No matter. As soon as we have to perform a new build (will be done on Visual
Studio 2015 later this year) and I discover the same issue, I will report it.
Kees
-Original Message-
From: Rich Salz via RT [mailto:r...@openssl.org]
Sent: Tuesday, February 02, 2016 22:16
To: Kees Dekker
Cc:
Can someone please tell me how to verify the fix done for
CVE-2015-3197. I want to test 1.0.1r version for this issue.
>From the issue description I'm not able to understand what exactly
client and server doing.
Please tell me what packet client has to send or else please provide
me the packet c
The patches were large and added new features and API's which isn't appropriate
for bugfix releases.
In the master branch, branch the PRF functionality has been redirected to
libcrypto so it's possible it can be optimised by using a more efficient
implementation in crypto/kdf or in an engine. Ther
On Tue Feb 02 23:38:51 2016, stuart.k...@microfocus.com wrote:
> The SecurityPolicy.pdf claims that HP-UX 11i IA64 is a Supported
> Configuration; how can this claim be made when the code does nto even
> compile correctly?
The FIPS module compiles correctly but there is the duplicated symbol issue
The existing functionality reuses an EC_KEY structure and generates a new key.
We can't really change this because any application relying on that would end
up getting the same key back instead of a new one.
However I think a separate function which calculates the public key based on
the set priva
Am 03.02.2016 um 00:30 schrieb Kurt Roeckx:
On Tue, Feb 02, 2016 at 10:34:32PM +0100, Rainer Jung wrote:
Hi there,
reading the last advisory again, I noticed, that there's one logical
inconsistency.
First:
OpenSSL before 1.0.2f will reuse the key if:
...
- Static DH ciphersuites are used. The
On Tue Feb 02 21:46:59 2016, rsalz wrote:
> Sorry, we can't touch the FIPS code any more without sponsorship.
Though if this is still a problem a workaround is to rename the symbols on the
OpenSSL side outside the FIPS code.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commerci
The SecurityPolicy.pdf claims that HP-UX 11i IA64 is a Supported Configuration;
how can this claim be made when the code does nto even compile correctly?
From: Rich Salz via RT [r...@openssl.org]
Sent: Tuesday, February 02, 2016 4:23 PM
To: Stuart Kemp
Cc:
On Tue, Feb 02, 2016 at 10:34:32PM +0100, Rainer Jung wrote:
> Hi there,
>
> reading the last advisory again, I noticed, that there's one logical
> inconsistency.
>
> First:
>
> OpenSSL before 1.0.2f will reuse the key if:
> ...
> - Static DH ciphersuites are used. The key is part of the certifi
On 02/02/16 21:34, Rainer Jung wrote:
> Hi there,
>
> reading the last advisory again, I noticed, that there's one logical
> inconsistency.
>
> First:
>
> OpenSSL before 1.0.2f will reuse the key if:
> ...
> - Static DH ciphersuites are used. The key is part of the certificate
> and so it will
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://m
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://m
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://m
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://m
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://m
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://m
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://m
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://m
On 3 February 2016 at 10:50, Rich Salz via RT wrote:
> sorry, we can't do anything about this without more detail.
> inter-language bindings are tough
Fortunately, I haven't seen this issue since 1.0.2a, so I suspect it
was some other bug being exposed in a strange way, that has since been
resol
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://m
If you sneeze on the FIPS code, you need a new CMVP change letter.
Setting realistic expectations, there are no plans at this time for any FIPS
work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://m
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
not an openssl issue, closing ticket.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Believed all in now :)
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
We're not maintaining FIPS stuff right now.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Fixed in master.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Also this is fixed in master.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
Not enough information to reproduce the bug.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
We cannot reproduce the error.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Believe fixed in current releases.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
sorry, we can't do anything about this without more detail.
inter-language bindings are tough.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
Sorry, we can't touch the FIPS code any more without sponsorship.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
fixed in master and perhaps 1.0.2
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
Also, we're not touching FIPS stuff right now.
Also also, pascal inter-language calling stuff? :)
--
Rich Salz, OpenSSL dev team; rs...@opens
this sounds like a windows display issue, not an openssl issue.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
No reply, cannot reproduce it, closing the ticket.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
No reply, cannot reproduce the bug, closing the ticket.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
Also fixed in master, and probably 1.0.2
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
o
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
Also, fixed in master (and maybe 1.0.2)
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
op
Hi there,
reading the last advisory again, I noticed, that there's one logical
inconsistency.
First:
OpenSSL before 1.0.2f will reuse the key if:
...
- Static DH ciphersuites are used. The key is part of the certificate
and so it will always reuse it. This is only supported in 1.0.2.
and
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
Also fixed in 1.1
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
also the new build process handles this correctl.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
Also, the new build process should handle this more cleanly.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
_
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Also, Tandem isn't much supported...
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
opens
this is fixed in master (openssl 1.1 release)
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
GOST is now a separately-maintained engine.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Is this still an issue? (Hubert?)
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
This is already fixed in master, as well.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
VMS gets a major uplift in 1.1
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-de
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
The public interface is EVP_xxx which does the right thing.
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Many of these are probably fixed now.
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
open
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
also, sslv2 is gone. :)
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailin
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now and not doing any FIPS stuff for now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
opens
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
Also the build system in changed in master.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
_
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
But we're not doing FIPS work now, either. Sorry.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
We believe this works now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mai
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
GOST is now a separately-maintained engine.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe:
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
Sorry we didn't get to this sooner. We're only taking security fixes for 1.0.1
now.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: h
sorry, we're not doing any FIPS changes at this time.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Old release, Tried to reproduce the problem and could not do so.
Please open a new ticket if this is still an issue with current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.
for 1.0.1 we're only doing security fixes now.
for threads stuff, please see https://github.com/openssl/openssl/pull/451
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listin
Sorry we didn't get to this sooner, we are only taking security fixes for 1.0.1
now.
If still an issue on current releases, please open a new ticket.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://m
Please see https://github.com/openssl/openssl/pull/451
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
sorry we diddn't get to this sooner.
we're only taking 1.0.1 security fixes now.
and if you so much as *sneeze* on source code, you need a FIPS change letter :)
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe
Too late for 1.0.1 and too much work for 1.0.2 :)
We fixed it in master (1.1) by saying "any supported digest" which isn't ideal,
admittedly.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.opens
We're only doing security fixes in 1.0.1 now; sorry we didn't get to this
sooner.
Fixed in current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-
Is this still an issue in 1.0.2 or master? If so, please re-open this ticket.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
We're only doing security fixes in 1.0.1 now, sorry we didn't get to this
sooner.
Believed fixed in 1.0.2 Definitely fixed in master.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/m
fixed in master.
too invasive to fix in earlier releases
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
We're only taking security fixes for 1.0.1 now. Sorry we didn't get to look at
this sooner.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
fixed in current releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Since everyone disagrees with the RFC about sending "sigalg-agreeing" certs,
we're not going to change this.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-d
Are these issues still present in the current releases(s)? If so, please open a
new ticket.
The 1.0.1 release only gets security fixes now.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl
believed fixed; 1.0.1 only gets security fixes now.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
we no longer support building without all tls extensions.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
fixed in later versions; 1.0.1 only gets security fixes now.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
1.0.1 is only getting security fixes now.
we think current releases work.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
this feature is in openssl 1.1
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
not a bug.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
1.0.1 only gets security fixes now.
might be fixed in 1.0.2
definitely fixed in 1.1
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
0.9.8 not supported, please re-test and re-open if still an issue on current
releases.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry it took so long to get to this. We're only doing security fixes for 1.0.1
now. Closing.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Believed fixed. Also see https://github.com/openssl/openssl/pull/451
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Please see https://github.com/openssl/openssl/pull/451 which is what we'll be
doing for threads moving forward
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl
Please see https://github.com/openssl/openssl/pull/451 which is what we'll be
doing for threads moving forward
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl
1 - 100 of 118 matches
Mail list logo