[openssl-dev] [openssl.org #4554] Bug: psk argument of the s_client/s_server command strips leading zero bytes.

2016-06-12 Thread Stephen Henson via RT
Fixed now, thanks for the report. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4554 Please log in as guest with password guest if prompted -- openss

[openssl-dev] [openssl.org #3949] Bug: PKCS_final.7 not installed

2016-06-12 Thread Rich Salz via RT
The website stuff should be working, not sure what else (if anythiung) there is here. Please re-open ticket with more info if necessary. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3949 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubs

[openssl-dev] [openssl.org #3946] Enhancement request: Add support for RFC 5816

2016-06-12 Thread Rich Salz via RT
This is tracked in https://github.com/openssl/openssl/pull/771 and will happen after 1.1 -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3946 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/

[openssl-dev] [openssl.org #3983] unresolved external (___iob_func) with 1.0.1p using VS2015

2016-06-12 Thread Rich Salz via RT
1.0.1 is only getting security fixes. in this case, it appears that the source is too old to use with recent VS. Sorry. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3983 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mt

[openssl-dev] [openssl.org #4563] OpenSSL 1.0.2 branch: mem.obj : error LNK2001: unresolved external symbol _cleanse_ctr

2016-06-12 Thread Rich Salz via RT
Fixed by Andy in commit 6397ac585d6d4101be0fb742ac0db5074bd4e8a6 -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4563 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3053] [PATCH] Check for null pointer in cms envelopedData

2016-06-12 Thread Phillip Hellewell via RT
Wow, only 3 years to apply the simplest patch you have ever seen. Well, better late than never... :) Phillip On Sun, Jun 12, 2016 at 5:55 AM, Rich Salz via RT wrote: > OpenSSL_1_0_2-stable 63b2499 RT3053: Check for NULL before dereferencing > > master 6b36028 RT3053: Check for NULL before dere

Re: [openssl-dev] [openssl.org #3053] [PATCH] Check for null pointer in cms envelopedData

2016-06-12 Thread Phillip Hellewell
Wow, only 3 years to apply the simplest patch you have ever seen. Well, better late than never... :) Phillip On Sun, Jun 12, 2016 at 5:55 AM, Rich Salz via RT wrote: > OpenSSL_1_0_2-stable 63b2499 RT3053: Check for NULL before dereferencing > > master 6b36028 RT3053: Check for NULL before dere

Re: [openssl-dev] [openssl.org #4563] OpenSSL 1.0.2 branch: mem.obj : error LNK2001: unresolved external symbol _cleanse_ctr

2016-06-12 Thread Simon Richter via RT
Hi, On 12.06.2016 21:52, Andy Polyakov via RT wrote: > "no-asm" is the culprit here, but problem is not reporter's but mine. > mem_clr.c was updated, but build was not tested with no-asm. Fix is > upcoming. That error is gone, but now it complains about "_OPENSSL_hexstr2buf" being missing. Is th

[openssl-dev] [openssl.org #3236] support for DNSSEC in openssl

2016-06-12 Thread Rich Salz via RT
And DANE support is in 1.1/master. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3236 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4563] OpenSSL 1.0.2 branch: mem.obj : error LNK2001: unresolved external symbol _cleanse_ctr

2016-06-12 Thread Simon Richter via RT
Hi, On 12.06.2016 21:44, Joey Yandle via RT wrote: > Looking over your logs, you appear to be configuring with no-asm, then > calling do_ms. Does it work when you configure with asm and call do_nasm? I'd have to deploy nasm to the autobuilders then. Simon -- Ticket here: http://rt.openss

Re: [openssl-dev] [openssl.org #3236] support for DNSSEC in openssl

2016-06-12 Thread Elmar Stellnberger via RT
Hi; that of course does not make sense without additional DANE support; - that one of course needs to be implemented in OpenSSL. Am 2016-06-12 um 19:32 schrieb Rich Salz via RT: > There does not seem to be anything for OpenSSL to do here; it's about DNS > libraries calling openssl to generate and

Re: [openssl-dev] [openssl.org #4563] OpenSSL 1.0.2 branch: mem.obj : error LNK2001: unresolved external symbol _cleanse_ctr

2016-06-12 Thread Andy Polyakov via RT
> Looking over your logs, you appear to be configuring with no-asm, "no-asm" is the culprit here, but problem is not reporter's but mine. mem_clr.c was updated, but build was not tested with no-asm. Fix is upcoming. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4563 Please log in

Re: [openssl-dev] [openssl.org #4563] OpenSSL 1.0.2 branch: mem.obj : error LNK2001: unresolved external symbol _cleanse_ctr

2016-06-12 Thread Joey Yandle via RT
Looking over your logs, you appear to be configuring with no-asm, then calling do_ms. Does it work when you configure with asm and call do_nasm? The do_ms target doesn't get much attention these days. On Jun 12, 2016 5:56 AM, "Simon Richter via RT" wrote: > Hi, > > the 1.0.2 branch fails to com

Re: [openssl-dev] [openssl.org #4563] OpenSSL 1.0.2 branch: mem.obj : error LNK2001: unresolved external symbol _cleanse_ctr

2016-06-12 Thread Joey Yandle
Looking over your logs, you appear to be configuring with no-asm, then calling do_ms. Does it work when you configure with asm and call do_nasm? The do_ms target doesn't get much attention these days. On Jun 12, 2016 5:56 AM, "Simon Richter via RT" wrote: > Hi, > > the 1.0.2 branch fails to com

[openssl-dev] [openssl.org #3618] Authority Information Access support

2016-06-12 Thread Rich Salz via RT
We are not going to fetch certs at run-time because of the i/o issues (mentioned in the ticket) and the security concerns. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3618 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https:/

[openssl-dev] [openssl.org #3715] Possible bug in openssl 64 bit version

2016-06-12 Thread Rich Salz via RT
The issue is that windows was re-writing the files when copied to different places depending on local environment settings. closing ticket. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3715 Please log in as guest with password guest if prompted -- openssl-dev mailing list To un

[openssl-dev] [openssl.org #3713] Bug: openssl-1.0.1l, FIPS, HP-UX ia64, Duplicate Symbol "AES_Te" and "AES_Td"

2016-06-12 Thread Rich Salz via RT
A change to openssl, not the fips canister, was described. no more fips work going on at this time. closing ticket. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3713 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.op

[openssl-dev] [openssl.org #3716] Patch for setting preferred cipher list

2016-06-12 Thread Rich Salz via RT
Not doing this :) Neither should Akamai :) -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3716 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3666] [PATCH] build with no-ts fails

2016-06-12 Thread Rich Salz via RT
this was fixed some time ago. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3666 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3498] RE: AW: Platform query

2016-06-12 Thread Rich Salz via RT
WinCE is no longer supported. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3498 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3528] [PATCH] ssl: SSL_MODE_ASYNC_KEY_EX

2016-06-12 Thread Rich Salz via RT
async stuff is in master. please open new issue if there are problems with the implementation. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3528 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/lis

[openssl-dev] [openssl.org #3550] patch

2016-06-12 Thread Rich Salz via RT
seems to be user/environment error. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3550 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3424] Misaligned pointers for buffers cast to a size_t*

2016-06-12 Thread Rich Salz via RT
it's online on the FAQ now. closing this ticket as documenting it was the only thing still to be done. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3424 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mai

[openssl-dev] [openssl.org #3297] XXX_process_heartbeat() not checking return value of OPENSSL_malloc()

2016-06-12 Thread Rich Salz via RT
As if that was the only bug :) Fixed. It's dtls-only now anway. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3297 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3236] support for DNSSEC in openssl

2016-06-12 Thread Rich Salz via RT
There does not seem to be anything for OpenSSL to do here; it's about DNS libraries calling openssl to generate and/or verify signatures? -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3236 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsub

[openssl-dev] [openssl.org #3215] [bug report] SSLv23 connection fails but SSLv3 works

2016-06-12 Thread Rich Salz via RT
Sorry it has taken to long to review this. SSLv2 is dead and SSLv3 is strongly dis-recommended. Closing this ticket. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3215 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta

[openssl-dev] [openssl.org #3129] Openssl not clearing session ticket upon handshake failure

2016-06-12 Thread Rich Salz via RT
This hasn't been shown to be repeatable, and it's not clear where the bug is. Closing the ticket. Sorry for taking so long to get around to this. Please open a new ticket if you can isolate the issue. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3129 Please log in as guest with pa

[openssl-dev] [openssl.org #3171] integer undefined behaviors

2016-06-12 Thread Rich Salz via RT
Already fixed. We use clang sanitizers often, but if you find other bugs like this, please open a new ticket. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3171 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl

[openssl-dev] [openssl.org #3219] OpenSSL - AES in SSLv3.

2016-06-12 Thread Rich Salz via RT
We are not going to fix this. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3219 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #2650] major ssl read/ write performance improvement - updated

2016-06-12 Thread Rich Salz via RT
Sorry it took so long to look at this. The code has changed significantly since then, including making the structures opaque. Please open a new ticker (or GitHub pull request) against current sources if this is still an issue. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2650 Pl

[openssl-dev] [openssl.org #4563] OpenSSL 1.0.2 branch: mem.obj : error LNK2001: unresolved external symbol _cleanse_ctr

2016-06-12 Thread Simon Richter via RT
Hi, the 1.0.2 branch fails to compile in the VC-WIN32 configuration: mem.obj : error LNK2001: unresolved external symbol _cleanse_ctr Full log available at http://ci.kicad-pcb.org/job/windows-openssl-msvc/cpu=x86,label=windows/376/consoleFull Simon -- Ticket here: http://rt.openssl.org/T

[openssl-dev] [openssl.org #2759] SSL_read / SSL_ERROR_WANT_READ / ENOTCONN infinite loop

2016-06-12 Thread Rich Salz via RT
applied in master, commit a3ef2c16792ccbf65ef9861e0df6e7c277bcf770 thank you! -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2759 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #2823] Bug: FTBFS compiling openssl 1.01c with musl libc

2016-06-12 Thread Rich Salz via RT
1.0.1 only gets security fixes. If this is still an issue with 1.0.2 or 1.1, please open a new issue. (Sorry it took so long to get around to looking at this.) -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2823 Please log in as guest with password guest if prompted -- openssl-dev

[openssl-dev] [openssl.org #2749] SSL_shutdown() doesn't need to ever return 0

2016-06-12 Thread Rich Salz via RT
It could return zero, even if now it doesn't and I'm not sure that's true. Closing ticket. -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2749 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinf

[openssl-dev] [openssl.org #4022] Support for RFC 6066 in OpenSSL

2016-06-12 Thread Rich Salz via RT
Duplicate of RT 3591 -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4022 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3053] [PATCH] Check for null pointer in cms envelopedData

2016-06-12 Thread Rich Salz via RT
OpenSSL_1_0_2-stable 63b2499 RT3053: Check for NULL before dereferencing master 6b36028 RT3053: Check for NULL before dereferencing Author: Phillip Hellewell Date: Sat Jun 11 20:04:21 2016 -0400 RT3053: Check for NULL before dereferencing Reviewed-by: Tim Hudson -- Ticket here: http://rt.op