl-users] [openssl-announce] Forthcoming OpenSSL releases

2015-03-18 Thread Jakob Bohm
Nice, so the extra work is minimal for complete forks of OpenSSL. The extra work is also documented (in a place not linked from the wiki) for those who maintain a git fork of the OpenSSL repository. But I have not yet seen a meaningful recipe for those of us who maintain a traditional set of

[openssl-users] Solaris 11.2 openssl

2015-03-18 Thread MAGANA, ANDREAS S I CTR USAF AFMC 72 ABW/SCOOT
I have BMC BladeLogic and recently downloaded a password change script that uses openssl and I am seeing an error message of the script unable for openssl to generate hash for password. Can I attach the script for someone to help me? Thank you, Respectfully //SIGNED// Andy MagaƱa UNIX

Re: [openssl-users] base64 decode in C

2015-03-18 Thread Walter H.
Hi, before calling this function, remove any whitespace; Walter smime.p7s Description: S/MIME Cryptographic Signature ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] [openssl-announce] Forthcoming OpenSSL releases

2015-03-18 Thread Salz, Rich
The extra work is also documented (in a place not linked from the wiki) for those who maintain a git fork of the OpenSSL repository. I just tossed together https://wiki.openssl.org/index.php/Code_reformatting Found off the main page,

Re: [openssl-users] base64 decode in C

2015-03-18 Thread Prashant Bapat
Hi Dave and Walter, Thanks for our reply. I'm not doing anything different for the ssh pubkey. I'm able to decode it using the openssl enc -base64 -d -A command. But not using the C program. Attaching my entire code here. After getting the base64 decoded I'm calculating the MD5 sum and printing

Re: [openssl-users] base64 decode in C

2015-03-18 Thread Jakob Bohm
Please refer to Dave Thompson's answer, it describes your problem. On 18/03/2015 16:08, Prashant Bapat wrote: Hi Dave and Walter, Thanks for our reply. I'm not doing anything different for the ssh pubkey. I'm able to decode it using the openssl enc -base64 -d -A command. But not using the C

Re: [openssl-users] [openssl-announce] Forthcoming OpenSSL releases

2015-03-18 Thread Dr. Matthias St. Pierre
Thanks for the three line upgracde recipe in https://wiki.openssl.org/index.php/Code_reformatting It's as simple as you stated, indeed. The reformatting was a good thing to do. Also, it makes sense to me to apply it to all stable branches uniformly, in order to simplify cross-branch merging.

Re: [openssl-users] base64 decode in C

2015-03-18 Thread Scott Neugroschl
I believe the SSH pubkey is binary data, not ASCII, so strlen() will not work on it if it has embedded NUL chars. As Dave Thompson suggested, instead of strlen(), use the length returned from BIO_read. From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of Prashant Bapat

[openssl-users] base64 decode in C

2015-03-18 Thread Prashant Bapat
Hi, Most likely this has been answered before, please bear with me. I'm trying to use the base64 decode function in C. Below is the function. char *b64_decode(unsigned char *input, int length) { BIO *b64, *bmem; char *buffer = (char *)malloc(length); memset(buffer, 0, length);

Re: [openssl-users] [openssl-announce] Forthcoming OpenSSL releases

2015-03-18 Thread Dr. Matthias St. Pierre
Hello, Here is a recipe to guide you through the reformatting. It worked nicely for me. I wrote a small bash shell script which helped me do the bulk conversion, see attachment Hope you'll find this information helpful. In following I briefly describe the steps how you can 1) get your patches

[openssl-users] FIPS 140-2 hostage rescue underway

2015-03-18 Thread Steve Marquess
As always, if you don't know or care what FIPS 140-2 is then count yourself lucky and move on (in this case, count yourself *very* lucky). We have -- we think -- a workaround for the hostage issue that was blocking the addition of new platforms to the OpenSSL FIPS module validation via change

Re: [openssl-users] base64 decode in C

2015-03-18 Thread Walter H.
On 18.03.2015 16:08, Prashant Bapat wrote: printf(Base64 decoded string is : %s\n, b64_decode(str, strlen(str))); // This should print binary for a ssh key. not really, because the return of b64_decode is not a C string; and the format specfier %s expects a C string; smime.p7s Description: