RE: Test failure for 1.1.1p - 10-test_bn

2022-06-21 Thread Dr. Matthias St. Pierre
My guess is that the loop is caused by one of the commits 0ed27fb7a8 and 8438d3a7b7. Would you mind to (a) check whether that's correct and which one of the two commits causes the problem, and (b) raise a GitHub issue for it? Matthias ~/src/openssl/1.1.1$ git log --oneline --stat

RE: Test failure for 1.1.1p - 10-test_bn

2022-06-21 Thread rsbecker
On June 21, 2022 7:40 PM, I wrote: >Our test process for 10-test_bn went into a hard loop when building using IEEE >float. This has not happened in prior tests or when using platform floating point >(default). The situation does not occur in 3.0.4 - only 1.1.1p. At 1.1.1o there was no >issue. I am

Test failure for 1.1.1p - 10-test_bn

2022-06-21 Thread rsbecker
Our test process for 10-test_bn went into a hard loop when building using IEEE float. This has not happened in prior tests or when using platform floating point (default). The situation does not occur in 3.0.4 - only 1.1.1p. At 1.1.1o there was no issue. I am concerned that there are assumptions

Build Error with 1.1.1p and 3.0.4

2022-06-21 Thread Jay Foster
I am trying to build the 1.1.1p and 3.0.4 versions of OpenSSL.  Each version now fails in the same place (test/v3ext.c).  The error is about undefined ASIdentifiers, etc. in the newly added test_asid() function. It looks like the newly added test_asid() function needs an  '#ifndef

OpenSSL Security Advisory

2022-06-21 Thread Matt Caswell
and no longer receiving updates of any kind. The impact of these issues on OpenSSL 1.1.0 has not been analysed. Users of these versions should upgrade to OpenSSL 3.0 or 1.1.1. References == URL for this Security Advisory: https://www.openssl.org/news/secadv/20220621.txt Note: the online version

RE: SSL error (78c0100): malloc failure while implementing tls 1.3

2022-06-21 Thread Ramaiah, Ravichandran Bagalur
Hi All, Could anyone tell me if this issue is caused due to application error or an openssl bug? This malloc failure is happening when I try to establish TLS connection between 2 SIP applications. Regards, Ravi From: Ramaiah, Ravichandran Bagalur Sent: Thursday, June 16, 2022 10:23 AM To:

Re: memory still reachable post calling SSL_CTX_free

2022-06-21 Thread Matt Caswell
On 21/06/2022 11:42, Tomas Mraz wrote: This is actually not a memory allocated by the SSL_CTX_new() itself but error string data that is global. There is no real memory leak here. You can call OPENSSL_cleanup() to explicitly de-allocate all the global data however please note that you can do

Re: memory still reachable post calling SSL_CTX_free

2022-06-21 Thread Tomas Mraz
On Tue, 2022-06-21 at 10:33 +, Tiwari, Hari Sahaya wrote: > Hi, > I need one clarification on routine SSL_CTX_free(). I see the memory > is not freed even after calling this SSL_CTX_free(). >   > I have a simple test program, which just does SSL_CTX_new() and  > SSL_CTX_free(). >   > #include

Re: Serializing SSL state

2022-06-21 Thread Matt Caswell
On 20/06/2022 22:29, Rouzier, James wrote: Hi Matt, What would it take to expose this? At the moment you can serialize an SSL_SESSION object - but this only helps during session resumption. So, using this capability, you could perform a resumption handshake on a different server to where

memory still reachable post calling SSL_CTX_free

2022-06-21 Thread Tiwari, Hari Sahaya
Hi, I need one clarification on routine SSL_CTX_free(). I see the memory is not freed even after calling this SSL_CTX_free(). I have a simple test program, which just does SSL_CTX_new() and SSL_CTX_free(). #include #include int main() { const SSL_METHOD *method; SSL_CTX *ctx = NULL;

Re: SSL error (78c0100): malloc failure while implementing tls 1.3

2022-06-21 Thread Matt Caswell
On 16/06/2022 05:52, Ramaiah, Ravichandran Bagalur wrote: *SSL error (78c0100): malloc failure Do you get anything in the OpenSSL error stack for this (e.g. try "ERR_print_errors_fp(stdout);"). We need a bit more to go on to figure out where specifically the malloc failure is

OpenSSL version 1.1.1p published

2022-06-21 Thread Matt Caswell
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL version 1.1.1p released === OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.1.1p of our open

OpenSSL version 3.0.4 published

2022-06-21 Thread Matt Caswell
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL version 3.0.4 released == OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 3.0.4 of our open source