In message <17A8F299EFD84F899C35E7D0DF885A3A@Unimatrix1> on Wed, 18 May 2016
23:25:12 -0400, "Michael Steve" said:
msteve> I want to better understand the rationale behind requiring MMS and
msteve> Perl for the 1.1.0 builds by the VMS community. If multiple “someones”
msteve> from this community
I want to better understand the rationale behind requiring MMS and Perl for the
1.1.0 builds by the VMS community. If multiple “someones” from this community
can explain this to me, it would be most appreciated.
Michael Steve
Software Developer--
openssl-dev mailing list
To unsubscribe: https:/
Considering we've now solved all the binary vs non-binary issues and know how
to do that at open(2) level where it's relevant, adding O_EXCL shouldn't be
much of a problem any more. This should, however, not be done on file systems
that support file generations (VMS, and...?)
Cheers,
Richard
On S
This has now been added to the master and 1.0.2 branches.
Thank you.
Closing ticket
On Mon Mar 12 23:31:30 2007, open...@roumenpetrov.info wrote:
> RFC 2254 : The String Representation of LDAP Search Filters
>
> This patch add support for rfc2254 escaping.
>
> With patched source method
> ASN1_S
pull the latest version from the snapshot. fixed in next release by shipping
new certs.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4542
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/o
I think the goal of this ticket can be better addressed by using a
hardware token (that cost ballpark $40 retail) and libp11 (aka pkcs11
engine). Similar results with much better security.
--
Regards,
Uri Blumenthal
On 5/18/16, 6:31 , "openssl-dev on behalf of Matt Caswell via RT"
wrote:
>A
Hi,
when running "make test_cms" on linux x86_64 I get test failures early in the
process:
The contents of cms.err conclude with the phrase: "Verify error: certificate
has expired".
Checking smroot.pem with openssl x509 -in smroot.pem -dates I get:
notBefore=Feb 22 2008 GMT
notAtfer
The master version of the ts utility now supports the full set of verification
options including the -attime option which can set the verification time.
Ticket resolved.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.o
keeping open, for non-technical reasons.
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=1518
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
I can't reproduce this on latest master, so I am assuming it has been fixed.
Closing ticket.
Matt
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4352
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailma
The associated github PR was merged so closing this ticket.
Matt
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4179
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Looks like padlock has this. Closing
Matt
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2291
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
This issue has been discussed a number of times, but will not be fixed at this
time.
Closing
Matt
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2146
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailma
I can't reproduce this, and it looks like Steve couldn't either at the time.
Closing.
Matt
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2037
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listi
After 9 years looks like there is no support for this patch (and it will not
apply now anyway). I'd suggest if anyone does support this then a new patch be
submitted via GitHub.
Closing this ticket.
Matt
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=1518
Please log in as guest wi
This seems to have been fixed at some point. Closing.
Matt
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=1919
Please log in as guest with password guest if prompted
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Hi,
We have successfully been using the CAPI engine to provide OpenSSL client
cert authentication in environments where Windows Cryptographic Service
Providers (CSP) are used for private key storage.
But we also have a few environments that have migrated from CSP to a Windows
Key Storage Provid
This appears to be a usage problem where the library is not being de-inited
properly. This should be resolved anyway in 1.1.0 with auto-deinit.
Closing ticket.
Matt
--
Ticket here: http://rt.openssl.org/Ticket/Display.html?id=2363
Please log in as guest with password guest if prompted
--
open
18 matches
Mail list logo