Hello folks,
there seems to be a minor bug
in the pasword getter:
Bye
Goetz
Index: apps/apps.c
===
RCS file: /usr/cvsroot/openssl/apps/apps.c,v
retrieving revision 1.73
diff -u -r1.73 apps.c
--- apps/apps.c 2003/10/29 14:25:50
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
Hello Steve,
Stephen Henson via RT wrote:
> I've committed a fix to address this issue which will appear in the next
> dev and stable snapshot (i.e. so it will appear in 0.9.7a).
>
> Let me know of any problems ASAP.
I finally got around to do some quick tests.
Seems to be OK.
Could SSL_MODE_
Hello Steve,
Stephen Henson via RT wrote:
> [[EMAIL PROTECTED] - Mon Feb 10 20:02:40 2003]:
>>OK.
>>I should clarify myself:
>>It is to do it correctly, but not needed to fix the actual problem.
>>
>>>However option 4 easy to do and could be argued as being a "bug fix".
>>
>>OK.
>>
>>Perhaps som
Hello Steve,
Stephen Henson via RT wrote:
> [[EMAIL PROTECTED] - Mon Feb 10 16:53:48 2003]:
>>Stephen Henson via RT wrote:
>>
>>>[[EMAIL PROTECTED] - Fri Feb 7 14:09:28 2003]:
>>>It really needs replacing with something less horrible. For example it
>>>might:
>>>
>>>1. Build the chain using th
Hello Steve,
Stephen Henson via RT wrote:
> [[EMAIL PROTECTED] - Fri Feb 7 14:09:28 2003]:
>
>>But OpenSSL tries to complete the server CA list with the certificates
>>set in the client CA list.
>>
>>This can result in an invalid server CA list if the client CA list
>>contains a CA cert with a
According to RFC 2246 a server can omitt the root certificate:
[...]
certificate_list
This is a sequence (chain) of X.509v3 certificates. The sender's
certificate must come first in the list. Each following
certificate must directly certify the one preceding it. Becaus
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
Richard Levitte - VMS Whacker wrote:
>
> From: Jani Taskinen <[EMAIL PROTECTED]>
>
> sniper> >From CHANGES:
> sniper>
> sniper> *) Rename 'des_encrypt' to 'des_encrypt1'. This avoids the clashes
> sniper> with des_encrypt() defined on some operating systems, like Solaris
> s
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
"Götz Babin-Ebell via RT" wrote:
Oups.
It seems I didn't mention the OpenSSL version:
0.9.6c / 0.9.7 (snap from 28.05.2002)
Sorry...
> Hello folks,
>
> there seems to be a bug in pkcs12/p12_kiss.c:
>
> PKCS12_parse():
>
> if you enter the function
Hello folks,
there seems to be a bug in pkcs12/p12_kiss.c:
PKCS12_parse():
if you enter the function with an allocated
ca stack and the parse fails,
the ca stack will be deallocated and the pointer not cleared.
this is bad because the stack was external allocated and
ist normally would be the
14 matches
Mail list logo