InternetSeer Error Alert

2001-11-20 Thread InternetSeer
Title: InternetSeer - First On Error Alert First On Error Alert Your Web site is on error URL: http://www.openssl.org/support/Time: Tue Nov 20 07:20:43 EST 2001, EST Error Type: Connection Refused

Re: Creating PEM file from peer cert

2001-11-20 Thread Lutz Jaenicke
On Mon, Nov 19, 2001 at 11:56:05PM -0800, ct l wrote: During peer cert verification stage, I need to store the peer cert info in PEM file format for future reference. May I know: Based on info in ssl-cert, what fields and how should I arrange the fields so that I can store the peer cert

InternetSeer Second Error Alert

2001-11-20 Thread InternetSeer
Title: InternetSeer - Second On Error Alert Second On Error Alert Your Web site is on error URL: http://www.openssl.org/support/Time: Tue Nov 20 08:05:44 EST 2001, EST Error Type: Connection Refused

Re: session reuse from client side

2001-11-20 Thread Lutz Jaenicke
On Tue, Nov 20, 2001 at 06:09:04PM +0200, Arne Ansper wrote: we have a client program that uses external session database for session caching. we have found a bug in client side session caching. or actually a missing functionality. after decoding stored session using d2i function the cipher

RAND_status() returns to few info.

2001-11-20 Thread Götz Babin-Ebell
Hello, is there a way to ask the random engine about how much randomness it contains ? RAND_status() returns 1 if the random pool contains at least 20 bytes (ENTROPY_NEEDED in rand_lcl.h). That is OK for SSL handshake, but for asymetric key generation we need a lot of more entropy. Something

Re: RAND_status() returns to few info.

2001-11-20 Thread Richard Levitte - VMS Whacker
From: Götz Babin-Ebell [EMAIL PROTECTED] babinebell is there a way to ask the random engine about how much randomness babinebell it contains ? babinebell RAND_status() returns 1 if the random pool contains at least babinebell 20 bytes (ENTROPY_NEEDED in rand_lcl.h). babinebell babinebell That

InternetSeer Recovery

2001-11-20 Thread InternetSeer
Title: InternetSeer - Recovery Alert Recovery AlertYour Web site is off errorURL: http://www.openssl.org/support/Time: Tue Nov 20 14:41:42 EST 2001, ESTTotal Time on error: 7 hours, 21 minutes, 53 secondsLogin and view your current Web site's performance report athttp://www.internetseer.com. If

Re: RAND_status() returns to few info.

2001-11-20 Thread Allen Smith
On Nov 20, 3:03pm, Richard Levitte - VMS Whacker wrote: From: Gotz Babin-Ebell [EMAIL PROTECTED] babinebell is there a way to ask the random engine about how much babinebell randomness it contains ? RAND_status() returns 1 if the babinebell random pool contains at least 20 bytes

EVENTO LINUX WEEK (SEMANA DE LINUX)

2001-11-20 Thread Sistemas UNI
EVENTO LINUX WEEK (SEMANA DE LINUX)-UNI La facultad de ingenieria industrial y de sistemas asi como el centro cultural de avanzada tecnológica CCAT presenta el evento LINUX - WEEK Fecha: 22, 23 y 24 de Noviembre Lugar: Auditorios de la fac. de sistemas de la UNI ) Temas: 1er Dia: - Introduccion

Threads support in debian-* targets.

2001-11-20 Thread Andres Seco Hernandez
Hi I maintain the Kannel package (a wap gateway with ssl support) in Debian. Kannel with ssl support uses openssl, but it needs threads support too. As Debian tries to be ported to a lot of architectures, i see that openssl in some Debian architectures is not thread enabled: powerpc mips

Re: Creating PEM file from peer cert

2001-11-20 Thread ct l
Thanks much, Lutz. Do not access members of the SSL object (ssl-...) directly, as these structures may change. Please use the offical API SSL_get_peer_certificate(), SSL_get_peer_cert_chain() to obtain the X509 objects. You can then simply write them to file using the

Re: RAND_status() returns to few info.

2001-11-20 Thread Richard Levitte - VMS Whacker
From: Allen Smith [EMAIL PROTECTED] easmith The 20 bytes minimum is the needed amount of seeding to get secure easmith enough random numbers from the pool. Each time you fetch random easmith bytes, the pool is remixed, thus providing for more random bytes. easmith easmith However, it would

Re: Threads support in debian-* targets.

2001-11-20 Thread Richard Levitte - VMS Whacker
From: Andres Seco Hernandez [EMAIL PROTECTED] AndresSH powerpc AndresSH mips AndresSH mipsel AndresSH arm AndresSH sparc AndresSH alpha AndresSH AndresSH When the openssl set of packages in Debian is being built, these AndresSH architectures have no threads support enabled. AndresSH AndresSH

Re: Creating PEM file from peer cert

2001-11-20 Thread ct l
I composed a reply w/ questions early today, but still not shown on web. So I doubt the msg got lost. Sorry if the msg repeated. Thanks much, Lutz. Do not access members of the SSL object (ssl-...) directly, as these structures may change. Please use the offical API

Re: X509_STORE_get_by_subject

2001-11-20 Thread Dr S N Henson
Ben Laurie wrote: Ben Laurie wrote: francoise lacambre wrote: Don't you think, in the X509_STORE_get_by_subject function, that the following line vs-current_method=j; would be replaced by :

Re: X509_STORE_get_by_subject

2001-11-20 Thread Ben Laurie
Ben Laurie wrote: francoise lacambre wrote: Don't you think, in the X509_STORE_get_by_subject function, that the following line vs-current_method=j; would be replaced by : vs-current_method=i; Yes! Hmm ... still

is there any ssl opensource implemented using cdsa available?

2001-11-20 Thread raju
Hi all, is there any ssl opensource implemented using cdsa available? thanks in advance Rajulu Ponnada __ OpenSSL Project

RE: is there any ssl opensource implemented using cdsa available?

2001-11-20 Thread Prashant Kumar
I saw a paper on Intel or IBM website where they have explained few facts about integrating OpenSsl in CDSA. Also I think some effort is in progress. -Original Message- From: raju [mailto:[EMAIL PROTECTED]] Sent: Tuesday, November 20, 2001 7:06 AM To: [EMAIL PROTECTED] Cc: [EMAIL

session reuse from client side

2001-11-20 Thread Arne Ansper
hi! we have a client program that uses external session database for session caching. we have found a bug in client side session caching. or actually a missing functionality. after decoding stored session using d2i function the cipher parameter of SSL_SESSION structure is zero. on server side