Script started on Mon Jul 13 09:31:31 2015
doctor.nl2k.ab.ca//usr/source/openssl-1.0.2-stable-SNAP-20150713$ make test
testing...
(cd ..; make build_libcrypto)
making all in crypto...
ar r ../libcrypto.a cryptlib.o mem.o mem_dbg.o cversion.o ex_data.o cpt_err.o
ebcdic.o uid.o o_time.o o_str.o
From: openssl-dev On Behalf Of James A. T. Rice via RT
Sent: Saturday, July 11, 2015 17:19
From https://www.ietf.org/rfc/rfc4346.txt
CipherSuite TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA = { 0x00,0x16 };
From https://www.openssl.org/docs/apps/ciphers.html
From: openssl-dev On Behalf Of James A. T. Rice via RT
Sent: Saturday, July 11, 2015 17:19
From https://www.ietf.org/rfc/rfc4346.txt
CipherSuite TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA = { 0x00,0x16 };
From https://www.openssl.org/docs/apps/ciphers.html
During testing with strongswan 5.1.3, an issue with openssl 1.0.1o was
found. Openssl 1.0.1o has added code in HMAC_Init_ex() to detect
changing of message digest function. But that does not work when the
context has just been initialized with HMAC_CTX_init(). In this case,
ctx-md will be NULL
jean-christophe manciot via RT wrote:
*Ubuntu Server 15.04*
*OpenSSL 1.0.2d sources from https://github.com/openssl/openssl
https://github.com/openssl/openssl*
root@msi-ge60
:/home/actionmystique/Program-Files/Ubuntu/OpenSSL/git-open-ssl#* ./config*
Operating system: x86_64-whatever-linux2
Dear Sir
Glad for your quick and fast response and implementation. I have heard
about your bounty program over Hackerone. As I did ethical work I am hoping
some bounty in good faith from your end.
Thank you
Regarding
Mahender Singh
On Wed, Jul 15, 2015 at 12:40 AM, Richard Levitte via RT
Problem fixed.
Thanks.
Vid Tue, 14 Jul 2015 kl. 18.05.17, skrev mahendersingh2...@gmail.com:
Dear Sir / Madam ,
This is* Mahender Singh* *Security Researcher* from *India*,
i have found bug that i would like to share with your security team,
this
bug is related server file discloser, i
Hi,
Misaki.Miyashita wrote:
Hi Rick,
Can you run the truss(1) command when you run openssl version as follows?
i.e.
% truss -lf -u libcrypto:: -u libpkcs11:: -o /tmp/truss.out openssl version
The output will tell you more information about the function calls made
by the openssl(1)
On Tue, Jul 14, 2015 at 07:21:25PM +, Mahender Singh via RT wrote:
Glad for your quick and fast response and implementation. I have heard
about your bounty program over Hackerone. As I did ethical work I am hoping
some bounty in good faith from your end.
OpenSSL is an open-source project
Right now, if I do add randomness from a file I get, for example:
OpenSSL rand -rand r:\temp\randgen.bytes 0
Loading 'screen' into random state - done
10 semi-random bytes loaded
I'd like the option to remove the step the causes Loading 'screen'
into random state - done if I supply my own file.
Misaki, Andy,
I ran the truss command line you specified on the Sun T-3 and had to kill -9
the process as Ctrl-C and Ctrl-Z did not work. Attached is the truss.log output
and below are the last few lines of that file where the process was hung up.
Setting OPENSSL_sparcv9cap to 0x20 (or even
Dear Sir / Madam ,
This is* Mahender Singh* *Security Researcher* from *India*,
i have found bug that i would like to share with your security team, this
bug is related server file discloser, i have explain deeply as follows,
*Vulnerability* : GIT Config
*Vulnerable link *:
12 matches
Mail list logo