On Sat, Sep 29, 2001 at 01:22:59AM +0100, Dr S N Henson wrote:
> Well if this is the version that you modified to print out error
> messages then there's another problem. I suggest you change that part
> you mentioned earlier to:
>
> pk = PEM_read_PrivateKey(fp, NULL, NULL, (char *)passphra
> I've just checked in a fix to the development version. Let me know of
> any problems.
> Steve.
I've just tried your fix and it works correctly.
Thank you very much.
Regards,
MD
__
Abbonati a Tiscali!
Con VoceViva puoi anche
Phil Stracchino wrote:
>
> On Fri, Sep 28, 2001 at 11:21:43PM +0100, Dr S N Henson wrote:
> > Strange, it should produce an error of some sort. See what happens if
> > you remove the pass phrase on the private key (using the rsa utility)
> > and also see if you get an error when you supply an inc
On Fri, Sep 28, 2001 at 11:21:43PM +0100, Dr S N Henson wrote:
> Strange, it should produce an error of some sort. See what happens if
> you remove the pass phrase on the private key (using the rsa utility)
> and also see if you get an error when you supply an incorrect pass
> phrase.
babylon5:r
Phil Stracchino wrote:
>
> On Fri, Sep 28, 2001 at 11:00:25AM -0700, Phil Stracchino wrote:
> > On Fri, Sep 28, 2001 at 06:21:26PM +0100, Dr S N Henson wrote:
> > > Read the bit in the FAQ about adding an ERR_print_errors_fp() call then
> > > see what it says is the cause.
>
> I tried using ERR_
On Fri, Sep 28, 2001 at 11:00:25AM -0700, Phil Stracchino wrote:
> On Fri, Sep 28, 2001 at 06:21:26PM +0100, Dr S N Henson wrote:
> > Read the bit in the FAQ about adding an ERR_print_errors_fp() call then
> > see what it says is the cause.
I tried using ERR_print_errors_fp() in the appropriate
Dr S N Henson wrote:
>
> "Douglas E. Engert" wrote:
> >
> > It does not appear there is any code in OpenSSL to make sure all critical
> > extensions are checked during a verify. This could be considered a bug.
> > The default behavior should be to reject any critical extensions which are
> > no
On Fri, Sep 28, 2001 at 08:04:36PM +1000, Damien Miller wrote:
> On Thu, 27 Sep 2001, Phil Stracchino wrote:
>
> > I have finally managed to isolate this down to the following: For SSH2
> > DSA and RSA keys, the OpenSSL PEM_read_PrivateKey() macro, called from
> > authfile.c line 448:
> >
> >
It does not appear there is any code in OpenSSL to make sure all critical
extensions are checked during a verify. This could be considered a bug.
The default behavior should be to reject any critical extensions which are
not understood.
I realize that this could be completely implemented in the
Hello,
Building OpenSSL fails, see attachment. Please advise.
<>
Best regards,
Eric Eijkelboom
testlog
Description: testlog
I am having trouble with the stability of OpenSSL 0.9.6 under
Apache 1.3.19 on Windows (2000, NT, 98, Me).
I'm wondering if anyone has investigated and fixed a race
between deallocation of the read request pool and the expiration
of a recvwithtimeout. This seems to be related to the problem.
On Fri, Sep 28, 2001 at 12:17:28PM +0200, Richard Levitte - VMS Whacker wrote:
> From: Bodo Moeller <[EMAIL PROTECTED]>
>> If you want elapsed real time ('openssl speed -elapsed'), you need
>> times(), which measures in clock ticks and not in CLOCKS_PER_SEC.
> -elapsed measures clock time (using
Ulrike Gnnel wrote:
>
> Hello,
>
> I find a bug in the crypto/x509 part of the SSL library.
> The documentation implies that I can use either the file /usr/local/ssl/cert.
> pem for the trusted certificates or the file specified in the environment
> variable SSL_CERT_FILE. But if there is no cer
Phil Stracchino wrote:
>
> On Thu, Sep 27, 2001 at 02:26:14PM -0700, Phil Stracchino wrote:
> > I've just compiled and installed openssh-2.9.9p2 (compiled against
> > openssl-0.9.6b using gcc-3.0.0) on a Slackware 7-based Linux machine
> > (kernel 2.4.6ac2). The previously installed version was
From: Bodo Moeller <[EMAIL PROTECTED]>
moeller> Do 'ssltest' timings make sense (they are automatically displayed
moeller> while running 'make test')? In 'ssltest' and 'ectest', I always
moeller> use clock() and CLOCKS_PER_SEC, which are part of the C standard.
moeller> This is sufficient as lon
From: Bodo Moeller <[EMAIL PROTECTED]>
moeller> If you want elapsed real time ('openssl speed -elapsed'), you need
moeller> times(), which measures in clock ticks and not in CLOCKS_PER_SEC.
-elapsed measures clock time (using ftime or gettimeofday, depending
on what's available). times() gives
Hello,
I find a bug in the crypto/x509 part of the SSL library.
The documentation implies that I can use either the file /usr/local/ssl/cert.
pem for the trusted certificates or the file specified in the environment
variable SSL_CERT_FILE. But if there is no certificate stored in
the file /usr
On Thu, 27 Sep 2001, Phil Stracchino wrote:
> I have finally managed to isolate this down to the following: For SSH2
> DSA and RSA keys, the OpenSSL PEM_read_PrivateKey() macro, called from
> authfile.c line 448:
>
> pk = PEM_read_PrivateKey(fp, NULL, NULL, (char *)passphrase);
>
> is
Quite odd, on another Linux, the tests go through with no problem:
Linux levitte 2.2.14-5.0 #1 Tue Mar 7 21:07:39 EST 2000 i686 unknown
The only other difference I can think of is that on the failing
machine, the gcc version is 3.0.2 while on the machine that works it
is egcs-2.91.66 (!?!).
--
Latest snapshot, the test suite ends with this:
testing session-id conversions
p -> d
p -> p
d -> d
make[1]: *** [test_sid] Error 1
make[1]: Leaving directory `/home/levitte/cvswork/dev.openssl.org/openssl/openssl/test'
make: *** [tests] Error 2
I run tsid manually, and get this:
: ; sh -x ./t
Forgot: the platform is (uname -a):
Linux lapdog 2.2.19 #1 Wed Jul 25 09:07:55 CEST 2001 i686 unknown
--
Richard Levitte \ Spannvägen 38, II \ [EMAIL PROTECTED]
Redakteur@Stacken \ S-168 35 BROMMA \ T: +46-8-26 52 47
\ SWEDEN \ or +46-733-72 88 11
Procurator
Title: Take Control Of Your Conference Calls
Long Distance
ConferencingOnly 18 Cents Per
Minute
Connects Up To 100 Participants!
No setup fees
No contracts or monthly fees
Call anytime, from anywhere, to anywhere
International Dial In 18
22 matches
Mail list logo