I found some dead code in apps/openssl.c which appears to be some legacy
configuration handling.
Patch to remove it is attached.
Pauli
--
Oracle
Dr Paul Dale | Cryptographer | Network Security & Encryption
Phone +61 7 3031 7217
Oracle Australia
--
Ticket here: http://rt.openssl.or
On 07/05/2016 02:42 PM, Rich Salz via RT wrote:
> this is for 1.0.2, right?
:; openssl version
OpenSSL 1.1.0-pre6-dev
:; git log
commit c2d551c01930df54bce6517cfecd214db6e98e80
Date: Wed Apr 27 14:47:45 2016 +0100
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4607
Please log i
On Tue Jul 05 22:38:44 2016, ncarb...@prodigitalsoftware.com wrote:
> Knowing that made all the difference, thank you. It wasn't clear since
> there's some evidence of "2.0" in the various downloads.
That's "openssl-fips" which is a FIPS module. Separate thing with its own
versioning.
--
Richard
OK, thanks.
> The code on GitHub is the latest version of what will be 1.1
Knowing that made all the difference, thank you. It wasn't clear since
there's some evidence of "2.0" in the various downloads.
-Noel
-Original Message-
From: Salz, Rich via RT [mailto:r...@openssl.org]
Sent: Tu
I don't know what 1.1 beta source you downloaded. The code on GitHub is the
latest version of what will be 1.1 It *is* fixed, just later than the version
you downloaded.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4606
Please log in as guest with password guest if prompted
I don't know what 1.1 beta source you downloaded. The code on GitHub is the
latest version of what will be 1.1 It *is* fixed, just later than the version
you downloaded.
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Joey Yandle replied that it would be resolved in 1.1, but I don't see how.
The offending function calls are still there in the latest 1.1 beta source
set I could find to download.
The whole section of code is gone from the current source from Github, but
what version that will go into isn't cle
this is for 1.0.2, right?
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4607
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Hi --
Attached are four simple patches.
They make the apps more usable.
They should be pretty much self-explanatory.
Let me know if you have questions.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4607
Please log in as guest with password guest if prompted
>From 07ff5a786d6d0677
This is fixed in 1.1.
On Jul 5, 2016 11:29 AM, "Noel Carboni via RT" wrote:
> This message is to the OpenSSL source code maintainers via
> r...@openssl.org:
>
> I reported this a while back and no one has seen fit to fix it.
>
> On Windows, the RAND_poll() function in the OpenSSL library uses an
This is fixed in 1.1.
On Jul 5, 2016 11:29 AM, "Noel Carboni via RT" wrote:
> This message is to the OpenSSL source code maintainers via
> r...@openssl.org:
>
> I reported this a while back and no one has seen fit to fix it.
>
> On Windows, the RAND_poll() function in the OpenSSL library uses an
This message is to the OpenSSL source code maintainers via
r...@openssl.org:
I reported this a while back and no one has seen fit to fix it.
On Windows, the RAND_poll() function in the OpenSSL library uses ancient
Heap32First and Heap32Next function calls to enumerate heap entries from
all proces
Hello,
I am looking for the selftests, the KAT tests, for AES CTR and CBC in
openssl_fips 2.0.9.
Although many tests are directly defined, such as:
FIPS_selftest_aes_gcm(void) in aes/fips_aes_selftest.c
gcmtest(FILE *in, FILE *out, int encrypt) in ../aes/fips_gcmtest.c
And for CBC:
AEAD ciphers within OpenSSL include AES-GCM, AES-CCM and ChaCha20-Poly1305
(among others). AES-128 CBC SHA1-HMAC is not considered AEAD.
See
https://wiki.openssl.org/index.php/EVP_Authenticated_Encryption_and_Decryption
for examples.
The ciphers as described below are meant for TLS, thus they
In https://bugs.debian.org/828254, for the software "bro"
I got a request for accessors to:
- For OCSP_RESPID *rid:
- rid->type
- rid->value.byKey->length
- rid->value.byKey->data
- For OCSP_BASICRESP *basic:
- basic->certs
- basic->tbsResponseData->responderId
Kurt
--
Ticket here
For AEAD ciphers like NID_aes_128_cbc_hmac_sha1, I could not find any control
interface defined to control authentication and cipher ordering.(i.e. whether
to perform cipher first and then authentication or vice versa.(IPSEC vs. TLS
use-case)). If such an interface exist with OPENSSL can someo
16 matches
Mail list logo