Re: [openssl-dev] Kerberos

2015-05-05 Thread Tomas Mraz
On Út, 2015-05-05 at 13:22 +, Technical Support wrote: Perhaps people use the --with-krb5-flavor=MIT config which is what we do, and we use itin all the time in 1.0.2. Ken From: Matt Caswell m...@openssl.org To: openssl-dev@openssl.org Sent: Tuesday, May 5, 2015 7:56 AM

Re: [openssl-dev] Kerberos

2015-05-05 Thread Blumenthal, Uri - 0553 - MITLL
I'm hesitant to remove this capability altogether, but your argument is convincing. In view of the progress recently made in the quantum computing field, I think it would be nice to strengthen symmetric crypto capabilities (such as Kerberos), but that implies a lot of work (which I'm not

Re: [openssl-dev] Kerberos

2015-05-05 Thread Technical Support
Perhaps people use the --with-krb5-flavor=MIT config which is what we do, and we use itin all the time in 1.0.2. Ken InterSoft International, Inc.Phone: 888-823-1541Fax: 866-701-1260http://www.netterm.comhttp://www.securenetterm.com From: Matt Caswell m...@openssl.org To:

Re: [openssl-dev] Kerberos

2015-05-05 Thread Matt Caswell
On 05/05/15 13:22, Blumenthal, Uri - 0553 - MITLL wrote: What are the problems? The code as it exists today is not compiled by default. I recently fixed a set of issues in master that had not been spotted simply because the code is not regularly compiled and used. One possible solution to that

Re: [openssl-dev] Kerberos

2015-05-05 Thread Viktor Dukhovni
On Tue, May 05, 2015 at 01:56:13PM +0100, Matt Caswell wrote: Due to the infrequency with which it is being used in practice this means that the code is not being kept up to date. There are some technical issues (including its use of single DES) which mean the existing solution is not

[openssl-dev] [openssl.org #3835] [PATCH] Initialize potentially uninitialized local variables

2015-05-05 Thread Gunnar Kudrjavets via RT
Hello, Fix all the instances of MSVC warning C4701 (potentially uninitialized local variable 'name' used). This warning pretty much means that there's a code path which results in uninitialized variables being used or returned. Thank you, Gunnar Kudrjavets From

Re: [openssl-dev] Kerberos

2015-05-05 Thread Blumenthal, Uri - 0553 - MITLL
What are the problems? - Original Message - From: Matt Caswell [mailto:m...@openssl.org] Sent: Tuesday, May 05, 2015 04:21 AM To: openssl-us...@openssl.org openssl-us...@openssl.org; openssl-dev@openssl.org openssl-dev@openssl.org Subject: [openssl-dev] Kerberos I am considering

Re: [openssl-dev] openssl-1.0.2-stable-SNAP-20150504 error

2015-05-05 Thread Andrejs Igumenovs
Hi, It is fixed in the main repository. Another question is why the test differentiates between the i386 and x86_64. /Andrejs On 04.05.2015, at 19:59, Kurt Roeckx k...@roeckx.be wrote: On Mon, May 04, 2015 at 07:21:11AM -0600, The Doctor wrote: This also occured in

Re: [openssl-dev] [openssl] CA.pl.in script bug fix (#268)

2015-05-05 Thread Andrejs Igumenovs
Hi, It was fixed yesterday: commit 0fd75c7e6e8482489135beb3f536546f27f6d0e5 - Andrejs On 05.05.2015, at 9:47, Adamzy Lee notificati...@github.com wrote: still get error message. — Reply to this email directly or view it on GitHub

[openssl-dev] Kerberos

2015-05-05 Thread Matt Caswell
I am considering removing Kerberos support from OpenSSL 1.1.0. There are a number of problems with the functionality as it stands, and it seems to me to be a very rarely used feature. I'm interested in hearing any opinions on this (either for or against). Thanks in advance for your input, Matt

[openssl-dev] [openssl.org #2943] Bug Report: openssl enc -bf silently ignores key data after the first 128 bits

2015-05-05 Thread Richard Levitte via RT
This had a long time coming. The issues at hand was really that the buffer for the key buffer was EVP_MAX_KEY_LENGTH (which is 64, which is 128 hex characters) and that was the size that the input was checked against, not the actual key length of the cipher that's used. This is now fixed: in