[Bug 54468] Restore FIPS operation when compiled against OpenSSL 1.0.1c

2013-01-24 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=54468 --- Comment #13 from William A. Rowe Jr. --- Thanks for the review Mladen. Users tracking a version number for this bugfix should look at 1.1.26 or later. -- You are receiving this mail because: You are the assignee for the bug. ---

[Bug 54468] Restore FIPS operation when compiled against OpenSSL 1.0.1c

2013-01-24 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=54468 Mladen Turk changed: What|Removed |Added Status|NEW |RESOLVED Resolution|---

[Bug 54468] Restore FIPS operation when compiled against OpenSSL 1.0.1c

2013-01-24 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=54468 --- Comment #11 from Mladen Turk --- SSL_vhost_algo_id can be removed since its unused. -- You are receiving this mail because: You are the assignee for the bug. - To un

[Bug 54468] Restore FIPS operation when compiled against OpenSSL 1.0.1c

2013-01-24 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=54468 William A. Rowe Jr. changed: What|Removed |Added CC||mt...@apache.org,

[Bug 54468] Restore FIPS operation when compiled against OpenSSL 1.0.1c

2013-01-23 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=54468 --- Comment #9 from Chuck Caldarale --- (In reply to comment #8) > (In reply to comment #7) > > I think you are confused? ctx->context_id is not a pointer but a byte > > array. > context_id is most definitely a pointer to "unsigned char"

[Bug 54468] Restore FIPS operation when compiled against OpenSSL 1.0.1c

2013-01-23 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=54468 --- Comment #8 from Christopher Schultz --- (In reply to comment #7) > I think you are confused? ctx->context_id is not a pointer but a byte array. Er... > See the declaration; > > unsigned char context_id[SHA_DIGEST_LENGTH]; > >

[Bug 54468] Restore FIPS operation when compiled against OpenSSL 1.0.1c

2013-01-23 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=54468 --- Comment #7 from William A. Rowe Jr. --- I think you are confused? ctx->context_id is not a pointer but a byte array. See the declaration; unsigned char context_id[SHA_DIGEST_LENGTH]; context_idis a member of the struct, *contex

[Bug 54468] Restore FIPS operation when compiled against OpenSSL 1.0.1c

2013-01-23 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=54468 --- Comment #6 from Christopher Schultz --- (In reply to comment #3) > You are suggesting C (C++) can morph the sizeof(str1) member when > it is explicitly declared? I think not... I wasn't suggesting that. I was suggesting that sizeof(me

[Bug 54468] Restore FIPS operation when compiled against OpenSSL 1.0.1c

2013-01-23 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=54468 --- Comment #5 from William A. Rowe Jr. --- Q. With this patch, does everything seem to work? A. Better still, it actual does successfully initialize the listeners and correctly handle incoming SSL traffic, using the SHA1 key into the S

[Bug 54468] Restore FIPS operation when compiled against OpenSSL 1.0.1c

2013-01-23 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=54468 --- Comment #4 from William A. Rowe Jr. --- Straightforward server.xml config; Since 1.0.1c Catalina error log now reports md5_dgst.c(74): OpenSSL internal error, assertion failed: Low level API call to digest MD5 forbidden in FIPS mod

[Bug 54468] Restore FIPS operation when compiled against OpenSSL 1.0.1c

2013-01-23 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=54468 --- Comment #3 from William A. Rowe Jr. --- You are suggesting C (C++) can morph the sizeof(str1) member when it is explicitly declared? I think not... struct { char str1[5]; int inta[4]; } any more than it would be allowed to m

[Bug 54468] Restore FIPS operation when compiled against OpenSSL 1.0.1c

2013-01-22 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=54468 --- Comment #2 from Christopher Schultz --- In ssl_network.c:154, I'm not sure you wanted this: sizeof(ctx->context_id) The sizeof will likely return the word size on the machine instead of the maximum number of characters ctx->contex

[Bug 54468] Restore FIPS operation when compiled against OpenSSL 1.0.1c

2013-01-22 Thread bugzilla
https://issues.apache.org/bugzilla/show_bug.cgi?id=54468 --- Comment #1 from William A. Rowe Jr. --- Before you need to dig too deeply, mod_ssl solved this by adopting apr-util's md5 hash instead of changing over to OpenSSL EVP. tcnative doesn't yet consume apr-util and I saw no reason to add