Re: Problems compiling HP Openssl in 64 bit mode

2000-12-13 Thread Lutz Jaenicke
On Wed, Dec 13, 2000 at 09:37:56AM +0100, Cliff Sarginson wrote: Configure hpux64-parisc-cc make However the make eventually fails with the complaint: cc -o openssl -DMONOLITH -I../include -DTHREADS -D_REENTRANT -Ae +DD64 +O3 +ESlit -z -DB_ENDIAN -DMD32_XARRAY openssl.o v erify.o

memory leaks?

2000-12-13 Thread Mohr, Andreas
If I use IE several times to get a crypted htmlfile from my server program then I get memoryleaks. - server: using API C from openssl-0.9.6 with pthreads - client: Internet Explorer 5.00.2614.3500 (40Bits) and Netscape6/6.0 Gecko/20001106 (128Bits) - openssl-0.9.6 compiled with gcc

Re: Problems compiling HP Openssl in 64 bit mode

2000-12-13 Thread Richard Levitte - VMS Whacker
From: Cliff Sarginson [EMAIL PROTECTED] csarginson ss_id.o ciphers.o nseq.o pkcs12.o pkcs8.o spkac.o smime.o rand.o -L. csarginson -L.. -L../.. -L../../.. -L.. -lssl -L.. -lcrypto csarginson ld: Missing library symbol table in ../libssl.a csarginson Fatal error. csarginson make[1]: *** [openssl]

Re: oops... retest shows bn_mul still broken!!!

2000-12-13 Thread Richard Levitte - VMS Whacker
From: "Sean O'Riordain" [EMAIL PROTECTED] seanpor test BN_kronecker seanpor ..++ seanpor bn_recp.c: BN_mul does not work seanpor r seanpor =12552A5A2F70F9FCE164700809AA7EDD4AF2A04A5CF7F5166DC16E7EEA46C1AE239971AD606A1E0B4C6123826A259D89EE33826304E4C5B7E281C25B38C487417 seanpor m

Question about cryptographic method

2000-12-13 Thread Jan Mikosiski
I create a system which uses openssl and GemPlus card - GemSafe I try create sign with thic card ( I'm using GemPlus pk2priv.dll whith PKCS#11 interface implemented) and verify it with OpenSSL . To create sign I use CKM_RSA_PKCS ( PKCS#11) algoritm. To decrypt sign with OpenSSL I

Re: Question about cryptographic method

2000-12-13 Thread Richard Levitte - VMS Whacker
From: "Jan Mikosi‚ñski" [EMAIL PROTECTED] MikosinskiJ To create sign I use CKM_RSA_PKCS ( PKCS#11) algoritm. To decrypt sign with MikosinskiJ OpenSSL I use RSA_NO_PADDING algoritm definied in rsa.h. MikosinskiJ Decrypted value isn't identical with value whitch was encrypted. From

ssl23_accept

2000-12-13 Thread Tom Biggs
Quick question - am I correct in assuming that the only purpose for ssl23_accept() and ssl23_get_client_hello() is to detect the protocol version that the client is using, and to select the version-appropriate methods for the session? Another question - there is one case in there where the

client certificate!!!

2000-12-13 Thread Filipe Contente
Hello!! I'm a new member, and i don't understand how ssl certificates very well. i'm using this function to get the client certificate: And it returns NULL!! The s variable (SSL type), isn't NULL so i think it returns NULL when i copy the peer session.. sorry about my english and

Re: cvs commit: openssl/crypto/bn bn_mul.c

2000-12-13 Thread Richard Levitte - VMS Whacker
From: [EMAIL PROTECTED] levitte levitte 13-Dec-2000 16:29:30 levitte levitte Modified:crypto/bn bn_mul.c levitte Log: levitte Problem: bn_mul_normal() misbehaves if the size of b is 0. levitte Solution: multiply a with 0, putting the result in r, and return. It looks to me like

plans for ENGINE merge with main tree

2000-12-13 Thread Tom Biggs
I'm creating a local CVS repository for my changes to OpenSSL. I'm starting with openssl-engine-0.9.6. I was wondering what the plans are for merging the engine stuff into the main build. And if that is planned, any ideas on what it's going to look like? I'm importing the whole

RE: plans for ENGINE merge with main tree

2000-12-13 Thread lgazis
It's already merged, in the snapshots of OpenSSL in development which are available at http://www.openssl.org/source/cvs. Since they're snapshots of work in progress, they aren't necessarily stable, but you can see what the code looks like merged. Lynn Gazis Rainbow Technologies

Re: cvs commit: openssl/crypto/bn bn_mul.c

2000-12-13 Thread Mads Toftum
On Wed, Dec 13, 2000 at 04:36:07PM +0100, Richard Levitte - VMS Whacker wrote: It looks to me like this fix removes the problem that was reported a few days ago. I'd like some people to run bntest a few times to verify this. The easiest way is the following: make TESTS=test_bn

Re: plans for ENGINE merge with main tree

2000-12-13 Thread Richard Levitte - VMS Whacker
From: lgazis [EMAIL PROTECTED] lgazis It's already merged, in the snapshots of OpenSSL in lgazis development which are available at lgazis http://www.openssl.org/source/cvs. Since they're snapshots of lgazis work in progress, they aren't necessarily stable, but you can lgazis see what the code

Re: cvs commit: openssl/crypto/bn bn_mul.c

2000-12-13 Thread Sean O'Riordain
Richard Levitte - VMS Whacker wrote: From: [EMAIL PROTECTED] levitte levitte 13-Dec-2000 16:29:30 levitte levitte Modified:crypto/bn bn_mul.c levitte Log: levitte Problem: bn_mul_normal() misbehaves if the size of b is 0. levitte Solution: multiply a with 0, putting the

Re: cvs commit: openssl/apps openssl.c

2000-12-13 Thread Dr S N Henson
[EMAIL PROTECTED] wrote: levitte 13-Dec-2000 18:15:05 Now, if someone could explain to me why OBJ_dup() cheats... Revision ChangesPath 1.33 +9 -8 openssl/crypto/objects/objects.h 1.6 +4 -3 openssl/crypto/objects/obj_lib.c 1.20 +12 -11

Re: Verisign DigitalID

2000-12-13 Thread Dan Kegel
N. wrote: Just thought you might know the answer to this one: how is it that Verisign is selling certificates for 40 bit and 128 bit encryption - the chosen session key size has nothing to do with the certificate! or am I completely off here? I don't quite understand the

Re: Question about cryptographic method

2000-12-13 Thread Goetz Babin-Ebell
Jan Mikosiñski wrote: Hello Jan, I create a system which uses openssl and GemPlus card - GemSafe I try create sign with thic card ( I'm using GemPlus pk2priv.dll whith PKCS#11 interface implemented) and verify it with OpenSSL . To create sign I use CKM_RSA_PKCS ( PKCS#11) algoritm.

Re: cvs commit: openssl/apps openssl.c

2000-12-13 Thread Richard Levitte - VMS Whacker
From: Dr S N Henson [EMAIL PROTECTED] drh [EMAIL PROTECTED] wrote: drh drh levitte 13-Dec-2000 18:15:05 drh drh drhNow, if someone could explain to me why OBJ_dup() cheats... drh [...] drh drh If ASN1_OBJECT_FLAG_DYNAMIC isn't set then the ASN1_OBJECT structure is drh form the

Re: client certificate!!!

2000-12-13 Thread jkunz
On 13 Dec, Filipe Contente wrote: i'm using this function to get the client certificate: And it returns NULL!! You must: /* This is needed for verifying any client */ if ( ! SSL_CTX_load_verify_locations( sslctx, ca_file, ca_dir)) { ERR_print_errors_fp( stderr);

obj_dat.h in openssl-0.9.6-engine

2000-12-13 Thread Bob Beck
Does this still make sense to exist in the engine branch? It won't regenerate successfully using obj_dat.pl if you remove it. -Bob __ OpenSSL Project http://www.openssl.org

Re: obj_dat.h in openssl-0.9.6-engine

2000-12-13 Thread Richard Levitte - VMS Whacker
From: Bob Beck [EMAIL PROTECTED] beck Does this still make sense to exist in the engine branch? It beck won't regenerate successfully using obj_dat.pl if you remove it. The engine branch is not used any more, since the contents have been merged into the main trunk. Please use the main

Re: obj_dat.h in openssl-0.9.6-engine

2000-12-13 Thread Bob Beck
The engine branch is not used any more, since the contents have been merged into the main trunk. Please use the main trunk. Well, ok, my bad, I'm using openssl-engine-0.9.6, sorry richard. my real question is more to the effect of "what has happened with obj_dat.h in

Re: cvs commit: openssl/apps openssl.c

2000-12-13 Thread Dr S N Henson
Richard Levitte - VMS Whacker wrote: From: Dr S N Henson [EMAIL PROTECTED] drh [EMAIL PROTECTED] wrote: drh drh levitte 13-Dec-2000 18:15:05 drh drh drhNow, if someone could explain to me why OBJ_dup() cheats... drh [...] drh drh If ASN1_OBJECT_FLAG_DYNAMIC isn't set

My patch to rsa_eay.c didn't seem to get accepted

2000-12-13 Thread Reddie, Steven
Hi core team, On 4th October I submitted a patch to crypto/rsa/rsa_eay.c to fix some multithreaded race conditions. Nobody replied to my message at the time, and I've just noticed that the latest snapshot doesn't include these fixes. Did this just get overlooked, or was it purposely rejected?