Bonjour,
Hodie pr. Non. Mar. MMVII est, WCR scripsit:
Your comments have been very helpful.
I've had a look at the SOAP/XMLDSIG documentation and realise, as you
suggested that I must normalize / canonicalize the data between the tags
soapenv:Body Id=MsgBody and /soapenv:Body before
Hi Erwann
I've tried to download the Windows binaries but it bounces.
http://xmlsoft.org/sources/win32/
David
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Erwann ABALEA
Sent: 06 March 2007 13:37
To: openssl-users@openssl.org
Subject: Re:
Just to add to the list below:
OpenSSL version
OpenSSL 0.9.8b 04 May 2006
OpenSSL prime 2
2 is prime
Bob Richardson
Allina Hospitals and Clinics
Minneapolis MN
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Victor Duchovni
Sent: Monday, March 05, 2007
Hello,
Just to add to the list below:
OpenSSL version
OpenSSL 0.9.8b 04 May 2006
OpenSSL prime 2
2 is prime
To be sure we should use another library:
$ cat gmp5.c
#include stdio.h
#include gmp.h
int main()
{
mpz_t t;
int rc;
mpz_init_set_str(t, 2, 10);
To be sure we should use another library:
$ cat gmp5.c
#include stdio.h
#include gmp.h
...
To be sure one needs to go back to the mathematical definition of what is a
prime.
To use a program as proof is really not a proof. What you have proven is that
GMP is correct in determining that 2 is
Hello all,
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager [EMAIL PROTECTED]
Hello all,
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager [EMAIL PROTECTED]
hello all,
I have ported the latest openssl to ecos. I am trying to figure out why I get
SSL Session ID Callback Failed:ssl_sess.c 232 when the sll_accept takes a new
connection. Any ideas on debugging this would be helpful.
Steve
Hello,
To be sure we should use another library:
$ cat gmp5.c
#include stdio.h
#include gmp.h
...
To be sure one needs to go back to the mathematical definition of what is a
prime.
To use a program as proof is really not a proof. What you have proven is that
GMP is correct in
Hello,
I have ported the latest openssl to ecos. I am trying to figure out why I get
SSL Session ID Callback Failed:ssl_sess.c 232 when the sll_accept takes a new
connection. Any ideas on debugging this would be helpful.
Maybe you have problem with Random Number Generator.
Depending on
On Mon, 5 Mar 2007, [EMAIL PROTECTED] wrote:
Hi,
$ openssl version
OpenSSL 0.9.7f 22 Mar 2005
$ openssl prime 2
2 is not prime
But.. 2 is prime right?
correct. but its the only even prime number - hence its an odd prime number!
;-)
perhaps this fact/quirk is why its not known as prime?
Hi all
I have Client-Server application. The requirement is every peer must
load peer'sTrust Access List the public key for any component that will
connect to. What is the best way to do that ?? Using
SSL_CTX_set_default_verify_paths , SSL_CTX_load_verify_locations,...???
Do I have to use
Are CRYPTO_set_locking_callback() and CRYPTO_set_id_callback()
required in a multi-threaded application that only encrypts and
decrypts with symmetric ciphers...
...and performs no other SSL functions...???
I am using openssl 0.9.7g.
The platform is AIX (IBM's UNIX).
Here are the
To add to the list:
openssl version
OpenSSL 0.9.7m-fips 23 Feb 2007
openssl prime 2
2 is not prime
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
Hi,
I am trying to write a client/server application using the OpenSSL
support for DTLS and I have a problem with the server validating the
certificate of the client. I have my own function that does the
validation - it compares the *physical* hostname/IP address of the
client with the Common
On Wed, Mar 07, 2007 at 02:28:33AM +0100, Vladislav Marinov wrote:
I am trying to write a client/server application using the OpenSSL
support for DTLS and I have a problem with the server validating the
certificate of the client.
Unless the server solicited the client connection, and was
Victor Duchovni wrote:
On Wed, Mar 07, 2007 at 02:28:33AM +0100, Vladislav Marinov wrote:
I am trying to write a client/server application using the OpenSSL
support for DTLS and I have a problem with the server validating the
certificate of the client.
Unless the server solicited
On Wed, Mar 07, 2007 at 03:34:31AM +0100, Vladislav Marinov wrote:
Unless the server solicited the client connection, and was expecting
a connecting from a *given* client, it typically makes to sense to tie
the client credentials to the client's IP address, rather if you have
a client
Hi again,
As my security experience is not very broad I think that as you properly
pointed I was confused by the security model. From your words I see
that only client X can present a certificate that belongs to client X.
Why? X.509 certificate simply ties an identity (DNS name for ex.) to a
On Wed, Mar 07, 2007 at 04:24:34AM +0100, Vladislav Marinov wrote:
As my security experience is not very broad I think that as you properly
pointed I was confused by the security model. From your words I see
that only client X can present a certificate that belongs to client X.
Client
Hi,
Sorry for bothering for a second time today. I have a problem with
session resumption in OpenSSL TLS.
Initially, I set up a session between the TLS client and the TLS server. Then on
the client side I save the session, close the SSL connection, close the
TCP connection, establish a new TCP
Hello,
I am posting it with some corrections
I am using openssl 0.9.8a with SSL support.
When I call SSL_CTX_free() when we close HTTP Session the openssl stack
causes segmentation fault.
in crypto/stack/stack.c in function sk_pop_free() the ht-num has some
junk value which causes the
22 matches
Mail list logo