On Sat, Mar 24, 2007, Marco Roeland wrote:
> On Saturday March 24th 2007 at 12:58 Harald Latzko wrote:
>
> > I compiled the 0.9.9 snapshot, resulting in a binary that has the
> > same behaviour (growing in RAM very much). Do you know how to enable
> > this experimental code and if this featur
> > I have Client/Server application using openSSSL.
> > Server spin-off threads to handle each client SSL connection.
> > I get the following memory leak report when I run valgrind.
> > I think I am shutting down/freeing all the memory correctly.
> [snip]
>
> These are empty stacks. It's not a le
> I have Client/Server application using openSSSL.
> Server spin-off threads to handle each client SSL connection.
> I get the following memory leak report when I run valgrind.
> I think I am shutting down/freeing all the memory correctly.
[snip]
These are empty stacks. It's not a leak because th
Hi All
I have Client/Server application using openSSSL. Server spin-off threads
to handle each client SSL connection. I get the following memory leak
report when I run valgrind. I think I am shutting down/freeing all the
memory correctly.
==4127== 4,344,913 bytes in 174,132 blocks are still reach
On Fri, Apr 13, 2007, Florian MANACH wrote:
> Hello Steve and thank you for the answer.
> You were right. I was linking with 0.9.7.
> I've just installed the 0.9.8e and unfortunately, the segfault still
> remain :
>
> Here is the new core dump :
>
Hello Steve and thank you for the answer.
You were right. I was linking with 0.9.7.
I've just installed the 0.9.8e and unfortunately, the segfault still
remain :
Here is the new core dump :
#0 0x400cd204 in EVP_CIPHER_nid () from
/usr/local/ssl
On Fri, Apr 13, 2007, Florian MANACH wrote:
> Hi,
>
> I'm trying to create a PKCS7 encryption software and I have some issues
> doing it.
>
> My call to the PKCS7_encrypt function leads to a segmentation fault.
> The core dump shows :
> --
You are right! I renamed the files and then c_rehash them. It seemed
that hash files were generated. And yes, I guess my *.crt files
actually already encoded in PEM format.
I am a newbie, and do not know much about CoSign. If you have
interest, you can check its website: www.weblogin.org :) This
Hi,
I'm trying to create a PKCS7 encryption software and I have some issues
doing it.
My call to the PKCS7_encrypt function leads to a segmentation fault.
The core dump shows :
-
(gdb) where
#0 0x400b7a0f in EVP_CIPHER_type (
There is a mistake in what I wrote :
if(!(out=BIO_new_file(ficDest,"rb"))) {
return -1;
}
is actually
if(!(out=BIO_new_file(ficDest,"wb"))) {
return -1;
}
Florian Manach
NUMLOG
[EMAIL PROTECTED]
(+33)0130791616
Florian MANACH a écrit :
Hi,
I'm trying to create a PKCS7 encryption soft
Buffalo Dickens schrieb:
Dear Ted, yes, I found that too. It just looks for *.pem files. I just
used the c_rehash from the source code package of openssl-0.9.8e. Is
it feasible for me to just rename file.crt to file.pem?
openssl usually does not rely on filenames or extensions, with only a
fe
Dear Ted, yes, I found that too. It just looks for *.pem files. I just
used the c_rehash from the source code package of openssl-0.9.8e. Is
it feasible for me to just rename file.crt to file.pem? Or is there an
appropriate and graceful method for this transformation?
Oh, I just want to deploy a s
Buffalo Dickens schrieb:
Thank you Ted! However, when I c_rehash the directory which contains
both ca.crt and server.crt, there seems to be no response. As a result
no hash.0 file is generated.
[EMAIL PROTECTED] tools]# ./c_rehash /path/to/certs/
Doing /path/to/certs/
[EMAIL PROTECTED] tools]# l
Thank you Ted! However, when I c_rehash the directory which contains
both ca.crt and server.crt, there seems to be no response. As a result
no hash.0 file is generated.
[EMAIL PROTECTED] tools]# ./c_rehash /path/to/certs/
Doing /path/to/certs/
[EMAIL PROTECTED] tools]# ls /path/to/certs/
ca.crt
14 matches
Mail list logo