[openssl.org #1072] Assertion failure in bn_div_words (bn_asm.c)

2005-05-13 Thread via RT
[guest - Sat May 14 03:32:51 2005]: Something hit the enter key for me before I finished typing I meant to say that the assertion will go off any time the high order part of the number is zero (amoung other things). I sort of suspect that was not the intent and that it was meant to check

[openssl.org #1072] Assertion failure in bn_div_words (bn_asm.c)

2005-05-13 Thread via RT
The assert statement in bn_div_words (bn_asm.c) is kind of silly. The bug report that came to me is: When built for debugging, the command "ssh-keygen -t rsa1 -N '' -q -f PATH" fails with the message "Assertion failed: ((i == BN_BITS2) || (h > (BN_ULONG)1< BN_div_word ==> bn_div_words. BN_ULO

Re: Regard "SSL per session memory usage"..

2005-05-13 Thread Prashant Kumar
Roger,   What I have found is that OpenSsl allocates s3->rbuf and s3->wbuf as soon as the SSL session is created, however uses these buffers as scratch buffer while doing handshake, or doing any other SSL opertion. Once the operation is done, those buffers could be safely freed since then do not ho

[openssl.org #1071] signing of large files: patch

2005-05-13 Thread Artem Chuprina via RT
openssl cannot sign large files (including detached signature, at least in DER and PEM formats). Attached patch (against 20050511 snapshot) fixes this problem. -- Artem Chuprina RFC2822: Jabber: [EMAIL PROTECTED] __ OpenSSL P

[openssl.org #1020] [PATCH] restore pkcs12 -CSP in 0.9.8

2005-05-13 Thread Stephen Henson via RT
[EMAIL PROTECTED] - Sun Mar 6 19:39:25 2005]: > Hi, > > Somewhen between 0.9.7 and 0.9.8 (I first noticed it around 6 months > ago), > PKCS12 creation was refactored, and the new code left out the pkcs12 > -CSP > implementation (the option is still accepted, but does nothing > useful). I'm > n

[openssl.org #1070] PATCH: fix for memory leaks in smime verification

2005-05-13 Thread Dmitry Belyavsky via RT
Hello! I use openssl-0.9.8 dev. There is a memory leak on verification of signed messages. This leak exist in snapshots 20050404 and 20050511. I've tested it using Debian Linux. I sign a file in default format with export OPENSSL_DEBUG_MEMORY=on LD_LIBRARY_PATH=. apps/openssl smime -sign -inkey