Thanks alot for the suggetions given by the experts
through the openssl mail archive.
Finally i established the communication link between
the client and inetdserver.But i used the existing
certificates that are given in the openssl.
Now shall anybody suggest me : how to create my own
server
On Mon, May 22, 2000 at 04:52:12PM -0700, Claus Assmann wrote:
Attached is a patch for the problem reported earlier. Please let
me know whether the patch is ok.
...
s-client_version has the value 0x0301, but it should have 0x0300
according to Stalker.
--- s3_clnt.c.origMon May 22
Hi Steve
Yes.you're right. There must be an error in OpenSSL 0.9.5.
0.9.5a works just fine.
Kim Hellan
-Oprindelig meddelelse-
Fra: Dr Stephen Henson [SMTP:[EMAIL PROTECTED]]
Sendt:22. maj 2000 19:43
Til: [EMAIL PROTECTED]
Emne: Re: "OpenSSL des3." returns "Bad
CONFIDENTIALITY: The information in this e-mail and any attachment is confidential.
It is intended only for the named recipient(s). If you are not a named recipient ,
please notify the sender
immediately and do not read, use, copy or disseminate this information.
CONDITIONS: Any offer
Hi everyone.
This might be slightly offtopic but i am trying to open an ssl session and i am
getting back error 47.
I can't for the life of me find what error 47 is. Can anyone point me in the
direction of docs about exceptions error codes etc.
thanks
robert
CONFIDENTIALITY: The
Hi everyone.
This might be slightly offtopic but i am trying to open an ssl session and i am
getting back error 47.
I can't for the life of me find what error 47 is. Can anyone point me in the
direction of docs about exceptions error codes etc.
thanks
robert
CONFIDENTIALITY: The
On Mon, May 22, 2000 at 09:29:29PM +0530, Amit Chopra wrote:
Now my question. Here is some code from s3_srvr.c that is
used in the key exchange.
File s3_srvr.c, Function ssl3_send_server_key_exchange, Line 955:
rsa=s-cert-rsa_tmp_cb(s,
SSL_C_IS_EXPORT(s-s3-tmp.new_cipher),
On Mon, May 22, 2000 at 04:52:12PM -0700, Claus Assmann wrote:
Attached is a patch for the problem reported earlier. Please let
me know whether the patch is ok.
The problem is in s3_clnt.c around line 1345:
tmp_buf[0]=s-client_version8;
Hi!
I am working on a BIO-pair setup and ran into a question regarding the
process of free()ing the objects after usage.
Considered the following sequence:
typedef struct {
SSL *con;
BIO *internal_bio;
BIO *network_bio;
... } TLScontext_t;
TLScontext_t *TLScontext;
...
TLScontext-con =
On Sat, May 20, 2000 at 02:07:04AM +0100, Dr Stephen Henson wrote:
! Everywhere within the *protocol* itself, OpenSSL
! properly switches to SSL v3 and uses 3.0 everywhere. BUT. There is a thing
! called "premaster secret". NOT the protocol block that exchange that secret -
! that block
Bodo Moeller wrote:
On Sat, May 20, 2000 at 02:07:04AM +0100, Dr Stephen Henson wrote:
Its not apparent that this actually *is* a bug. If you examine the SSLv3
spec: [...]
It is *definitely not* a bug. The SSL 3.0 and TLS 1.0 specifications
are quite clear on this: "The latest
From: Robert Maher [EMAIL PROTECTED]
robert.maher CONFIDENTIALITY: The information in this e-mail and any
robert.maher attachment is confidential. It is intended only for the
robert.maher named recipient(s). If you are not a named recipient ,
robert.maher please notify the sender immediately
Hi,
We are using libwww-ssl to fetch pages from secure webservers on the
internet, but we find that there are some problems in the way this happens.
Since requests failed in strange ways, we conducted tests to see where the
connection attempts failed. After increasing the logging using in
From: Dr Stephen Henson [EMAIL PROTECTED]
drh Yes I was thinking we should make OpenSSL tolerate this, either by
drh default or a bug option. The only way you'll see this though is by
drh connecting with a broken client on an OpenSSL server that disables TLS.
My vote for a bug option rather
On Tue, May 23, 2000 at 02:32:19PM +0200, Sander Alberink wrote:
Hi,
We are using libwww-ssl to fetch pages from secure webservers on the
internet, but we find that there are some problems in the way this happens.
Since requests failed in strange ways, we conducted tests to see where the
I use non-blocking sockets with SSL_connect and all works fine.
But you must place that call in a loop and use BIO_should_retry.
Here is my C++ wrapped ssl_connect:
DWORD CSocketConnClientSsl::SslConnect()
{
DWORD res=0,res0=0;
bool bRead,bWrite;
fd_set readfds,writefds;
Hi,
We are using libwww-ssl to fetch pages from secure webservers on the
internet, but we find that there are some problems in the
way this happens.
Since requests failed in strange ways, we conducted tests
to see where the
connection attempts failed. After increasing the logging
Hi could someone point me to some examples of using certificates for both
client and server. My application
is not browser based.
Thanks
__
OpenSSL Project http://www.openssl.org
Development
Listen my friend you can not compile because
are doing something wrong or you do not have one of
the neccessary library installed. Try the following
Makefile:
-- start of the makefile -
CFLAGS=-g
LDFLAGS+=-lcrypto -lssl
.PHONY: build
build: serv cli
.PHOHY: clean
clean:
Mauricio Moreno González wrote:
Hi, i have a SparcClassic w/24 MB RAM, running Linux Red Hat
6.2 (Zoot) w/kernel 2.2.14-5.0.
When i do:
$ ./config
without params, alls it's ok, after, when i execute make,
this down and show errors. With the option no-asm occurs the
same error, how i can
20 matches
Mail list logo