Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 17 Mar 2012 10:41:46 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: SSH thread-safety

On Sat, Mar 17, 2012 at 10:01 AM, Dhiru Kholia <dhiru.kholia@...il.com> wrote:
> On Sat, Mar 17, 2012 at 9:45 AM, Solar Designer <solar@...nwall.com> wrote:
>> My biggest concern is that the code is highly non-portable to different
>> versions of OpenSSL now.  I am not sure what we can do about that.
> The only way to ensure compatibility is to test with all major version
> of OpenSSL between 0.9.7 and 1.0.1 (current). I think that the changes
> required to ensure portability wouldn't be very hard to do.

The OMP code fails for OpenSSL 0.9.7 and 0.9.8 at run time
(compilation is fine). So something is definitely wrong with those
versions of OpenSSL when used with OMP enabled code. I will re-add the
check for OpenSSL version >= 1.0.0 and things should be fine then.

-- 
Cheers,
Dhiru

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ