Re: [openssl.org #1929] DTLS MTU bug

2009-05-17 Thread Michael Tuexen via RT
Dear all, please find attached in in-lined an updated version of the patch for the path MTU detection. The library stores the maximum DTLS packet size and converts to that when using the example programs which run only over IPv4 and UDP. On Linux the path MTU infrastructure is used, which is

Re: [openssl.org #1929] DTLS MTU bug

2009-05-17 Thread Michael Tüxen
On May 16, 2009, at 2:16 PM, Dr. Stephen Henson wrote: On Sat, May 16, 2009, Michael Txen wrote: Dear all, we will revise this patch on Monday. Please do not commit. I need to play with the IP_MTU option on a Linux system and have a discussion with Robin. It has already been committed

[openssl.org #1929] DTLS MTU bug

2009-05-17 Thread Stephen Henson via RT
[tue...@fh-muenster.de - Sun May 17 11:14:33 2009]: Dear all, please find attached in in-lined an updated version of the patch for the path MTU detection. Please don't send patches inline. Some mail agents line wrap and this corrupts the patch as it has done in this case. Sending as a

Re: [openssl.org #1929] DTLS MTU bug

2009-05-17 Thread Michael Tüxen
On May 17, 2009, at 1:05 PM, Stephen Henson via RT wrote: [tue...@fh-muenster.de - Sun May 17 11:14:33 2009]: Dear all, please find attached in in-lined an updated version of the patch for the path MTU detection. Please don't send patches inline. Some mail agents line wrap and this

Re: Error in openssl-1.0.0-stable-SNAP-20090516

2009-05-17 Thread Ger Hobbelt
See ongoing discussion regarding DTLS: this is something that should be adjusted in the next CVS, if I read Mr. Henson's messages correctly. DTLS is in progress, so expect some issues in the near future: snapshots are a, after all, only snaps of the development process at work.) Take care, Ger

[openssl.org #1929] DTLS MTU bug

2009-05-17 Thread Stephen Henson via RT
Ooops, missed the attachment. Patch now applied to 1.0.0-beta and HEAD. A modified version was applied to 0.9.8, please check that is OK. __ OpenSSL Project http://www.openssl.org Development

[openssl.org #1931] [PATCH] DTLS fragment handling memory leak

2009-05-17 Thread Stephen Henson via RT
[steve - Sat May 16 18:28:06 2009]: Patch applied to 1.0, HEAD and 0.9.8. Thanks for the report. Patch reverted on 0.9.8, it breaks compilation. Please supply a version for 0.9.8. __ OpenSSL Project

Re: Error in openssl-1.0.0-stable-SNAP-20090516

2009-05-17 Thread The Doctor
On Sun, May 17, 2009 at 07:16:47PM +0200, Ger Hobbelt wrote: See ongoing discussion regarding DTLS: this is something that should be adjusted in the next CVS, if I read Mr. Henson's messages correctly. DTLS is in progress, so expect some issues in the near future: snapshots are a, after all,

Re: All active branches pass on OpenVMS! :-)

2009-05-17 Thread Steven M. Schweda
Sorry about the delayed response. Travel. From: Richard Levitte rich...@levitte.org sms WIMP $ write sys$output f$getsyi( VERSION) sms V5.4 sms WIMP $ write sys$output f$getsyi( HW_MODEL) sms 49 Hmmm, maybe I'm wrong then... It's odd, because back when I decided to use f$getsyi(CPU),