Hello, I'm the author of siege. That program is dumping core on Red Hat systems in the following function: X509_get_subject_name
Here's the function which calls it: BOOLEAN SSL_initialize(CONN *C) { #ifdef HAVE_SSL int serr; char *str; C->ssl = NULL; C->ctx = NULL; C->method = NULL; C->cert = NULL; SSL_load_error_strings(); SSLeay_add_ssl_algorithms(); C->method = SSLv2_client_method(); C->ctx = SSL_CTX_new(C->method); C->ssl = SSL_new(C->ctx); SSL_set_fd(C->ssl, C->sock); serr = SSL_connect(C->ssl); C->cert = SSL_get_peer_certificate(C->ssl); str = X509_NAME_oneline(X509_get_subject_name(C->cert), 0, 0); if(my.debug){printf("X509 subject: %s\n", str); fflush(stdout); } str = X509_NAME_oneline(X509_get_issuer_name(C->cert), 0, 0); if(my.debug){printf("X509 issuer: %s\n", str); fflush(stdout); } X509_free(C->cert); return TRUE; #else return FALSE; #endif/*HAVE_SSL*/ } Any thoughts? -- #include <stdio.h> int main(){int a[]={74,117,115,116,32,97,110,111,116,104,101,114,32, \ 67,32,104,97,99,107,101,114,10,0}; int *b=a;while(*b>0)putchar(*b++);} ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]