On 2016-09-12 22:10:34 [+0200], Sebastian Andrzej Siewior wrote:
> VirtualBox hackers! Could you please take a look at this? It should
> compile against openssl 1.1.0 and 1.0.2h and work.
It seems the patch is/was not perfect. According to [0] they applied
parts of it to trunk and will backport it
On 2016-09-10 01:30:13 [+0200], Kurt Roeckx wrote:
> The code seems to be doing: The signature algorithm was
> sha1WithRSAEncryption, so the public key they passed us must
> have been an RSA key. But from what I understand, what the code
> really did was: it's an EVP_sha1(), it's an an RSA key. But
On Wed, Sep 07, 2016 at 11:38:01PM +0200, Sebastian Andrzej Siewior wrote:
> On 2016-06-26 12:24:40 [+0200], Kurt Roeckx wrote:
> > If you have problems making things work, feel free to contact us.
>
> HALP!
>
> It builds against old & new ssl and I am proud what I managed in
> rdssl_cert_to_rkey
On 2016-06-26 12:24:40 [+0200], Kurt Roeckx wrote:
> If you have problems making things work, feel free to contact us.
HALP!
It builds against old & new ssl and I am proud what I managed in
rdssl_cert_to_rkey(). However they dereference
EVP_MD->required_pkey_type which vanished in 1.1 and I have
Source: virtualbox
Version: 5.0.20-dfsg-2
Severity: important
Control: block 827061 by -1
Hi,
OpenSSL 1.1.0 is about to released. During a rebuild of all packages using
OpenSSL this package fail to build. A log of that build can be found at:
https://breakpoint.cc/openssl-1.1-rebuild-2016-05-29/
5 matches
Mail list logo