RE: [openssl.org #3107] Resolved: Bug Report with Patch 1.0.1c/e (Typo in apps/ocsp.c line 1412)

2014-06-29 Thread Salz, Rich
nal Message- > From: owner-openssl-...@openssl.org [mailto:owner-openssl- > d...@openssl.org] On Behalf Of Matthew J. Harmon via RT > Sent: Sunday, June 29, 2014 2:19 PM > Cc: openssl-dev@openssl.org > Subject: Re: [openssl.org #3107] Resolved: Bug Report with Patch 1.0.1c/e >

Re: [openssl.org #3107] Resolved: Bug Report with Patch 1.0.1c/e (Typo in apps/ocsp.c line 1412)

2014-06-29 Thread Matthew J. Harmon via RT
openssl-1.0.1h$ grep -R "responsder" * apps/ocsp.c:BIO_printf(bio_err, "Error querying OCSP responsder\n"); :-( On 28 Jun 2014, at 8:07 AM, Stephen Henson via RT wrote: > According to our records, your request has been resolved. If you have any > further questions or concerns, please

[openssl.org #3107] Bug Report with Patch 1.0.1c/e (Typo in apps/ocsp.c line 1412)

2013-08-07 Thread Matthew J. Harmon via RT
Hello! Issue: Typo in apps/ocsp.c line 1412 Issue detail: "Error querying OCSP responsder" (stray "S" in responder) Issue found in: This typo was originally detected in 1.0.1c (also line 1412) but I checked the latest source to verify the bug still exists in 1.0.1e (line 1412) Patch submitted? Y

[openssl.org #1588] Bug report with PATCH

2007-10-15 Thread Dan Lukes via RT
>Synopsis: /dev/crypto broken on FreeBSD >Class: sw-bug >OS Release: FreeBSD 6.2-RELEASE-p8 i386 >OpenSSL Release: All OpenSSL releases based on crypto/engine/eng_cryptodev.c v.1.5 and newer (tested on 0.9.8e) >Description: The problem check-in #11541 http://cvs

[openssl.org #493] Bug report with patch: openssl 0.9.7 ocsp server sends wrong time strings

2003-02-07 Thread Stephen Henson via RT
[[EMAIL PROTECTED] - Fri Feb 7 16:32:51 2003]: > Hello. > > I want to report a bug in the openssl 0.9.7 ocsp server. The > self-test report and a proposed patch is included below. > This is a known issue. It was fixed a while ago in 0.9.7-stable and will appear in 0.9.7a ___

[openssl.org #493] Bug report with patch: openssl 0.9.7 ocsp server sends wrong time strings

2003-02-07 Thread Hagen Ross via RT
Hello. I want to report a bug in the openssl 0.9.7 ocsp server. The self-test report and a proposed patch is included below. When I start openssl ocsp in server mode in a CA directory # Server $ openssl ocsp -index index.txt -CA CA.crt -rsigner CA.crt \ -rkey CA.key -ndays 1 -port 4

Re: Bug report with patch

1999-12-29 Thread Bodo Moeller
On Wed, Dec 29, 1999 at 10:37:24AM -0500, Jeffrey Altman wrote: >> Probably ADH ciphers should be automatically excluded if >> SSL_VERIFY_PEER is set. SSL_VERIFY_PEER usually means that the >> application *wants* the handshake to fail unless the peer can be >> authenticated; they should never se

Re: Bug report with patch

1999-12-29 Thread Jeffrey Altman
> Probably ADH ciphers should be automatically excluded if > SSL_VERIFY_PEER is set. SSL_VERIFY_PEER usually means that the > application *wants* the handshake to fail unless the peer can be > authenticated; they should never set SSL_VERIFY_PEER if they > want anonymous ciphers. Not true. SSL_

Re: Bug report with patch

1999-12-29 Thread Bodo Moeller
Peter 'Luna' Runestig <[EMAIL PROTECTED]>: > Problem: > > If the negotiated cipher is ADH (ie, the SSL_aNULL flag is set) and if > the verify mode is SSL_VERIFY_PEER, the server will send a certificate > request to the client. The receipt of this request by the client is > considered a fatal pr

Bug report with patch

1999-12-19 Thread Peter 'Luna' Runestig
Hi, Problem: If the negotiated cipher is ADH (ie, the SSL_aNULL flag is set) and if the verify mode is SSL_VERIFY_PEER, the server will send a certificate request to the client. The receipt of this request by the client is considered a fatal protocol error in TLS. Therefore, the request should