See inline
On Thu, Nov 27, 2014 at 1:36 AM, Matt Caswell via RT r...@openssl.org wrote:
Resend this time including r...@openssl.org...sorry for the noise on
openssl-dev...
On 27/11/14 02:54, Praveen Kariyanahalli via RT wrote:
The purpose of DTLSv1_listen is to listen for incoming
Just to add to my previous mail.
The peer specific handshake continues in a different event call back
routine. Note: sockets are NON blocking (async handling of events).
On Thu, Nov 27, 2014 at 7:22 AM, Praveen Kariyanahalli prav...@viptela.com
wrote:
See inline
On Thu, Nov 27, 2014 at 1:36
Thanks Matt. Will keep you posted on 1.
Coming back to the original crash. Here is some update.
Our server started seeing the crash and leaks, after our negative stress
testing suite added some pmtu testcases. i.e., during 1000s of connections
the underlying mtu(s) were changed (very low - to
Hi Team,
Please guide me to be the part of Development group.
Thanks,Anup Kumar
On 28/11/14 06:33, Anup Kumar wrote:
Hi Team,
Please guide me to be the part of Development group.
Hello Anup,
Thanks for your interest in OpenSSL. I have attempted to answer this
question here:
https://wiki.openssl.org/index.php/Developing_For_OpenSSL
Matt
Hi Rich,
On 25.09.2014 00:09, Rich Salz via RT wrote:
All sorts of pre-OSx mac support has been removed.
commit 92c78463720f71e47c251ffa58493e32cd793e13
Author: Rich Salz rs...@openssl.org
Date: Wed Sep 24 12:18:19 2014 -0400
RT3544: Remove MWERKS support
The following #ifdef tests were
Yes, I will revert the change.
Yes, I will revert the change.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Quentin,
Please can you resubmit this patch as an attachment rather than inline? Email
has mangled it, and I am unable to review it.
Thanks
Matt
__
OpenSSL Project http://www.openssl.org
Error codes aren't part of the API. It's a bit of a grey area in some cases,
but for EVP_DecryptFinal_ex, you really should be checking the return value and
not relying on errors left on stack. In particular, reporting detailed
decryption errors was a historical mistake that has led to serious
I just read them through, and it looks good, I just needed to do a couple of
layout adjustments. Committed.
Thank you.
On Sat Nov 15 11:17:51 2014, a...@squareup.com wrote:
Hi,
The current documentation (hosted at
https://www.openssl.org/docs/HOWTO/proxy_certificates.txt) contains a bunch
Hmm try add ENV... valgrind is clear but asterisk crash with
d1_both.c(332): OpenSSL internal error, assertion failed: len =
DTLS1_HM_HEADER_LENGTH
2014-11-24 20:06 GMT+03:00 Matt Caswell via RT r...@openssl.org:
On Sat Nov 22 13:19:13 2014, v.badal...@open-bs.ru wrote:
Find this:
Hi Matt,
Sure I will do that!
Viktor, the point is that is some cases it would nuce to be able to change
exponents, especially the day that we might discover any threat in F4.
Also just adding more possibilities for the user.
Best
Le 28 nov. 2014 10:28, Viktor Dukhovni openssl-us...@dukhovni.org
Full backtrace
2014-11-28 19:26 GMT+03:00 Вячеслав Бадалян v.badal...@open-bs.ru:
Hmm try add ENV... valgrind is clear but asterisk crash with
d1_both.c(332): OpenSSL internal error, assertion failed: len =
DTLS1_HM_HEADER_LENGTH
2014-11-24 20:06 GMT+03:00 Matt Caswell via RT
On Fri, Nov 28, 2014 at 10:31:57AM -0600, Quentin Gouchet wrote:
Viktor, the point is that is some cases it would nuce to be able to change
exponents, especially the day that we might discover any threat in F4.
If F_4 is found to be weak, RSA crypto-system will be abandoned.
There will not be
It's the same with s_server, I might add.
I'm looking into this.
On Tue Nov 11 00:34:14 2014, hka...@redhat.com wrote:
Current git OpenSSL_1_0_2-stable branch (39679d858) has errors related to
hostname-, IP- and email-verification options.
openssl s_client -help lists following options:
Please look at https://github.com/richsalz/openssl/tree/master/apps which will
be merged into master soon (I hope)
Applied, committed and pushed. Thanks!
On Tue Nov 11 00:34:37 2014, pi...@cloudflare.com wrote:
Advance to the next state variant when reusing messages.
Previously, state variant was not advanced, which resulted in state
being stuck in the st1 variant (usually _A).
This broke certificate
Something did not work tonight.
Please eximane why nightly snapshots suddenly cannot materialise correctly.
--
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
God,Queen and country!Never Satan President Republic!Beware AntiChrist rising!
19 matches
Mail list logo