28 maj 2013 kl. 10:15 skrev Peter Dunkley <[email protected]>:

> No. This information is incomplete and I have only provided this information 
> as there was a discussion about OpenSSL during the recent developer meeting - 
> this mailing list is the correct place to continue and conclude this 
> discussion.
I was worried about the initialization of OpenSSL libraries. The problem we had 
in Asterisk was that Asterisk initialized
several times and external libraries could do that as well - like jabber and 
database libraries. I think Kevin solved that
by creating a small shim that made sure that only one call could be made. I can 
see that it can happen here as
well with postgresql client libraries initializing OpenSSL by itself.

> 
> One of the actions from the meeting was to produce a wiki page documenting 
> _ALL_ external libraries for each module.  I do not have time to this.
I think we can do that in doxygen. I will copy the macros I created for 
Asterisk to produce a doxygen page with all the links.

/O
> 
> Regards,
> 
> Peter
> 
> On 28 May 2013, at 01:26, Edson - Lists <[email protected]> wrote:
> 
>> Hi, Peter...
>> 
>> Thanks for the information.... is this also available somewhere on the Wiki? 
>> Where should it fit better? In the compilation instructions? Or letting it 
>> on the modules would be enough?
>> ---
>> Edson.
>> 
>> Em 27/05/2013 20:48, Peter Dunkley escreveu:
>>> I created another module that links with OpenSSL.
>>> 
>>> The current list of (non-obsolete) modules that link with OpenSSL is:
>>> - websocket
>>> - auth_ephemeral
>>> - tls
>>> - stun
>>> - outbound
>>> - osp
>>> - auth_identity
>>> 
>>> FYI, for the modules I've created the usage of OpenSSL is:
>>> - websocket: SHA1() is used to create the key in the WebSocket handshake
>>> response.
>>> - auth_ephemeral: HMAC(EVP_sha1(), ...) is used to calculate the password
>>> based on the username and secret key and openssl/sha.h is included for
>>> "#define SHA_DIGEST_LENGTH"
>>> - outbound: HMAC(EVP_sha1(), ...) is used to encode the flow token and
>>> RAND_bytes() is used to get cryptographically strong pseudo-random bytes
>>> for the secret key
>>> 
>>> - stun: not sure about this as a lot of the code was copied from core
>> 
>> _______________________________________________
>> sr-dev mailing list
>> [email protected]
>> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev
> 
> _______________________________________________
> sr-dev mailing list
> [email protected]
> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev


_______________________________________________
sr-dev mailing list
[email protected]
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev

Reply via email to