On Fri, 12 Jun 2009 10:30:21 +1000, "Jeremy Hunt"
said:
> > Yep, I just got a new copy this morning. openssl-0.9.7g in the
> > openssl download repository is bad and has been for some time.
> > There's a bad link in test/fips-aesdata, missing file in
> > crypto/fips/aes, IIRC.
> >
> I just resurr
This looks like you're trying to use a library compiled for
multithreading without providing it the address of a lock or unlock
function.
This is, incidentally, programmer FAQ #1, readable at
http://openssl.org/support/faq.html#PROG1 .
-Kyle H
On Thu, Jun 11, 2009 at 8:56 AM, Neil Youngman wrote
On Fri, 12 Jun 2009 09:06:47 +1000, "Jeremy Hunt"
said:
> Paul Rogers wrote:
> > the patchfile. But I found a bad link in test/fips-aesdata, so I'm
> > going after a fresh tarball now.
> >
> Yeah, it looks like you have a bad copy with missing bits.
> Did you get your copy from http://www.open
Hi All
If neither the client application nor the server application is
calling SSL_renegotiate(), can SSL Renegotiation get triggered on its
own? am using non-blocking socket directly. I am not using any BIO
for Socket I/O.
--Satish
___
I'm certainly not that familiar enough with perl to generate that
script. However, I think the real issue is with Configure. It should
not force the -march=i486 as part of the fixed script, but rather have
it as on option or take the information from CFLAGS or CXXFLAGS as
appropriate.
Carter
Ca
On Thu, Jun 11, 2009 at 08:49:54AM -0700, Paul Rogers wrote:
> On Thu, 11 Jun 2009 09:00:21 -0400, "Carter Browne"
> said:
> > I'm not a perl monger either. I just changed the Linux-elf entry to
> > -march=x or -mtune=x for the more recent versions of gcc. That worked
> > without any problems f
I've got some crashes happening in i2d_X509_CINF(). I've manged to generate
the valgrind trace below indicating where it's happening, but it's not yet
obvious to me why it should happen. It's in some code that's been stable for
ages (hence 0.9.6b) but there seems to be a rare situation in which
On Thu, 11 Jun 2009 09:00:21 -0400, "Carter Browne"
said:
> I'm not a perl monger either. I just changed the Linux-elf entry to
> -march=x or -mtune=x for the more recent versions of gcc. That worked
> without any problems for me.
That was my first thought. If you saw my response to Kyle fly p
Hi everyone,
I created a version 2 CRL, which has the CRL Serial extension set and
now I have to extract the serial number from the CRL to compare it.
I already got as far as extracting the CRL extension by NID. But now
extracting the actual value from the extension is unclear to me. The
he
Hi,
I've seen some mails concerning this topic but they still haven't answered
my questions. I'm writing an application which uses openssl code.
What I need to do is:
1) Receive one DER ASN.1 object encoded as a base64 encoded string.
This string may hold 1 - n extension(s) of unknown kind, i.e.
I'm not a perl monger either. I just changed the Linux-elf entry to
-march=x or -mtune=x for the more recent versions of gcc. That worked
without any problems for me.
Carter
Carter Browne
CBCS
cbro...@cbcs-usa.com
781-721-2890
Paul Rogers wrote:
> On Wed, 10 Jun 2009 13:17:48 -0400, "Carter
I'm experimenting with 1.0.0-beta2 and it appears to me that
SSL_CTX_set_verify_depth
has no effect. This function is supposed to set the maximum depth of the
certificate chain that's sent by the peer.
It appears to work with 0.9.8g though.
I tried to do some debugging and found out that there
:-)
On Thu, Jun 11, 2009 at 4:02 AM, Erwann
ABALEA wrote:
> Hodie IV Id. Iun. MMIX, Satish Chandra Kilaru scripsit:
>> I found relevant information in RFC 3280. I recommend referring to
>> that RFC for any questions like mine.
>> http://www.ietf.org/rfc/rfc3280.txt
>
> Switch to RFC5280, which obs
./Configure --prefix=/usr --openssldir=/etc/ssl shared os/compiler:"gcc
-march=i386" -lnsl -lsocket\
2>&1 | tee log.conf && exit $PIPESTATUS) &&
I have found the best way to pass non-std gcc flags is to set the
os/compiler to "gcc -flags". In this case -lnsl and -lsocket are not set
by defau
hello,
how we change the data we want to encode to the point in the
ecliptic ? thank you
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@opens
Hodie IV Id. Iun. MMIX, Satish Chandra Kilaru scripsit:
> I found relevant information in RFC 3280. I recommend referring to
> that RFC for any questions like mine.
> http://www.ietf.org/rfc/rfc3280.txt
Switch to RFC5280, which obsoleted RFC3280 more than one year ago.
--
Erwann ABALEA
-
Ai
16 matches
Mail list logo