[openssl-users] Is authorized_keys2 read in Openssh version 4/5.x?

2016-08-11 Thread Bhatt, Rakshesh 1. (Nokia - IN/Bangalore)
Hi OpenSSL team, How can I find out if authorized_keys2 is read in Openssh version 4.x/5.x? I understand that this is deprecated from version 3.0 onwards, but release notes of version 3.0 just says that," Future releases are likely not to read these files." So I am not able to tell for sure

Re: [openssl-users] iOS assembler questions

2016-08-11 Thread Jakob Bohm
On 04/08/2016 19:19, Jakob Bohm wrote: I am trying to build the OpenSSL 1.0.2h ARM optimized assembler routines for Apple iOS (the default build config doesn't do that yet). However the Apple version of the LLVM 7.3.0 ARM assembler seems to reject some of the notation used by the current source

Re: [openssl-users] BIO_seek() on bio_f_cipher with EVP_aes_256_ctr

2016-08-11 Thread Dr. Stephen Henson
On Thu, Aug 11, 2016, William King wrote: > > > Does the BIO_seek() not handle incrementing or decrementing the IV > counter? is there a callback that needs to be set to calculate what the > IV counter value should be for a given file position for the cipher? > Calling BIO_seek() on a chain

Re: [openssl-users] BIO_seek() on bio_f_cipher with EVP_aes_256_ctr

2016-08-11 Thread Salz, Rich
> Does the BIO_seek() not handle incrementing or decrementing the IV > counter? is there a callback that needs to be set to calculate what the IV > counter value should be for a given file position for the cipher? It does not. -- openssl-users mailing list To unsubscribe:

Re: [openssl-users] BIO_seek() on bio_f_cipher with EVP_aes_256_ctr

2016-08-11 Thread William King
Same decryption issue happens if I run something like: char buffer[1024] = {}, buffer2[1024] = {0}; size_t pos = BIO_tell(enc); BIO_read(enc, buffer, 1024); BIO_seek(enc, pos); BIO_read(enc, buffer2, 1024); if (memcmp(buffer, buffer2, 1024)) { printf("Mismatched\n"); } else { printf("Matched\n");

Re: [openssl-users] BIO_seek() on bio_f_cipher with EVP_aes_256_ctr

2016-08-11 Thread William King
Without any of the error checking code in place, this is what I'm testing: /* START CODE BLOCK */ const EVP_CIPHER *cipher = EVP_aes_256_ctr(); const EVP_MD *digest = EVP_sha256(); BIO *enc = BIO_new(BIO_f_cipher()); BIO *in = BIO_new(BIO_s_file()); EVP_CIPHER_CTX *ctx = NULL; char *path =

Re: [openssl-users] Openssl and floating point

2016-08-11 Thread Short, Todd
The -Ddouble=long hack might very well cause problems with standard headers. I’m assuming you are not talking about x86 or any other platform for which there is assembly support. In such a case, I suggest #ifdef’ing out the code that you don’t care about, and making it into a configuration

Re: [openssl-users] CVE-2016-2180

2016-08-11 Thread Salz, Rich
There is no test. That fix can be applied. 1.0.0 is really old and unsupported, you should upgrade as soon as possible -- Senior Architect, Akamai Technologies IM: richs...@jabber.at Twitter: RichSalz From: siva gopi raju kudeti [mailto:sivagopi...@gmail.com] Sent: Thursday, August 11, 2016

[openssl-users] CVE-2016-2180

2016-08-11 Thread siva gopi raju kudeti
Hi OpenSSL team, I am using openssl-1.0.0e in my product. Here i want to know that OpenSSL is CVE-2016-2180 vulnerable or not. https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca373 65e8c7403a?diff=unified In this page showing some modifications to the function