Hi,
I saw your email in a group and I thought that you might give me a
little help.
I tried to compile a program using Microsoft Visual C++ 6 but it says :
"fatal error C1601: unsupported inline assembly opcode.
which is generated for "movdqa xmm0, [esi]" instruction.
I have installed "Service
On Thu, Mar 11, 2004, Bommareddy, Satish (Satish) wrote:
> the oid is declared in the config file as
>
> [ new_oid ]
> avayaCPS=10.1.1
>
That is not a valid OID and it certainly doesn't belong to your organization.
Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSS
the oid is declared in the config file as
[ new_oid ]
avayaCPS=10.1.1
satish
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Dr. Stephen Henson
Sent: Thursday, March 11, 2004 6:38 AM
To: [EMAIL PROTECTED]
Subject: Re: your mail
On Wed, Mar 10, 2004, Bomma
[EMAIL PROTECTED] - Thu Mar 11 18:00:08 2004]:
> Hi Steve,
>
> thanks for the followup.
>
> On Thu, 11 Mar 2004 14:33:55 +0100 (MET), "Stephen Henson via RT" writes:
> >The flag X509_V_FLAG_CB_ISSUER_CHECK is not set by default and those
> >"error" conditions are not sent to the verify callback
I have been working on this problem a couple months now and
could really use some advice.
The problem basically manifests when you turn OpenSSL
caching on and the leak is very substantial – multiples of 8k, megabytes
per day.
I realize this could be mod_ssl misbehaving.
Does any
Hi Steve,
thanks for the followup.
On Thu, 11 Mar 2004 14:33:55 +0100 (MET), "Stephen Henson via RT" writes:
>The flag X509_V_FLAG_CB_ISSUER_CHECK is not set by default and those
>"error" conditions are not sent to the verify callback because they need
>special handling.
And in the case where t
On Wed, Mar 10, 2004, Bommareddy, Satish (Satish) wrote:
> Here is what i am trying to do...
>
> Config file has these lines:
> [ CA_default ]
> ..
> x509_extensions = usr_cert
>
> [ usr_cert ]
>
> basicConstraints=CA:FALSE
>
> keyUsage = digitalSignature, keyEncipherment
> subjectKeyIdent
[EMAIL PROTECTED] - Thu Mar 11 08:22:37 2004]:
>
>
> The patch below should be self explanitory, but just in case...
>
> There are several places where check_issued is called like:
>
> /* If we are self signed, we break */
> xn=X509_get_issuer_name(x);
>
Hi @ll,
a collegue and me began to implement SHA512 (currently not supported
under OpenSSL). During implementation
we found that there is a generic datastructure (md32common.h) which
deals with block handling for hashalgorithms.
As you all know are SHA512/SHA384 64bit wide and so they may cause