Hi Peter and Rich,

thx for your answer, I needed to decipher them first though ;-)
(http://marc.info/?l=openssl-dev&m=140181264527042&w=2,
http://marc.info/?l=openssl-dev&m=140186408414195&w=2).

1-2 points to this:

If it's broken (@Peter) why is it in the git tree or why was it accepted?

Google's server have Chacha/Poly in production, so has Chrome.
So it would be cool to have something working within OpenSSL,
also if it's not right now production ready.

As of now it doesn't work -- at least not for me. Besides the minor "make
depend" obstacle: If I start a server (s_server -accept 443 -www) and 
use s_client to connect, I see the server is offering the three 0xcc1{3-5} 
cipher suites, but both client and server throw error messages upon 
connect with each of those cipher suites.

I maybe have a very selfish reason as I wrote a small shell script 
(https://testssl.sh/)
testing cipher suites and other stuff, mostly using openssl. But I guess 
as it is deployed by google everywhere there are more important reasons to 
get it working within openssl, no?

Cheers, Dirk



On Tue, Jun 03, 2014 at 10:55:13AM +0200, Dirk Wetter wrote:
> Hi,
> 
> pls see attached.
> 
> Is there somebody working on it to get Chacha/Poly cipher suites production
> ready?
> 
> 
> Cheers,
> 
> Dirk
> 

> --- crypto/chacha/Makefile.orig       2014-06-03 10:49:51.082287334 +0200
> +++ crypto/chacha/Makefile    2014-06-03 10:50:07.496433689 +0200
> @@ -21,7 +21,7 @@
>  APPS=
>  
>  LIB=$(TOP)/libcrypto.a
> -LIBSRC=
> +LIBSRC=chacha_vec.c
>  LIBOBJ=$(CHACHA_ENC)
>  
>  SRC= $(LIBSRC)
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to