Fixed now, thanks for the report.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4554
Please log in as guest with password guest if prompted
--
openss
The website stuff should be working, not sure what else (if anythiung) there is
here.
Please re-open ticket with more info if necessary.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3949
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubs
This is tracked in https://github.com/openssl/openssl/pull/771 and will happen
after 1.1
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3946
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/
1.0.1 is only getting security fixes. in this case, it appears that the source
is too old to use with recent VS. Sorry.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3983
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mt
Fixed by Andy in commit 6397ac585d6d4101be0fb742ac0db5074bd4e8a6
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4563
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Wow, only 3 years to apply the simplest patch you have ever seen.
Well, better late than never... :)
Phillip
On Sun, Jun 12, 2016 at 5:55 AM, Rich Salz via RT wrote:
> OpenSSL_1_0_2-stable 63b2499 RT3053: Check for NULL before dereferencing
>
> master 6b36028 RT3053: Check for NULL before dere
Wow, only 3 years to apply the simplest patch you have ever seen.
Well, better late than never... :)
Phillip
On Sun, Jun 12, 2016 at 5:55 AM, Rich Salz via RT wrote:
> OpenSSL_1_0_2-stable 63b2499 RT3053: Check for NULL before dereferencing
>
> master 6b36028 RT3053: Check for NULL before dere
Hi,
On 12.06.2016 21:52, Andy Polyakov via RT wrote:
> "no-asm" is the culprit here, but problem is not reporter's but mine.
> mem_clr.c was updated, but build was not tested with no-asm. Fix is
> upcoming.
That error is gone, but now it complains about
"_OPENSSL_hexstr2buf" being missing. Is th
And DANE support is in 1.1/master.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3236
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Hi,
On 12.06.2016 21:44, Joey Yandle via RT wrote:
> Looking over your logs, you appear to be configuring with no-asm, then
> calling do_ms. Does it work when you configure with asm and call do_nasm?
I'd have to deploy nasm to the autobuilders then.
Simon
--
Ticket here: http://rt.openss
Hi; that of course does not make sense without additional DANE support;
- that one of course needs to be implemented in OpenSSL.
Am 2016-06-12 um 19:32 schrieb Rich Salz via RT:
> There does not seem to be anything for OpenSSL to do here; it's about DNS
> libraries calling openssl to generate and
> Looking over your logs, you appear to be configuring with no-asm,
"no-asm" is the culprit here, but problem is not reporter's but mine.
mem_clr.c was updated, but build was not tested with no-asm. Fix is
upcoming.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4563
Please log in
Looking over your logs, you appear to be configuring with no-asm, then
calling do_ms. Does it work when you configure with asm and call do_nasm?
The do_ms target doesn't get much attention these days.
On Jun 12, 2016 5:56 AM, "Simon Richter via RT" wrote:
> Hi,
>
> the 1.0.2 branch fails to com
Looking over your logs, you appear to be configuring with no-asm, then
calling do_ms. Does it work when you configure with asm and call do_nasm?
The do_ms target doesn't get much attention these days.
On Jun 12, 2016 5:56 AM, "Simon Richter via RT" wrote:
> Hi,
>
> the 1.0.2 branch fails to com
We are not going to fetch certs at run-time because of the i/o issues
(mentioned in the ticket) and the security concerns.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3618
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https:/
The issue is that windows was re-writing the files when copied to different
places depending on local environment settings.
closing ticket.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3715
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To un
A change to openssl, not the fips canister, was described. no more fips work
going on at this time. closing ticket.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3713
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.op
Not doing this :) Neither should Akamai :)
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3716
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
this was fixed some time ago.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3666
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
WinCE is no longer supported.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3498
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
async stuff is in master. please open new issue if there are problems with the
implementation.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3528
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/lis
seems to be user/environment error.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3550
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
it's online on the FAQ now. closing this ticket as documenting it was the only
thing still to be done.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3424
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mai
As if that was the only bug :)
Fixed.
It's dtls-only now anway.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3297
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
There does not seem to be anything for OpenSSL to do here; it's about DNS
libraries calling openssl to generate and/or verify signatures?
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3236
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsub
Sorry it has taken to long to review this.
SSLv2 is dead and SSLv3 is strongly dis-recommended.
Closing this ticket.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3215
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta
This hasn't been shown to be repeatable, and it's not clear where the bug is.
Closing the ticket. Sorry for taking so long to get around to this. Please open
a new ticket if you can isolate the issue.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3129
Please log in as guest with pa
Already fixed.
We use clang sanitizers often, but if you find other bugs like this, please
open a new ticket.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3171
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl
We are not going to fix this.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=3219
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Sorry it took so long to look at this.
The code has changed significantly since then, including making the structures
opaque.
Please open a new ticker (or GitHub pull request) against current sources if
this is still an issue.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2650
Pl
Hi,
the 1.0.2 branch fails to compile in the VC-WIN32 configuration:
mem.obj : error LNK2001: unresolved external symbol _cleanse_ctr
Full log available at
http://ci.kicad-pcb.org/job/windows-openssl-msvc/cpu=x86,label=windows/376/consoleFull
Simon
--
Ticket here: http://rt.openssl.org/T
applied in master, commit a3ef2c16792ccbf65ef9861e0df6e7c277bcf770 thank you!
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2759
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
1.0.1 only gets security fixes.
If this is still an issue with 1.0.2 or 1.1, please open a new issue.
(Sorry it took so long to get around to looking at this.)
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2823
Please log in as guest with password guest if prompted
--
openssl-dev
It could return zero, even if now it doesn't and I'm not sure that's true.
Closing ticket.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2749
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinf
Duplicate of RT 3591
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4022
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
OpenSSL_1_0_2-stable 63b2499 RT3053: Check for NULL before dereferencing
master 6b36028 RT3053: Check for NULL before dereferencing
Author: Phillip Hellewell
Date: Sat Jun 11 20:04:21 2016 -0400
RT3053: Check for NULL before dereferencing
Reviewed-by: Tim Hudson
--
Ticket here: http://rt.op
36 matches
Mail list logo