Re: Re: [openssl.org #3608] SEGV Crash in dtls1_retransmit_message function

2014-11-28 Thread Praveen Kariyanahalli
See inline On Thu, Nov 27, 2014 at 1:36 AM, Matt Caswell via RT r...@openssl.org wrote: Resend this time including r...@openssl.org...sorry for the noise on openssl-dev... On 27/11/14 02:54, Praveen Kariyanahalli via RT wrote: The purpose of DTLSv1_listen is to listen for incoming

Re: Re: [openssl.org #3608] SEGV Crash in dtls1_retransmit_message function

2014-11-28 Thread Praveen Kariyanahalli
Just to add to my previous mail. The peer specific handshake continues in a different event call back routine. Note: sockets are NON blocking (async handling of events). On Thu, Nov 27, 2014 at 7:22 AM, Praveen Kariyanahalli prav...@viptela.com wrote: See inline On Thu, Nov 27, 2014 at 1:36

Re: [openssl.org #3608] SEGV Crash in dtls1_retransmit_message function

2014-11-28 Thread Praveen Kariyanahalli
Thanks Matt. Will keep you posted on 1. Coming back to the original crash. Here is some update. Our server started seeing the crash and leaks, after our negative stress testing suite added some pmtu testcases. i.e., during 1000s of connections the underlying mtu(s) were changed (very low - to

Willing to be part of OpenSSL Development Group

2014-11-28 Thread Anup Kumar
Hi Team, Please guide me to be the part of Development group. Thanks,Anup Kumar

Re: Willing to be part of OpenSSL Development Group

2014-11-28 Thread Matt Caswell
On 28/11/14 06:33, Anup Kumar wrote: Hi Team, Please guide me to be the part of Development group. Hello Anup, Thanks for your interest in OpenSSL. I have attempted to answer this question here: https://wiki.openssl.org/index.php/Developing_For_OpenSSL Matt

Re: [openssl.org #3544] Remove MWERKS support

2014-11-28 Thread Guenter via RT
Hi Rich, On 25.09.2014 00:09, Rich Salz via RT wrote: All sorts of pre-OSx mac support has been removed. commit 92c78463720f71e47c251ffa58493e32cd793e13 Author: Rich Salz rs...@openssl.org Date: Wed Sep 24 12:18:19 2014 -0400 RT3544: Remove MWERKS support The following #ifdef tests were

RE: [openssl.org #3544] Remove MWERKS support

2014-11-28 Thread Salz, Rich
Yes, I will revert the change.

RE: [openssl.org #3544] Remove MWERKS support

2014-11-28 Thread Salz, Rich via RT
Yes, I will revert the change. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager

[openssl.org #3604] [PATCH] User can specify the public exponent in genrsa

2014-11-28 Thread Matt Caswell via RT
Quentin, Please can you resubmit this patch as an attachment rather than inline? Email has mangled it, and I am unable to review it. Thanks Matt __ OpenSSL Project http://www.openssl.org

[openssl.org #3602] [PATCH]

2014-11-28 Thread Emilia Käsper via RT
Error codes aren't part of the API. It's a bit of a grey area in some cases, but for EVP_DecryptFinal_ex, you really should be checking the return value and not relying on errors left on stack. In particular, reporting detailed decryption errors was a historical mistake that has led to serious

[openssl.org #3601] [PATCH] Improves the proxy certificates howto doc.

2014-11-28 Thread Richard Levitte via RT
I just read them through, and it looks good, I just needed to do a couple of layout adjustments. Committed. Thank you. On Sat Nov 15 11:17:51 2014, a...@squareup.com wrote: Hi, The current documentation (hosted at https://www.openssl.org/docs/HOWTO/proxy_certificates.txt) contains a bunch

Re: [openssl.org #3592] bug report. Crash. Critical? Security bug?

2014-11-28 Thread Вячеслав Бадалян via RT
Hmm try add ENV... valgrind is clear but asterisk crash with d1_both.c(332): OpenSSL internal error, assertion failed: len = DTLS1_HM_HEADER_LENGTH 2014-11-24 20:06 GMT+03:00 Matt Caswell via RT r...@openssl.org: On Sat Nov 22 13:19:13 2014, v.badal...@open-bs.ru wrote: Find this:

Re: [openssl.org #3604] [PATCH] User can specify the public exponent in genrsa

2014-11-28 Thread Quentin Gouchet
Hi Matt, Sure I will do that! Viktor, the point is that is some cases it would nuce to be able to change exponents, especially the day that we might discover any threat in F4. Also just adding more possibilities for the user. Best Le 28 nov. 2014 10:28, Viktor Dukhovni openssl-us...@dukhovni.org

Re: [openssl.org #3592] bug report. Crash. Critical? Security bug?

2014-11-28 Thread Вячеслав Бадалян via RT
Full backtrace 2014-11-28 19:26 GMT+03:00 Вячеслав Бадалян v.badal...@open-bs.ru: Hmm try add ENV... valgrind is clear but asterisk crash with d1_both.c(332): OpenSSL internal error, assertion failed: len = DTLS1_HM_HEADER_LENGTH 2014-11-24 20:06 GMT+03:00 Matt Caswell via RT

Re: [openssl.org #3604] [PATCH] User can specify the public exponent in genrsa

2014-11-28 Thread Viktor Dukhovni
On Fri, Nov 28, 2014 at 10:31:57AM -0600, Quentin Gouchet wrote: Viktor, the point is that is some cases it would nuce to be able to change exponents, especially the day that we might discover any threat in F4. If F_4 is found to be weak, RSA crypto-system will be abandoned. There will not be

[openssl.org #3596] [1.0.2] -checkhost and -verify_hostname options documentation errors

2014-11-28 Thread Richard Levitte via RT
It's the same with s_server, I might add. I'm looking into this. On Tue Nov 11 00:34:14 2014, hka...@redhat.com wrote: Current git OpenSSL_1_0_2-stable branch (39679d858) has errors related to hostname-, IP- and email-verification options. openssl s_client -help lists following options:

RE: [openssl.org #3596] [1.0.2] -checkhost and -verify_hostname options documentation errors

2014-11-28 Thread Salz, Rich
Please look at https://github.com/richsalz/openssl/tree/master/apps which will be merged into master soon (I hope)

[openssl.org #3597] [PATCH] Advance to the next state variant when reusing messages.

2014-11-28 Thread Richard Levitte via RT
Applied, committed and pushed. Thanks! On Tue Nov 11 00:34:37 2014, pi...@cloudflare.com wrote: Advance to the next state variant when reusing messages. Previously, state variant was not advanced, which resulted in state being stuck in the st1 variant (usually _A). This broke certificate

2014 Nov 29 Snaphots

2014-11-28 Thread The Doctor
Something did not work tonight. Please eximane why nightly snapshots suddenly cannot materialise correctly. -- Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca God,Queen and country!Never Satan President Republic!Beware AntiChrist rising!