Re:Re: need your help about fipsld in Example OpenSSL Based Application

2019-11-27 Thread 炉诸
Thank you for the suggestion. When I do like make CC=/path/to/fipsld FIPSLD_CC=/point/to/gcc It gave out /bin/sh: warning: shell level (1000) too high, resetting to 1 then putty exit. At 2019-11-27 13:16:51, "Pankaj Sarode" wrote: Hi, You will need to pass your native compiler i.e gcc to

Re: Usage of Secure C (memcpy_s, strcpy_s etc) functions on OpenSSL

2019-11-27 Thread Andrew Tucker via openssl-users
Unless buffer is a char* instead of a char[] in which case its completely wrong. A very common case among buggy C code. On Wed, Nov 27, 2019 at 7:09 AM Phillip Susi wrote: > > Michael Wojcik writes: > > > Some C experts have argued that the length-checking versions of the > library

Re: Usage of Secure C (memcpy_s, strcpy_s etc) functions on OpenSSL

2019-11-27 Thread Michael Wojcik
> From: Phillip Susi > > Michael Wojcik writes: > > Some C experts have argued that the length-checking versions of the library > > functions, either the C90 > > ones such as strncat or the Appendix K ones, are essentially pointless > > anyway; that the caller needs to > > handle truncation

Re: Usage of Secure C (memcpy_s, strcpy_s etc) functions on OpenSSL

2019-11-27 Thread Paul Smith
On Tue, 2019-11-26 at 23:47 +, Jordan Brown wrote: > Here's a paper on the subject: > http://www.open-std.org/jtc1/sc22/wg14/www/docs/n1967.htm I love the fact that the "correct and safe" example they give in "Unnecessary Uses" is neither correct nor safe (it has a potential DOS due to

Re: Usage of Secure C (memcpy_s, strcpy_s etc) functions on OpenSSL

2019-11-27 Thread Phillip Susi
Michael Wojcik writes: > Some C experts have argued that the length-checking versions of the library > functions, either the C90 ones such as strncat or the Appendix K ones, are > essentially pointless anyway; that the caller needs to handle truncation and > so ought to know whether

Re: OpenSSL 1.0.2 EOL

2019-11-27 Thread Matt Caswell
On 27/11/2019 11:07, shiva kumar wrote: > but still the update is going on in the GitHub repository for 102 > branch, is that mean there will be a release by end of this year? There are no commits against the 1.0.2 branch that would qualify for a CVE - they are all relatively minor commits.

Re: OpenSSL 1.0.2 EOL

2019-11-27 Thread shiva kumar
but still the update is going on in the GitHub repository for 102 branch, is that mean there will be a release by end of this year? On Tue, Nov 26, 2019 at 6:31 PM Matt Caswell wrote: > > > On 26/11/2019 11:38, shiva kumar wrote: > > Hi, > > As we know that OpenSSL 1.0.2 support will end in