Pavel Stanek wrote:
> I think that there is a bug in [OpenSSL 0.9.8 ] SHA-256 implementation [ when
> on a big-endian x86 ]
> Platform is Renesas SH3E in BIG-endian mode ( used compiler sh3eb-linux-gcc)
>
> OpenSSL version: 0.9.8u
> Options: -DB_ENDIAN
> Target: linux-generi
Hi all,
I think that there is a bug in SHA-256 implementation.
I have tried to compile least Openssl of 0.9.8 branch - 0.9.8u
but make test failed on SHA-256 test.
../util/shlib_wrap.sh ./shatest
test 1 ok
test 2 ok
test 3 ok
../util/shlib_wrap.sh ./sha1test
test 1 ok
test 2 ok
test 3 ok
.
Hi,
The "no-tlsext" option (resulting in OPENSSL_NO_TLSEXT beeing set) has
some problems:
1) If OPENSSL_NO_TLSEXT is set, the parsing code for TLS extensions is
not beeing compiled in, but we still always send the SCSV cipher suite
indicating that we support secure renegotiation according to R
openssl 1.0.1 and win32: assembler error: x86cpuid.asm
Building OpenSSL
perl util/copy.pl ".\crypto\buildinf.h" "tmp32dll\buildinf.h"
Copying: ./crypto/buildinf.h to tmp32dll/buildinf.h
ml /nologo /Cp /coff /c /Cx /Zi /Fotmp32dll\x86cpuid.obj
tmp32dll\x86cp
id.asm
Assembling: t