On Út, 2015-05-05 at 13:22 +, Technical Support wrote:
Perhaps people use the --with-krb5-flavor=MIT config which is what we do, and
we use itin all the time in 1.0.2.
Ken
From: Matt Caswell m...@openssl.org
To: openssl-dev@openssl.org
Sent: Tuesday, May 5, 2015 7:56 AM
I'm hesitant to remove this capability altogether, but your argument is
convincing.
In view of the progress recently made in the quantum computing field, I think
it would be nice to strengthen symmetric crypto capabilities (such as
Kerberos), but that implies a lot of work (which I'm not
Perhaps people use the --with-krb5-flavor=MIT config which is what we do, and
we use itin all the time in 1.0.2.
Ken
InterSoft International, Inc.Phone: 888-823-1541Fax:
866-701-1260http://www.netterm.comhttp://www.securenetterm.com
From: Matt Caswell m...@openssl.org
To:
On 05/05/15 13:22, Blumenthal, Uri - 0553 - MITLL wrote:
What are the problems?
The code as it exists today is not compiled by default. I recently fixed
a set of issues in master that had not been spotted simply because the
code is not regularly compiled and used. One possible solution to that
On Tue, May 05, 2015 at 01:56:13PM +0100, Matt Caswell wrote:
Due to the infrequency with which it is being used in practice this
means that the code is not being kept up to date. There are some
technical issues (including its use of single DES) which mean the
existing solution is not
Hello,
Fix all the instances of MSVC warning C4701 (potentially uninitialized
local variable 'name' used). This warning pretty much means that there's
a code path which results in uninitialized variables being used or
returned.
Thank you,
Gunnar Kudrjavets
From
What are the problems?
- Original Message -
From: Matt Caswell [mailto:m...@openssl.org]
Sent: Tuesday, May 05, 2015 04:21 AM
To: openssl-us...@openssl.org openssl-us...@openssl.org;
openssl-dev@openssl.org openssl-dev@openssl.org
Subject: [openssl-dev] Kerberos
I am considering
Hi,
It is fixed in the main repository.
Another question is why the test differentiates between the i386 and x86_64.
/Andrejs
On 04.05.2015, at 19:59, Kurt Roeckx k...@roeckx.be wrote:
On Mon, May 04, 2015 at 07:21:11AM -0600, The Doctor wrote:
This also occured in
Hi,
It was fixed yesterday:
commit 0fd75c7e6e8482489135beb3f536546f27f6d0e5
- Andrejs
On 05.05.2015, at 9:47, Adamzy Lee notificati...@github.com wrote:
still get error message.
—
Reply to this email directly or view it on GitHub
I am considering removing Kerberos support from OpenSSL 1.1.0. There are
a number of problems with the functionality as it stands, and it seems
to me to be a very rarely used feature. I'm interested in hearing any
opinions on this (either for or against).
Thanks in advance for your input,
Matt
This had a long time coming. The issues at hand was really that the buffer for
the key buffer was EVP_MAX_KEY_LENGTH (which is 64, which is 128 hex
characters) and that was the size that the input was checked against, not the
actual key length of the cipher that's used.
This is now fixed:
in
11 matches
Mail list logo