Re: [openssl-dev] [openssl.org #3622] bug: crypto, valgrind reports improper memory access with AES128 cbc and longer plaintext

2014-12-08 Thread The Tester via RT
Is there a better demo program I can use as the basis for my code? I'd be happy to redo my stuff based on anything that I can download and run without having to dig through the OpenSSL/test sets to try to find hints (which I've done, but there didn't seem to be a simple AES128/cbc test that I c

Re: [openssl-dev] [openssl.org #3622] bug: crypto, valgrind reports improper memory access with AES128 cbc and longer plaintext

2014-12-08 Thread The Tester via RT
Thanks for the response, Andy, it's good to know that the demo program does actually work for someone. Sorry for the delay, I'm kinda busy with other things right now. Also, I realised the link was truncated, but it looks as though you found the demo anyway. https://github.com/saju/misc/blob/ma

Re: [openssl-dev] [openssl.org #3627] Enhancement request: add more "Protocol" options for SSL_CONF_CTX

2014-12-08 Thread Richard Moore via RT
On 8 December 2014 at 19:20, Steffen Nurpmeso via RT wrote: > and finally i propose three new values for the "Protocol" slot of > SSL_CONF_CTX_cmd(): OLDEST, NEWEST and VULNERABLE. > In Qt we've added an enum value for TLS versions that is SecureProtocols so that we could remove versions as requ

Re: [openssl-dev] [openssl.org #3627] Enhancement request: add more "Protocol" options for SSL_CONF_CTX

2014-12-08 Thread Richard Moore
On 8 December 2014 at 19:20, Steffen Nurpmeso via RT wrote: > and finally i propose three new values for the "Protocol" slot of > SSL_CONF_CTX_cmd(): OLDEST, NEWEST and VULNERABLE. > In Qt we've added an enum value for TLS versions that is SecureProtocols so that we could remove versions as requ

Re: [openssl-dev] [openssl.org #3181] [PATCH] OCB

2014-12-08 Thread Andy Polyakov
> OCB support has been merged in. Closing my own ticket. Following is not directly related to the case per se [which is why rt doesn't get this message]. It's just that it makes nice example on why one sometimes wants to implement encryption mode in assembly. If you compare performance on AES-NI-c

Re: [openssl-dev] [openssl.org #3627] Enhancement request: add more "Protocol" options for SSL_CONF_CTX

2014-12-08 Thread Kurt Roeckx via RT
On Mon, Dec 08, 2014 at 08:20:44PM +0100, Steffen Nurpmeso via RT wrote: > Hello, > > and finally i propose three new values for the "Protocol" slot of > SSL_CONF_CTX_cmd(): OLDEST, NEWEST and VULNERABLE. I actually find the option unfortunate and I think it should have been one that sets the min

Re: [openssl-dev] [openssl.org #3625] Enhancement request: user convenience for SSL_CONF_CTX with SSLv2

2014-12-08 Thread Kurt Roeckx via RT
On Mon, Dec 08, 2014 at 07:58:31PM +0100, Steffen Nurpmeso via RT wrote: > set ssl-protocol="ALL,-SSLv2" > > This results in the obvious problem that when they (get) > upgrade(d) their OpenSSL library they will see a completely > intransparent error message that no normal user will understand:

Re: [openssl-dev] [openssl.org #3627] Enhancement request: add more "Protocol" options for SSL_CONF_CTX

2014-12-08 Thread Salz, Rich via RT
I think magic names -- shorthands -- are a very bad idea. They are point-in-time statements whose meaning evolves, if not erodes, over time. ___ openssl-dev mailing list openssl-dev@openssl.org https://mta.opensslfoundation.net/mailman/listinfo/openss

Re: [openssl-dev] [openssl.org #3627] Enhancement request: add more "Protocol" options for SSL_CONF_CTX

2014-12-08 Thread Salz, Rich
I think magic names -- shorthands -- are a very bad idea. They are point-in-time statements whose meaning evolves, if not erodes, over time. ___ openssl-dev mailing list openssl-dev@openssl.org https://mta.opensslfoundation.net/mailman/listinfo/openssl

[openssl-dev] [openssl.org #3627] Enhancement request: add more "Protocol" options for SSL_CONF_CTX

2014-12-08 Thread Steffen Nurpmeso via RT
Hello, and finally i propose three new values for the "Protocol" slot of SSL_CONF_CTX_cmd(): OLDEST, NEWEST and VULNERABLE. I included OLDEST for completeness sake, NEWEST is in effect what i've always forced for my thing whenever possible, and encouraged users to use themselve, but of course it

[openssl-dev] [openssl.org #3626] Entropy on Win discounts CryptGenRandom length

2014-12-08 Thread Glen Miner via RT
rand_win.c(361) RAND_add(buf, sizeof(buf), 0);This is inconsistent with line 375 which passes sizeof(buf) for the bytes of entropy. This means that the entropy from the OS pool is discounted; in normal circumstances this is insignificant because the rest of this function collects plenty of entro

[openssl-dev] [openssl.org #3625] Enhancement request: user convenience for SSL_CONF_CTX with SSLv2

2014-12-08 Thread Steffen Nurpmeso via RT
Commit [45f55f6] (Remove SSLv2 support, 2014-11-30) completely removed SSLv2 support and the commit message states "The only support for SSLv2 left is receiving a SSLv2 compatible client hello". If people start using SSL_CONF_CTX as they are supposed to with v1.0.2, then it can be expected that us

Re: [openssl-dev] [openssl.org #3624] Unify SSL_CONF_* interface to be SSL_CONF_CTX_*, with patch against [master/33d5ba8]

2014-12-08 Thread Steffen Nurpmeso via RT
Oh yes: and on top of that former patch there really where also dangling SSL_CTX_cmd() use cases in .pod files, which are thus and finally changed to SSL_CONF_CTX_cmd via the attached patch, too. Thank you. --steffen diff --git a/doc/ssl/SSL_CONF_CTX_cmd.pod b/doc/ssl/SSL_CONF_CTX_cmd.pod index c

[openssl-dev] [openssl.org #3624] Unify SSL_CONF_* interface to be SSL_CONF_CTX_*, with patch against [master/33d5ba8]

2014-12-08 Thread Steffen Nurpmeso via RT
Does: - Fixes a typo in s_client.pod (2x "in the"). - Changes .pod to reflect reality: it is SSL_CONF_CTX_finish(), not SSL_CONF_finish(). - While here it seems best to change the remaining SSL_CONF_cmd(), SSL_CONF_cmd_argv() and SSL_CONF_cmd_value_type() to have a SSL_CONF_CTX_ prefix, to

Re: [openssl-dev] [openssl.org #3623] faulting module ssleay32.dll, version 0.0.0.0, fault address 0x00010c8b.

2014-12-08 Thread Vijendra Boopathy via RT
Hi, The exact error which i faced in Event log are given below. Faulting application name: aeagent.exe, version:0.0.0.0, time stamp:0x53e1f20f Faulting module name: SSLEAY32.dll, version:0.0.0.0, time stamp: 0x405a2628 Exception code: 0xc005 Fault offset: 0x00010c8b Faulting process id : 0x1b

[openssl-dev] [openssl.org #3181] [PATCH] OCB

2014-12-08 Thread Matt Caswell via RT
OCB support has been merged in. Closing my own ticket. Matt ___ openssl-dev mailing list openssl-dev@openssl.org https://mta.opensslfoundation.net/mailman/listinfo/openssl-dev