Re: openssh 2.2.0p1 fails with openssl 0.9.6-beta1

2000-09-14 Thread Richard Levitte - VMS Whacker
From: Lutz Jaenicke <[EMAIL PROTECTED]> Lutz.Jaenicke> I did some more experiments and also saw the problems. Lutz.Jaenicke> Lutz.Jaenicke> They occur when using a 0.9.6-beta client to connect to Lutz.Jaenicke> 0.9.5a and 0.9.6-beta servers. Lutz.Jaenicke> They also occur when using a 0.9.5a cli

Re: Another confusing compile-time error

2000-09-14 Thread Richard Levitte - VMS Whacker
From: "Watson, Scott E" <[EMAIL PROTECTED]> scott.watson> > make install scott.watson> scott.watson> I get the following results: [...] scott.watson> making all in tools... scott.watson> Cannot create directory /usr/local/ssl: Permission denied scott.watson> *** Error code 13 scott.watson> make:

Re: Stunnel not flushing data (fix ???)

2000-09-14 Thread Bruce J. Keeler
> "Ben" == Ben Laurie <[EMAIL PROTECTED]> writes: Ben> [EMAIL PROTECTED] wrote: >> > See my state_machine demo for a main loop that should work... if >> > it doesn't, I'd like to know about it... >> >> Which is where? Couldn't find it in OpenSSL-0.9.5a. Ben> Its in the snapshots, and in 0.9.

Re: Memory leak in SSL_CTX_new / SSL_CTX_free thru a call to CRYPTO_get_ex_new_index()

2000-09-14 Thread Martin Skinner
Thank you for the informative answer. Since MS VC++ and boundschecker notices these leaks, it would be nice to have a "cleanup" routine which could be called at the end of the app. - Martin - Original Message - From: "Richard Levitte - VMS Whacker" <[EMAIL PROTECTED]> To: <[EMAIL PROTEC

Re: Memory leak in SSL_CTX_new / SSL_CTX_free thru a call to CRYPTO_get_ex_new_index()

2000-09-14 Thread Richard Levitte - VMS Whacker
From: "Martin Skinner" <[EMAIL PROTECTED]> N8Schwaermer> Thank you for the informative answer. YW N8Schwaermer> Since MS VC++ and boundschecker notices these leaks, it N8Schwaermer> would be nice to have a "cleanup" routine which could be N8Schwaermer> called at the end of the app. I've been t

Using block device

2000-09-14 Thread Julio Cesar de Melhado e Lima
Hi I've installed OpenSSL, and I want to use "/dev/random" device as source of unpredictable data. But "/dev/random" is a blocking device source. Can I configure OpenSSL to work with a blocking device source ? I'm using : OpenSSL 0.9.5 Solaris SunOS 5.8 Thanks for all.

Import Export Restrictions

2000-09-14 Thread Leon Manny-fml001
If I am using SSL 128 Bit Encryption considered "retail" encryption by the federal government? We desire to use it in an application where encrypted data is transported from a ASP in the USA to Mexico and back, however we are unsure of the legal implications can you please help or send us to some

Re: Import Export Restrictions

2000-09-14 Thread Jeffrey Altman
> If I am using SSL 128 Bit Encryption considered "retail" encryption by the > federal government? > We desire to use it in an application where encrypted data is transported > from a ASP in the USA to Mexico and back, however we are unsure of the legal > implications can you please help or send

make test failed on IA-64 machine

2000-09-14 Thread Norman Nie
Hi there, I was compiling a 64-bit OpenSSL(0.9.5a) with BSAFE Crypto-C on a IA-64 machine running HPUX. I used a patch file supplied by Mark Bixby that enables OpenSSL to call BSAFE Crypto-C funtions. The compilation went on fine, no errors. But when I do a make test, it failed on the BN_mod_m

Re: make test failed on IA-64 machine

2000-09-14 Thread Allan Borr
I'm not sure what help this might be, but I had similar results using the "gcc" compiler on 32 bit hpux. I needed to remove the compiler optimization flag to get it to pass the bn test suite. Al Borr - Original Message - From: Norman Nie <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Se

content and data present

2000-09-14 Thread Sean Walker
I'm working with some data generated by a program that I have no control over. I am trying to verify a pkcs7 signature generated by it. Could someone take a look at the data I have and tell me what utilities I should use to accomplish this? I've never had to deal with this type of data before. The

SSL23_Get_Server_Hello - Unknown protocol

2000-09-14 Thread Bill Browning
Hi! I'm having an interesting problem porting some code from an NT box to Solaris. I get the following error while trying to connect my client to the server: error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown protocol Func: SSL23_GET_SERVER_HELLO lib: SSL routines Reason: unknown

Re: content and data present

2000-09-14 Thread Dr S N Henson
Sean Walker wrote: > > I'm working with some data generated by a program that I have no control > over. I am trying to verify a pkcs7 signature generated by it. Could someone > take a look at the data I have and tell me what utilities I should use to > accomplish this? I've never had to deal with

Re: SSLv2_method and SSLv23_method

2000-09-14 Thread Michael Lee
Bodo Moeller wrote: > Note that SSLv2_method will fail for some servers because they > no longer support SSL 2.0 (and stopping to support it is a good > thing because of its deficiencies). I suggest using > SSLv23_method without SSL_OP_NO_TLSv1 in a first connection attempt; > if this fails, try

Re: SSLv2_method and SSLv23_method

2000-09-14 Thread Bodo Moeller
On Fri, Sep 15, 2000 at 09:22:24AM +0800, Michael Lee wrote: > Bodo Moeller wrote: >> Note that SSLv2_method will fail for some servers because they >> no longer support SSL 2.0 (and stopping to support it is a good >> thing because of its deficiencies). I suggest using >> SSLv23_method without

Re: Serious Bug in ssl3_get_record

2000-09-14 Thread Michael Lee
Bodo Moeller wrote: > On Thu, Sep 14, 2000 at 10:52:29AM +0800, Fung wrote: > >>> Have you tried using the SSLv23_method() instead of the SSLv3_method()? > >> But I know SSLv23_method has bugs at this version 0.9.5a. > > Can you elaborate? I think what he meant is that in some cases SSLv23_metho

Self-signed root certificate

2000-09-14 Thread Gary Taylor
Hello, On a server that I support there are three SSL certificate related files. One of them I'm trying to understand the need for and how it relates to self signed CA's that I generate for testing using Openssl. The three files have explanations for them in the documentation as follows: ca.pem