The MessageLabs Virus Control Centre discovered a possible
virus or unauthorised code (such as a joke program or trojan)
in an email sent by you.
Please read this whole email carefully. It explains what has
happened to your email, which suspected virus has been caught,
and what to do if you n
The MessageLabs Virus Control Centre discovered a possible
virus or unauthorised code (such as a joke program or trojan)
in an email sent by you.
Please read this whole email carefully. It explains what has
happened to your email, which suspected virus has been caught,
and what to do if you n
Destinatario, il sistema antivirus ha individuato un virus nel file allegato.
Date: Mon, 20 Aug 2001 08:58:35 +0200 (W. Europe Daylight Time)
Method: Mail
From: <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
<[EMAIL PROTECTED]>
File: Emanuel.exe
Action: clean failed - deleted
Virus
The file you have sent was infected with a virus but InterScan E-Mail VirusWall
could not clean it.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROT
This message was rejected by the mail hub at The University of
Birmingham (bham.ac.uk) because it has an apparently
executable attachment "Emanuel.exe".
The email rejected was not delivered to the following
recipients: [EMAIL PROTECTED]
Executable
Hi
>> Obviously I can't sign the request when I don't have the private key.
>> So the (maybe stupid) question is:
>> Is it at all possible somehow to make a PKCS#10 without a private key?
>Sorry maybe I'm stupid but why can't sign request ?
>Are you using RSA or memory smartcard ?
The problem i
On Fri, Aug 17, 2001 at 06:42:35PM +0200, Lutz Jaenicke wrote:
> > I first found them because I wanted my wrapping x509req.get_subject() to
> > exist even when x509req is destroyed, so therefore the rather odd "do I
> > need them?" question.
> Hmm, seems that *_dup() might fulfill your requiremen
I've just spent a while trying to figure out how to get a signed applet
using my own CA instead of thawte or verisign. I noticed there were lots
of questions I had on this list (like why keytool was saying "Input not an
X.509 certificate"), but no real answers.
Well, the whole process is now docu
Good job Lutz!
There is, however, one ambiguity. The paragraph:
If the peer already sent the "close notify" alert and it was already
processed implicitly inside another call of e.g. SSL_read(3)|SSL_read(3),
SSL_shutdown() will send the "close notify" alert, set the SSL_SENT_SHUTDOWN
flag and wil
Thanks for your kindly help!
BIO_get_close() and BIO_set_close() macros are dealing with the
"shutdown" field in BIO structure, but there aren't any example or function
calling these two functions.
Here are the questions,
What's the shutdown field meaning? And when is it used?
May I treat it
Hello,
I am trying to install ssldump 0.9b1 so that I can
trouble shoot a problem that I am having with openssl
0.9.6 on Solaris 8 . I have libpcap libpcap-0.6.1
installed in /usr/local/lib and the include files in
/usr/local/include:
catfish# ls -l /usr/local/lib/libpcap.a
-rw-r--r-- 1 bin
As quoted from several sources by Simon Tatham:
"PuTTY also does not support DSA for user authentication keys, for security
reasons."
What security issues is he referring to?
Ken
__
Support
InterSoft International, Inc.
Voice: 888-823-1541, I
On Sun, Aug 19, 2001 at 02:26:24PM -0500, Amos Gouaux wrote:
> As it happens, I too am trying to get SSL/TLS going with latest
> cyrus-imapd. Though, in my case I'm trying to use a Verisign cert.
> At this point I'm just trying to figure out what I need to do next.
>
> I have the server key file
On Sun, Aug 19, 2001 at 10:27:52AM -0700, chirs charter wrote:
> Thanks for your replay Lutz. I do have a /dev/unrandom
> though which is a link to /dev/random and I see a
> prescence of a /.rnd file doesnt this mean that
> openssl is starting up correctly ? Also can you tell
The link does help f
As it happens, I too am trying to get SSL/TLS going with latest
cyrus-imapd. Though, in my case I'm trying to use a Verisign cert.
At this point I'm just trying to figure out what I need to do next.
I have the server key file in pem format defined, the cert I got
back from Verisign, and the vsig
Thanks for your replay Lutz. I do have a /dev/unrandom
though which is a link to /dev/random and I see a
prescence of a /.rnd file doesnt this mean that
openssl is starting up correctly ? Also can you tell
me how to add add RAND_egd("/path/to/egd-socket"); to
the beginning of an application in my
On Sun, Aug 19, 2001 at 10:18:54AM +0100, Miles Sabin wrote:
> I think it needs a tweak tho'. You don't say how the shutdown state
> bitmask can be read. I think you should, because a grep through the
> example sources would suggest that you get it by grubbing around
> directly in the SSL struc
Lutz Jaenicke wrote,
> During the last week I have rewritten the manual page for
> SSL_shutdown(), please use the online version or download a snapshot
> of OpeSSL to obtain it. It probably contains the answer to your
> question.
The new man page is a huge improvement ... thanks.
I think it n
On Sat, Aug 18, 2001 at 05:20:59PM -0700, Erik Wright wrote:
> Hello, I'm using an SSL created with BIO_new_ssl_connect.
>
> I set the connect BIO to non-blocking, and I've also set the
> SSL_get_rbio() and SSL_get_wbio() BIO's to non-blocking.
>
> (I don't think I actually need to do that - cor
On Sat, Aug 18, 2001 at 10:01:05PM -0700, chirs charter wrote:
> I am using openssl-0.9.6 on a Solaris box. I am
> currently using a temporary self signed certificate.
> The OS is Solaris 8. For /dev/random I have installed
> ANDIrand(http://www.cosy.sbg.ac.at/~andi/) and I have
> also installed P
From: "GnuWin32" <[EMAIL PROTECTED]>
gnuwin32> No, I did not have to change the sources, only some other files.
gnuwin32> In util\pl\mingw32.pl I added the option -fnative-struct to CFLAGS, and
gnuwin32> changed $rm='rem' to $rm='rm' and $mkdir='gmkdir' to $mkdir='mkdir'.
gnuwin32> Also, the alar
21 matches
Mail list logo