On 06/01/16 06:14, Zi Lin wrote:
> Hi Matt,
>
> thanks for your time. I am glad to see the big efforts done to make
> OpenSSL code better in the master branch (and v1.1.0+). I will find a
> way to start working on the master branch. A quick glance into the
> master branch state machine: the get_pr
On Tue, Jan 05, 2016 at 02:44:32PM -0800, Zi Lin wrote:
> Hi OpenSSL devs,
>
> I want to propose a patch that makes OpenSSL compatible with
> asynchronous session lookup during session resumption.
I think this is a bad idea. If you want distributed session caches
use session tickets, and implem
> On Jan 6, 2016, at 1:14 AM, Kurt Roeckx wrote:
>
> On Tue, Jan 05, 2016 at 03:40:03PM -0700, The Doctor wrote:
>> tls.o(.text+0xf32): undefined reference to `SSLv23_server_method'
>
> Are you sure it's finding the correct headers?
Yes, because we have OPENSSL_NO_DEPRECATED in default builds
Hi Matt,
thanks for your time. I am glad to see the big efforts done to make
OpenSSL code better in the master branch (and v1.1.0+). I will find a
way to start working on the master branch. A quick glance into the
master branch state machine: the get_prev_session call happens in
process_message "p
On Tue, Jan 05, 2016 at 03:40:03PM -0700, The Doctor wrote:
> tls.o(.text+0xf32): undefined reference to `SSLv23_server_method'
Are you sure it's finding the correct headers?
Kurt
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/ma
On 05/01/16 22:44, Zi Lin wrote:
> Hi OpenSSL devs,
>
> I want to propose a patch that makes OpenSSL compatible with
> asynchronous session lookup during session resumption. Currently, the
> session lookup expects the session callback to return immediately with
> success or failure. Now consider a
OPENSSL_DIR
> > #endif /* OPENSSL_API_COMPAT */
> >
> > Users who want to make sure they are avoiding interfaces that are
> > deprecated with 1.1.0 can set OPENSSL_API_COMPAT to 0x1010L or
> > higher as appropriate.
>
>
> Tip of the iceberg.
&g
Hi OpenSSL devs,
I want to propose a patch that makes OpenSSL compatible with
asynchronous session lookup during session resumption. Currently, the
session lookup expects the session callback to return immediately with
success or failure. Now consider a cluster of hosts that want to pool
the ssl s
On Tue, Jan 05, 2016 at 05:36:35PM +, Bjorn Kornefalk via RT wrote:
> OpenSSL 1.0.2e
>
> At line 156 of crypto/modes/ctr128.c
>
> const unsigned char *in,
> unsigned char *out,
> unsigned char ivec[16],
> unsigned char ecount_buf[16]
>
>*(size_t *)(out + n) =
>*(size_t *)(in + n
OPENSSL_DIR
> > #endif /* OPENSSL_API_COMPAT */
> >
> > Users who want to make sure they are avoiding interfaces that are
> > deprecated with 1.1.0 can set OPENSSL_API_COMPAT to 0x1010L or
> > higher as appropriate.
>
>
> Tip of the iceberg.
&g
OpenSSL 1.0.2e
At line 156 of crypto/modes/ctr128.c
const unsigned char *in,
unsigned char *out,
unsigned char ivec[16],
unsigned char ecount_buf[16]
*(size_t *)(out + n) =
*(size_t *)(in + n) ^ *(size_t *)(ecount_buf + n);
If the buffers are not aligned, the application crashes due
o 0x1010L or
> higher as appropriate.
Tip of the iceberg.
Number of changes are needed to be committed before launching.
>From inn:
tls.o: In function `tmp_dh_cb':
/usr/source/inn-CURRENT-20160105/nnrpd/tls.c:219: undefined reference to
`DH_generate_parameters'
tls.o: In f
12 matches
Mail list logo