ssl-users
> wrote:
>
> From: James <mailto:openssl-us...@natsuki.co.uk>
> To: mailto:openssl-users@openssl.org
> Subject: Re: Certificate verification with cross signed CAs
> Message-ID: <mailto:c457519e-e386-4df8-84ec-9efb7a0f9...@natsuki.co.uk>
> Content-Type: t
The certificates are attached below.The use case is client A only has ta_primary_cert.pem and client B only has ta_secondary_cert.pemI’m trying to build a chain that the server can use (in the server hello) so that both client A and client B can successfully connect.Since openssl verify -trusted ta
ed rootb.pem -untrusted ca.pem -untrusted alt_ca.pem
server.pem (FAIL: error 20 at 1 depth lookup: unable to get local issuer
certificate)
Is there a mechanism to support both ca.pem and alt_ca.pem without knowing
which root the client has?
Many thanks
James
ere another API/functions I should
be using? Are there hooks for being able to influence the messages between
server hello and server hello done?
or is there a patch... that already adds this?
Many thanks
James
rmat was it sent you? Do you want just the bytes of the public
EC point?
-James M
penssl.org, seems to work as normal.
-James M
As I mentioned in an earlier post you need version 1.1 or later of openssl
to successfully validate post September 30, 2021 Lets Encrypt certificates.
The version on your Centos system is 1.0.
On 3 September 2022 19:26:50 Shawn Heisey via openssl-users
wrote:
On 9/2/22 21:42, Shawn Heisey via openssl-users wrote:
Other bare metal systems and their results with the same PEM file:
Verifies on Proxmox (the one running the VM) with openssl 1.1.1n
Verifies on Ubuntu 22.04 with ope
On 3 September 2022 19:26:50 Shawn Heisey via openssl-users
wrote:
On 9/2/22 21:42, Shawn Heisey via openssl-users wrote:
Other bare metal systems and their results with the same PEM file:
Verifies on Proxmox (the one running the VM) with openssl 1.1.1n
Verifies on Ubuntu 22.04 with opens
Hi Matt,
What would it take to expose this?
Also would you accept a patch if we implement what’s missing?
Thank You
James
On 6/20/22, 10:13 AM, "Matt Caswell" wrote:
On 20/06/2022 15:11, Rouzier, James via openssl-users wrote:
> Hey Guys,
>
> Is it po
state of the TLS handshake so that any server
can pickup where the previous server left off.
Is this possible with the current API of openssl?
James
there's anything I'm missing something
important, but I at least wanted to voice my support for getting #8797
landed.
Thank you,
James M Snell, jasn...@gmail.com
Hello,
I am working on a Solaris 11.4 x86 64bit virtual server. There are no specific
applications loaded on it yet. I am preparing it to be a BIND server
eventually.
To that end, I downloaded and installed OpenSSL 1.1.1b so I have the latest and
greatest to work with.
The installation seem
)
Result: FAIL
make[1]: *** [_tests] Error 1
make: *** [tests] Error 2
I first ran:
./Configure --prefix=/usr/local shared darwin64-x86_64-cc
enable-ec_nistp_64_gcc_128 no-ssl2 no-ssl3
then
make depend
then: make test
macOS X 10.7.5
Any suggestions?
Thanks,
James.--
openssl-users mailing
Hi,
I have a `Certificates.p12` file that I wish to convert to a
`certificates.pem` containing an unencrypted private key in PKCS#1 format.
I have previously been able to do this by running:
openssl pkcs12 -in Certificates.p12 -out certificates.pem -nodes
-clcerts
The resulting `certificates
_conf.h.in exists? It should,
it's part of the source. Can you check if there's a file with a similar name
in crypto\include\internal?
Cheers,
Richard ( am wondering if there are tar implementations that screw up file name
with more than one period... )
In message
on Mon, 1 May
lines.
From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of
Benjamin Kaduk via openssl-users
Sent: Monday, May 1, 2017 11:38 AM
To: openssl-users@openssl.org
Subject: Re: [openssl-users] NMAKE error
On 05/01/2017 10:02 AM, James Condren wrote:
Getting the following error
Getting the following error when attempting to make:
NMAKE : fatal error U1073: don't know how to make
'"crypto\include\internal\bn_conf.h.in"'
Stop.
Here's the lines from the makefile that are creating the error:
crypto\include\internal\bn_conf.h: "crypto\include\internal\bn_conf.h.in"
"configd
Thanks to all persons who have provided the expertise with my problem of
missing header file. One suggestion was to step down a version to 1.0.2k. This
has worked configure, make, make test and make install all executed and
installed.
James Carter PhD
ES34 Bldg 4487 Rm B117
Optics & Ima
,
/usr/include /opt/SUNWSpro/prod/include/CC/std
/opt/SUNWSpro/prod/include/CC/stlport4
I found this file on GITHUB. Can it be downloaded and put in /usr/include or
/opt/SUNWspro/prod/CC/std.
Thank you for your assistance
James
James Carter PhD
ES34 Bldg 4487 Rm B117
Optics & Imaging Br
Hi,
I'm trying to build a rpm for openssl-1.0.1u on CentOS 7 x86_64. To get
the rpmbuild to run, I had to remove several comments in changelog, because
they weren't formatted correctly. The second problem I ran into is one
during the rpm staging:
The tail end of the output from rpmbuild -ba opens
Hi all,
I want to add two extension field in CLIENT HELLO request.
Extension: next protocol negotiation
Extension:application layer protocol negotiation
For that purpose which API/function of openssl I will call?
Thanks
Pranab
On Mon, Apr 18, 2016 at 6:16 PM, james sqawz wrote:
> Hi
ed chacha (c^)
>3. Unable to load/add a dynamic engine (danigrosu)
>4. Regarding TLS 1.3 (James)
>5. Re: Regarding TLS 1.3 (Matt Caswell)
>6. ssl connect failed (james sqawz)
>7. Re: ssl connect failed (danigrosu)
>
>
>
abscent in my ssl packet.
Extension: server name present
Extension:application layer protocol negotiation
Apart from that I did not set path of Server Certificate.
Shall these impact my connect request.
Can somebody help.
Thanks
James
--
openssl-users mailing list
To unsubscribe: https
Hi there,
In the below link I could see TLS 1.3 support will be added in future
releases
https://www.openssl.org/policies/roadmap.html
I think the support is not yet added. From when it will be added
regards,
James Arivazhagan Ponnusamy
--
openssl-users mailing list
To unsubscribe: https
Hi,
I always use like this
Hash ( salt + password )
You can use like this also
Hash ( hash(salt) + password )
regards,
James
On Tue, Apr 5, 2016 at 1:52 PM, Sugumar wrote:
> Hello,
>
> Ya you are correct James.
> But my doubt is what is the best method to hash the password securely
some commonly used
strings and kept in their DB, using this only they give the original string.
That is why we need to use a salt string along with your original string.
regards,
James
On Tue, Apr 5, 2016 at 11:44 AM, Sugumar wrote:
> Thanks for all the information provided. Really its v
https://www.openssl.org/docs/fipsnotes.html mentions the following:
As a result of the POST performance issue we revisited the KAT (Known
Answer Test) requirements in the POST process that were burning up most of
those cycle. In consultation with a CMVP test lab we determined that it shoul
recommendation at:
http://comments.gmane.org/gmane.comp.encryption.openssl.user/47242
and change the MAKEDEPPROG=makedepend to MAKEDEPPROG=$(CC) -M
?
Thanks,
James.
smime.p7s
Description: S/MIME cryptographic signature
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman
lid instruction mnemonic 'adcxq'
adcxq %rax,%r13
^
x86_64-mont.s:973:2: error: invalid instruction mnemonic 'adoxq'
adoxq %rbp,%r15
^
make[2]: *** [x86_64-mont.o] Error 1
make[1]: *** [subdirs] Error 1
make: *** [build_crypto] Error 1
This worked with 1.0.1 versions.
the LD_LIBRARY_PATH,
may result in compromising the security of the keys.
Does any of you faced this problem and if you could share the solution it
would be helpful.
regards,
James Arivazhagan Ponnusamy
___
openssl-users mailing list
To unsubscribe
level, or less serious/widespread. Currently a wide variety of
vulnerabilities are just indicated as “high” severity, which could mean
anything from a relatively minor DoS affecting 5 implementations to MITM
affecting all servers/browsers.
Thanks,
Hi there,
I would like to know whether OpenSSL supports TLS 1.3, if supported from
which version of OpenSSL the implementation started.
regards,
James Arivazhagan Ponnusamy
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman
in a position to use this
API.
May be you can try with the latest version of openssl with the POODLE fix.
regards,
James
On Tue, Apr 7, 2015 at 8:14 AM, Viktor Dukhovni
wrote:
> On Mon, Apr 06, 2015 at 05:11:22PM -0700, David Rueter wrote:
>
> > I would like to disable SSL3 (to pr
Hi,
Can you try this option
SSL_CTX_set_options(m_SslCtx, SSL_OP_NO_SSLv2|SSL_OP_NO_SSLv3);
instead of disabling using the cipher list
regards,
James Arivazhagan
On Tue, Apr 7, 2015 at 5:41 AM, David Rueter wrote:
> I would like to disable SSL3 (to prevent POODLE attacks), but I wo
((szData[3] == 0 && szData[4] < 5)
|| (szData[9] == szData[1])))
{
// SSLv3
nRet = 1;
}
}
}
return nRet;
}
On Sat, Apr 4, 2015 at 5:10 AM, James Cloos wrote:
> >>>>> "JR" == Joris Van Remoorte
>>>>> "JR" == Joris Van Remoortere writes:
JR> I would like to ask your opinion and advice on accepting HTTP / HTTPS
JR> connections on the same port.
IPP support both w/ and w/o tls on port 631.
Cups handles it like this:
http://www.pwg.org/archives/ipp/20
Hi,
Alternatively you can use the wireshark or tcpudmp to capture the packet
and decode the SSL - Client Hello and Sever Hello
That also may help to identify which protocol and cipher we use
regards,
James Arivazhagan Ponnusamy
On Sat, Nov 22, 2014 at 7:12 AM, Chris Bare wrote:
> Tha
Thank you to AirVPN and Paolo for stepping up !
jim
==
Jim McMurry
Milton Security Group
261 Imperial Highway Suite 550
Fullerton CA 92835
http://www.miltonsecurity.com
On Jul 2, 2014, at 6:00 AM, Steve Marquess
wrote:
> We have received a donation of US$1,327.00 f
Hi,
Do you use DTLS ?
it is secure mode of UDP transfer. If you are not using DTLS then you are
not vulnerable
regards,
James
On Mon, Jun 9, 2014 at 6:43 PM, Jaya Nageswar
wrote:
> Hi All,
>
> We are currently using openssl 0.9.8 h version in one of our components. I
> would like
list.
>
> Michael Wojcik
> Technology Specialist
> Micro Focus
>
> michael.woj...@microfocus.com
> 519 West Ash Street
> Mason, MI 48854-1553
> Direct:+1 517 639 0892
> Mobile : +1 517 862 9464
>
>
>
>
> From: owner-openssl-us...@opens
I am getting this error from an openssl-1.0.1g file when trying to make
php-5.4.23
/usr/bin/ld: /opt/openssl-1.0.1g/lib/libcrypto.a(cversion.o): relocation
R_X86_64_32 against `.rodata.str1.1' can not be used when making a shared
object; recompile with -fPIC
/opt/openssl-1.0.1g/lib/libcrypto.a: co
non-leaf certs (here you don’t really) add -showcerts .
>
>
> ** **
>
> Note the sumologic leaf cert has Subject CN sumologic.com, but
> SubjectAlternativeNames correctly
>
> specifying other names including collectors.sumologic.com. EV certs
> aren’t allowed to use wildcard names.***
Hi everyone,
I'm hitting a "unable to get local issuer certificate" error on a specific
SSL certificate, and I was wondering how I can best debug this? It's via
NXLog which uses OpenSSL so a bit disconnected from the underlying library
at the moment, and I'm not too familar with OpenSSL.
I've exp
ocket
switch on its error code, then do the appropriate next operation (which for
SSL_ERROR_WANT_READ or SSL_ERROR_WANT_WRITE is just a repeat of its
previous operation).
Good luck,
James
On Thu, Sep 19, 2013 at 2:02 AM, Krzysztof Kwiatkowski wrote:
> Hi,
>
> I'm a bit confused
heers,
James
On Wed, Sep 18, 2013 at 4:44 AM, Indtiny s wrote:
> Hi,
> I want to use a openssl api and use that as http client .
> currently I am using the c-curl lib with opebssl to do this .
>
> and I am running a Nginx server with openssl to support server funs.
>
> I want t
Not clear if you need to learn HTTP, but a quick tutorial is at
http://www.jmarshall.com/easy/http/ . It covers the requirements of
writing compliant clients and servers.
James
On Fri, May 17, 2013 at 11:34 PM, Indtiny s wrote:
> Hi Dave,
> I do not need to handle all of HTTP stuffs ,
> Original Message
>From: Bruce Cran
>To: openssl-users@openssl.org
>Cc: "James"
>Sent: Thu, Feb 7, 2013, 9:48 AM
>Subject: Re: Issue with 1.0.1d with Apache 2.2.23
>
>On 07/02/2013 14:36, James wrote:
>>
>> Just an update, using a SS
> Original Message
>From: "James"
>To: openssl-users@openssl.org
>Cc: openssl-users@openssl.org
>Sent: Wed, Feb 6, 2013, 3:51 PM
>Subject: Re: Issue with 1.0.1d with Apache 2.2.23
>
>> Original Message
>>From: "James"
>
> Original Message
>From: "James"
>To: openssl-users@openssl.org
>Sent: Wed, Feb 6, 2013, 2:50 PM
>Subject: Issue with 1.0.1d with Apache 2.2.23
>
>I recently upgraded our application to OpenSSL 1.0.1d with FIPS compiled in
>but disabled, which has alw
I recently upgraded our application to OpenSSL 1.0.1d with FIPS compiled in but
disabled, which has always been the case in the past. Our application runs in a
browser using Apache 2.2.23 and mod_ssl which is compiled against OpenSSL.
Testing has revealed that HTTP requests work fine, however, H
in switch blocks.
All comments welcome. I'd feel more comfortable if someone who knows
better could verify it. Anything missing? If it's accurate, I'm
happy to transfer it to Patrick's wiki.
Cheers,
James
On Fri, Feb 1, 2013 at 9:29 PM, Patrick Pelletier
wrote:
> the 'many eyes make all bugs shallow' views
You don't believe that, do you?
The number of counter-examples of long-standing bugs in widely available
and active open-source systems should be large enough to call it now.
Especially in subtle, complex systems where there is no documentation of
> For things that the peer support forum and the existing documentation
don't cover, you have the source code, which is definitive.
The source code can tell you what it DOES do - but the cost of
understanding that can be very high in some cases, and the problem
domain of OpenSSL almost guarant
I am trying add certificatePolicies in C code and I got this Error on
"certificatePolicies = 2.2.2.2"
** sign1.c:163 Error creating X509 extension object
5432:error:22097088:X509 V3 routines:DO_EXT_NCONF:no config database:.\crypto\x5
09v3\v3_conf.c:156:
5432:error:22098080:X509 V3 routines:X509
hanks again,
James
On 1 October 2012 13:55, Dr. Stephen Henson wrote:
> On Mon, Oct 01, 2012, James Swift wrote:
>
>> > Try running the OpenSSL tests using: nmake -f ms\ntdll.mak test
>>
>>
>> rsa_test
>> PKCS #1 v1.5 encryption/decryption ok
>> OAEP dec
lse experience these?
Build machine: Windows 7 Enterprise 64 bit, SP 1, Core i7 3930
Visual Studio 2010 Professional SP 1
perl Configure no-idea no-mdc2 no-rc5 VC-WIN64A
call ms\do_win64a
nmake -f ms\ntdll.mak
nmake -f ms\ntdll.mak test
James
On 28 September 2012 19:00, Dr. Stephen Henson wrote:
>
ble loss of data in conversion but found none of them
in code called up to this point.
Any help here would be greatly appreciated.
James
*
Compiled curl 7.27.0 as instructed in the docs with the following options
mode=static VC=10 WITH_SSL=dll WITH_ZLIB=static USE_IDN=no
ENABLE_WINSSL=no MA
Key
referen
ced in function main
sign.exe : fatal error LNK1120: 11 unresolved externals
Thank you
From
James Burton
s all very welcome.
Thanks!
James
s
behavior ring any bells? This is all on Linux 3.1.10 (openSUSE).
SSL_read(), SSL_write(), and SSL_shutdown() are each handled with a similar
block.
That's one of several questions I have. A more general question is: Where
can I find descriptions of all return codes when using non-blocking I/O?
Thanks for any help!
Cheers,
James
n C.
I'm attaching the extracted code, in case anyone wants to look at it. It's
500 lines including comments, but you can see e.g. just the error-handling
in try_SSL_read() by searching for "sub try_SSL_read". The full program is
available upon request.
Thanks a lot for an
On Wed, Mar 28, 2012 at 10:16 AM, Dr. Stephen Henson wrote:
> On Wed, Mar 28, 2012, James Earl wrote:
>
>> I recently had a timeout issue with a service provider we connect to
>> over HTTPS. I found downgrading to OpenSSL 1.0.0 solved the problem.
>> I'm not sure h
I recently had a timeout issue with a service provider we connect to
over HTTPS. I found downgrading to OpenSSL 1.0.0 solved the problem.
I'm not sure how to determine if it's a bug, an Arch Linux package
issue, or a problem with the service providers server?
I tested using Python and Ruby (multi
rypt could fail?
Regards,
James
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager majord...@openssl.org
perimental "ECCdraft" ciphersuites) and to OpenSSL 1.0.0 through 1.0.0d."Unfortunately, we cannot upgrade to the 1.0.0 series until the new FIPS module is released, since 1.0.0 doesn't compile with the current FIPS module.Thanks!James
Steve, I'm sorry but I don't understand can you be a bit more explicit?
Best wishes
James
-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org]
On Behalf Of Dr. Stephen Henson
Sent: 06 July 2011 20:26
To: openssl-users@openssl.org
S
7;t find the right magic
> cms -engine pkcs11 -sign -in sign.txt -signer
> 8320eb4fa0f91a25b9febcbe47845ba168055622 -keyform engine -out signout.txt
> -outform DER
Can anyone help please?
Best wishes
James
Advanced Health and Care Limited part of Advanced Computer Software Grou
now how" :-)
Best wishes
James
James Berry
Chief Technical Officer
Advanced Health & Care
Unit 4 Eurogate Business Park, Ashford, Kent TN24 8SB
m: +44 (0) 7768 021031 t: +44 (0) 1233 722700 f: +44 (0) 1233 722701
www.advancedcomputersoftware.com/ahc<http://www.
>
>
> I got the the correct certificate chain from my Windows 7 box. Microsoft
> tends to update its trusted CA certificates store more quickly and regularly
> than Mozilla or Linux distros: the latest update was last month on March
> 23rd 2011.
> It is sad that even Network Solutions guys are not
nt an hour and a half on the phone
with NetSol telling them their was something wrong with their files and they
just kept saying it was my fault and they will bill me $120/hour to fix it.
> > On Tue, Apr 26, 2011 at 8:19 AM, James Chase
> wrote:
> > > Well my results are qui
IEWcl
DSpoJSSy8ieH7U4/kuZE79tAWQw5EvgfyL6fpMLHvNT63G6bW7ekRuSEjA0njqpC
y/Bbi7gDW2FzQ8Y0gMyYKtHVTBFz7vyr2hwB37bUWq009kMRVUhhHYpF6fAnByZC
phBXxfqQaC1XmE7tnyt8QLI2NBXDpDTTMtaEcU0VKnsb6X0p+u1r6S+/I2pjan9m
G0pID0nsP9iH2xyG+8F+Fxcxt7ve0T2YGYfgMg==
-END CERTIFICATE-
On Tue, Apr 26, 2011 at 8:19 AM, James
A/L=A City/streetAddress=One Park St/O=A
Company International Ltd/OU=Book
Sales/OU=Secure Link EV SSL/CN=www.example.com
i:/C=US/O=Network Solutions L.L.C./CN=Network Solutions EV SSL CA
---
On Mon, Apr 25, 2011 at 6:16 PM, Rob Stradling wrote:
> On Monday 25 Apr 2011 20:07:03 James Cha
>
>
> openssl verify -CAfile chain.crt my.cert.crt
>
> IF you have installed some 'common' or 'standard' CAs in your
> system's default truststore -- or if you're using a packaged
> build that does so for you -- turn that off to make sure it
> doesn't silently 'fill in' certs for you, something li
dea what that could be at this point -- I have never had so much trouble
with an SSL certificate and am not an expert by any means.
Anyone have any thoughts? I called NS earlier in this process and they said
"not our problem" but perhaps I will try again.
On Mon, Apr 25, 2011 at 11:01
req -verify -in www.example.com.csr -key www.example.com.key
verify OK
-BEGIN CERTIFICATE REQUEST-
CERTIFICATE DATA HERE
-END CERTIFICATE REQUEST-
On Sat, Apr 23, 2011 at 4:41 PM, James Chase wrote:
> I am using the same system -- I have tried with last years chain file as
> well. The onl
error_unknown_issuer)
I have always used the -chain and -CAfile options together when creating
p12's.
On Sat, Apr 23, 2011 at 12:32 PM, Crypto Sal wrote:
> On 04/21/2011 06:51 PM, James Chase wrote:
>
> I have done this multiple years in a row with the exact same process but
> now
> I have done this multiple years in a row with the exact same process but
> now I get the following error when I try to create my SSL:
>
> openssl pkcs12 -export -chain -CAfile cachain.crt -out my.domain.com.p12
> -inkey my.domain.com.key -in MY.DOMAIN.COM.crt
> Error unable to get local issuer ce
I have done this multiple years in a row with the exact same process but now
I get the following error when I try to create my SSL:
openssl pkcs12 -export -chain -CAfile cachain.crt -out my.domain.com.p12
-inkey my.domain.com.key -in MY.DOMAIN.COM.crt
Error unable to get local issuer certificate g
The tarball doesn't appear to be corrupted for me, what errors are you getting?Under Redhat EL4 and EL5 VMs, tar zxf openssl-0.9.8q.tar.gz, works perfectly fine for me. Original Message From: Brent Evans To: openssl-users@openssl.orgSent: Fri, Dec 3, 2010, 8:48 AMSubject: opensll-0.9.8q.tar
I completely understand and appreciate your quick response :) For the time
being, we'll stick with using the latest version of the 0.9.X series of OpenSSL.
Thanks again,
James
> Original Message
>From: Steve Marquess
>To: openssl-users@openssl.org
>Sent: Thu, Jul 2
g OpenSSL 1.0.0 with FIPS, I'm assuming they've either modified the FIPS module to be compatible with OpenSSL 1.0.0, they've obtained their own module by other means or some other method.Any information on this would
Harshvir,
Include/openssl is populated with links during the make phase. It always
starts empty.
Ed
Ed James, Contractor ed.jam...@us.army.mil 703-588-8736-voice
703-693-7507-fax
ITA BSS/TCS
1777 North Kent Street, Suite 4100, Arlington, VA 22209
From: owner-openssl-us
/lib \
-L/usr/local/lib \
-R/usr/sfw/lib:/usr/local/lib \
solaris64-x86_64-gcc
The difference is:
32:386 -m32 solaris-x86-gcc
64:solaris64-x86_64-gcc
Ed James, Contractor ed.jam...@us.army.mil 703-588-8736-voice
703-693-7507-fax
ITA BSS/TCS
1777 North Kent Street, Suite 4100
u could also try this: http://openssl-net.sourceforge.net/
I have no idea how well it works - I just stumbled across it.
James
__
OpenSSL Project http://www.openssl.org
User Support Mai
cate an OpenSSL implementation that has been wrapped
as a free-threaded COM service, you might find things easier if you
don't know how to write such glue. You could try looking in Mono's
runtime, too, which I suspect delegates to
Why does E_EXE contain dhparam and E_OBJ contain dhparam.o, but E_SRC
does not contain dhparam.c?
(OpenSSL 1.0.0 fwiw)
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
ke its been like that for a very long time.
Note sure the LPdir stuff is used any more either is it?
(I'm trying to build openssl with a custom build system, BTW. Yes I know
its not supported)
James
r.o)
ld: symbol(s) not found
collect2: ld returned 1 exit status
make: *** [smtpd] Error 1
make: *** [update] Error 1
I've installed OpenSSL 0.9.8n using:
./config --prefix=/usr threads shared
The machine is a Mac Mini running O
> Ger Hobbelt wrote:
> Odd question maybe, but does the API call slowdown too when traversing
> other heaps (which carry fewer items)?
Yes. This surprised me, but Heap32Next takes the same amount of time
to execute when traversing the 2nd heaplist (which has 15 items) as it
does the 1st heaplist
I've confirmed my linear performance conjecture w/r/t heap objects.
Click here to see pretty pictures graphing my results:
http://thenewjamesbaker.blogspot.com/2009/11/performance-of-heap32next-on-64-bit.html
On Thu, Nov 12, 2009 at 11:50 AM, James Baker wrote:
> Punchline: The time ta
l
ripped out of rand_win.c that I could pass on to any OpenSSL
developer/contributor.
Thanks,
James
my debugging output:
stoptime: 851485984
Got heaplist_first.
heap1st
tickcount: 851624250
Exiting RAND_poll
On Wed, Nov 11,
this list can say "Yes, the
RAND_Poll CryptoAPI calls work on Windows-7", this will be my next
step.
Thanks,
James
On Sun, Nov 8, 2009 at 6:36 AM, sandeep kiran p wrote:
>>RAND_poll runs very quickly with a near-empty heap.
> Do you mean that the calls
> to Heap32First,
Hi,
I'm trying to use the openssl toolkit to decrypt a message that was encryted
using an RSA public key. I have the RSA private key and thus has generated
to the public key. so I have both. The string with the encrytped message is
held in a file called "q2.enc":
a7jjYdmTJVFm9Lok2AHKEdBllkG+Lf0Ibi
s the trust flags.
Any help is appreciated.
Thank you
James
CONFIDENTIALITY
This e-mail message and any attachments thereto, is intended only for use by
the addressee(s) named herein and may contain legally privileged and/or
confidential information. If you are not the intended recipient of this e
s the trust flags.
Any help is appreciated.
Thank you
James
CONFIDENTIALITY
This e-mail message and any attachments thereto, is intended only for use by
the addressee(s) named herein and may contain legally privileged and/or
confidential information. If you are not the intended recipient of
Can anyone tell me what version of OpenSSL works with my environment?
OS: OpenVMS v7.2-1
IP Stack: Multinet v5.0
Thanks,
Jim
Chicago, IL
__
OpenSSL Project http://www.openssl.org
User Support
g":MAILTO:openssl-users@openssl.org
ORGANIZER;CN="James McGovern":MAILTO:ja...@architectbook.com
LOCATION:The Hartford\, Tower Building: Atrium Conference Room
DTEND;TZID="(GMT-05.00) Eastern Time (US & Canada)":20090210T19
DESCRIPTION:\NThe Open Web Application Sec
We are running into an issue with an application that is written in PERL
using SOAP:Lite and OpenSSL on Suse where a SOAP request is sent to a
server that requires mutual authentication. On the server side, the
server is throwing a message indicating that it is having a problem with
base64 decoding
That did it... Though the file was in /crypto/perlasm
Thanks a lot!
James
James Owen
-Original Message-
From: Thomas Jansen <[EMAIL PROTECTED]>
Date: Thu, 11 Sep 2008 13:21:02
To:
Subject: Re: build error vsc++express 2008 win32 openssl
James Owen wrote:
>
>
>
>
1 - 100 of 199 matches
Mail list logo