First, since I'm sending this to the developer contacts of a lot of
packages I use - anyone who has contributed to any software on this page
deserves a great big "thank you" from me. I work in PHP, and that means
that I'm standing on the foundation of all that you've built. I really
appreciate
Friends, please let us remind now that we proposed the code freeze for OpenSSL
0.9.3 for today (see STATUS document) in order to be able to kick out the
release next week (Monday, May 17th).
When you've large or compatibility-problematic changes in your queue, either
decide to queue them for
Hi all!!
Someone some time ago posted it's proposal for the -update flag to
the ca tool. I'd like to contact him as I lost his message and I would
like to implement it into OpenSSL. I ask him to send in some source
code (if any) to not develop the same thing 2 times ...
See you on the bit
On Mon, May 10, 1999 at 09:47:41AM +0200, Ralf S. Engelschall wrote:
Friends, please let us remind now that we proposed the code freeze
for OpenSSL 0.9.3 for today (see STATUS document)
Readers of openssl-cvs of course know that the STATUS document itself
does not quite follow the freeze
Lars Weber wrote:
Dear OpenSSL-Devlopers !
As I have wrote in a mail to openssl-users I would like to add a new
functionality in openssl. As Massimiliano Pala has suggested I send my patch
to this list.
I have attached a patch to enhance the "ca"-application to check "index.txt"
for
Ok...
I had to work some time on the code to get it working but it seems
to be all ok, now.The new patch will add the -status and the -updatedb
switches to the ca application.
Please try to include the patch in the 0.9.3 version.
See you on the bit Stream,
Massimiliano Pala ([EMAIL
Ok...
I had to work some time on the code to get it working but it seems
to be all ok, now.The new patch will add the -status and the -updatedb
switches to the ca application.
Please try to include the patch in the 0.9.3 version.
See you on the bit Stream,
Massimiliano Pala ([EMAIL
RELEASE SHOWSTOPPERS
o Compilation warnings: ctype-related int vs. char
--- shouldn't this be *last* in the list?
o BSD/OS: assembler functions must not have leading underscores
o exptest and rsa_oaep_test fail with irix64-*
(Don Badrak
In article [EMAIL PROTECTED] you wrote:
On Mon, May 10, 1999 at 09:47:41AM +0200, Ralf S. Engelschall wrote:
Friends, please let us remind now that we proposed the code freeze
for OpenSSL 0.9.3 for today (see STATUS document)
[...]
I've not quite finished cleaning up the cert_st
On Mon, May 10, 1999 at 01:39:43PM +0200, Massimiliano Pala wrote:
Hi Massimiliano !
Lars Weber wrote:
I had to move the whole if(updatedb) ... to upper level actually avoiding the
password request ( thus removing your if(updatedb = 0 ) on the certificate
loading stage). I actually get
Bodo Moeller wrote:
I've not quite finished cleaning up the cert_st handling -- while I
hope that the current code is significantly less broken than the one
that was in the library until yesterday, the session-sess_cert stuff
still is not too comprehensible, and thus I cannot claim to be sure
Hi,
I patched ssl_engine_kernel.c to realize an OCSP
responder function
that check cert status on
ldap v2 directory.
I send all my patch to ssl_engine_kernel.c, every routine
start is marked
with Giacob label. The ldap_hook search the
certificate in our ldap directory, by
client
Hi,
I patched ssl_engine_kernel.c to realize an OCSP
responder function
that check cert status on
ldap v2 directory.
I send all my patch to ssl_engine_kernel.c, every routine
start is marked
with Giacob label. The ldap_hook search the
certificate in our ldap directory, by
client
Ulf Möller wrote:
I'm also going to force the version number debate to a conclusion, even
if I have to take unilateral action.
I thought everybody agreed the release is going to be number 0.9.3?
I'm talking about the format of the numerical version.
Cheers,
Ben.
--
Here's a patch to fix handling of +xxx args to Configure.
Index: Configure
===
RCS file: /e/openssl/cvs/openssl/Configure,v
retrieving revision 1.77
diff -u -r1.77 Configure
--- Configure 1999/05/10 11:07:50 1.77
+++ Configure
Hello guys,
In v3_enum.c, there is not 's2i' function.
So, we can't use CRLReason extension field in CRL.
I patch v3_enu.c, x509v3.h to use crlreason.
The following is config file format:
CRLReason=keyCompromise
-
ChangHee Lee.
Email: [EMAIL PROTECTED]
Company: Initiative Technology
Will the upcoming 0.9.3 release support building of dynamic libs
"out-of-the-box"?
Regards,
Damien
--
| "Bombay is 250ms from New York in the new world order" - Alan Cox
| Damien Miller - http://www.ilogic.com.au/~dmiller
| Email: [EMAIL PROTECTED] (home) -or- [EMAIL PROTECTED] (work)
[Sorry if this is inappropriate. I just subscribed to the OpenSSL
lists, and this was the first message I read.]
| From: Mike Hardy [EMAIL PROTECTED]
| Reply-To: [EMAIL PROTECTED]
| To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED],
Clay Ratliff [EMAIL PROTECTED], [EMAIL
18 matches
Mail list logo