2. MD5 implementation.
Once again. I *already* have MD5 working on both Linux and HP-UX and the
code will be committed shortly.
Original code is at http://cvs.openssl.org/chngview?cn=14252, and my
endian-neutral adaptation at http://cvs.openssl.org/chngview?cn=14253.
HP-UX assembler can't
These changes, together with the changes to the Configure script found
in ticket #1129, constitute the total set of changes needed to get
OpenSSL 0.9.8-beta5 to build and run its self-tests on the Stratus V
Series (Intel IA32) platform. They are not needed for the Stratus
Continuum (PA-RISC)
Hi,
I have discovered something that seems to be a crash in OpenSSL running with
Apache+mod_ssl. It happens when SSL connection times out (I simulate it by
suspending the reader process, but it happens also in production with very slow
clients). Apache gives message: send mmap timed out and
1. RC4 implementation.
I wonder why key schedule prefetch is performed with 128 stride? As far
as I understand 128 bytes is L2 line-size. But the loop is scheduled for
L1D access, which [unilke L2] has 64 byte line-size. In other words it
appears that prefetch fills only every second line in
Stanislav Malyshev via RT wrote:
I have discovered something that seems to be a crash in OpenSSL running with
Apache+mod_ssl. It happens when SSL connection times out (I simulate it by
suspending the reader process, but it happens also in production with very slow
clients). Apache gives
Hi Jouni!
I'll send the patch with explanations a bit later.
Thanks for your time and information.
-Original Message-
From: Jouni Malinen [mailto:[EMAIL PROTECTED] On Behalf Of Jouni Malinen
Sent: Wednesday, July 20, 2005 6:38 AM
To: Alexey Kobozev
Cc: openssl-dev@openssl.org
Hello Group,
Is there any work done to protect the TLS server implementation against the flood of Client hello's? I read about client puzzle somewhere.
Any help is appreciated.
Regards,
Prashant Kumar.__Do You Yahoo!?Tired of spam? Yahoo! Mail
diff -ur openssl-0.9.8-stable-SNAP-20050720\crypto\asn1\a_bitstr.c
openssl-0.9.8-mod\crypto\asn1\a_bitstr.c
--- openssl-0.9.8-stable-SNAP-20050720\crypto\asn1\a_bitstr.c Tue Apr 26
21:53:12 2005
+++ openssl-0.9.8-mod\crypto\asn1\a_bitstr.c Wed Jul 20 14:59:40 2005
@@ -183,9 +183,9 @@
iv= ~v
I send this topic another time adding [PATCH] to the subject (contribution).
Well, it's not really [PATCH] keyword in the subject that makes
magical difference, but rather our ability to audit and test the
submitted code multiplied by degree of common interest for platform in
question. In
Andy Polyakov wrote:
I send this topic another time adding [PATCH] to the subject
(contribution).
Well, it's not really [PATCH] keyword in the subject that makes
magical difference, but rather our ability to audit and test the
submitted code multiplied by degree of common interest for
Hello,
I will try to correct the patch using the developer's branch asap. It may
take some time, but is reasonable. Once I modify the code of last version
of openssl somebody may test it :), apart from me of course
The reason of this patch is that Pocket PC, Windows Mobile... and also Smart
about the win ce platform access. all win ce (pocket pc, windows mobile)
development enviroment (eg. eMbedded Visual C++) can be downloaded from
ms for free (which is not usual from ms:-) at the same time you can
download Emulator Images for Windows Mobile 2003 Second Edition
software for
K S Sreeram wrote:
when block padding is used, byte value 0 can never
be the final byte of the padded plain text, the only
valid range is [1 .. block_size].
The check for 0 is not performed when detecting
malformed padding in EVP_DecryptFinal_ex.
I've attached the one-line patch for this.
ok,
13 matches
Mail list logo