but they add up quickly :-)
Recently I started using a packaged called gSoap
(http://www.cs.fsu.edu/~engelen/soap.html) and using one of their sample
apps I noticed some leaks in it. I verified the memory leaks using purify
and communicated them to Robert van Engelen, the author of gSoap.
Received: via dmail-2000(11) for martin; Fri, 7 Feb 2003 00:32:52 +0100 (CET)
Return-Path: [EMAIL PROTECTED]
Received: from lucy.verwaltung.uni-mainz.de (lucy.Verwaltung.Uni-Mainz.DE
[134.93.144.162])
by wintermute.verwaltung.uni-mainz.de (8.12.3/8.12.3/Debian -4) with ESMTP id
Reza Roodsari via RT wrote:
but they add up quickly :-)
Recently I started using a packaged called gSoap
(http://www.cs.fsu.edu/~engelen/soap.html) and using one of their sample
apps I noticed some leaks in it. I verified the memory leaks using purify
and communicated them to Robert van
Reza Roodsari via RT wrote:
but they add up quickly :-)
Recently I started using a packaged called gSoap
(http://www.cs.fsu.edu/~engelen/soap.html) and using one of their sample
apps I noticed some leaks in it. I verified the memory leaks using purify
and communicated them to Robert van
Hello Lutz,
Lutz Jaenicke wrote:
On Thu, Feb 06, 2003 at 07:42:39PM +0100, Götz Babin-Ebell wrote:
Hell folks,
there seems to be a strange behavior with CA certificates
in SSL server:
I create a SSL_CTX for a server,
set the certificate and the private key
and add some CA certificates for
Hello.
I want to report a bug in the openssl 0.9.7 ocsp server. The
self-test report and a proposed patch is included below.
When I start openssl ocsp in server mode in a CA directory
# Server
$ openssl ocsp -index index.txt -CA CA.crt -rsigner CA.crt \
-rkey CA.key -ndays 1 -port
[[EMAIL PROTECTED] - Fri Feb 7 16:32:51 2003]:
Hello.
I want to report a bug in the openssl 0.9.7 ocsp server. The
self-test report and a proposed patch is included below.
This is a known issue. It was fixed a while ago in 0.9.7-stable and will
appear in 0.9.7a
Yes, I've tested it and it works. I think the problem is that I
haven't used X509_LOOKUP directly, I've used it as part of certificate
verification during SSL handshake. In this case, OpenSSL goes through
whole certificate cache and looks for certificate there. I'm very sorry
for
Contrary to the documentation EVP_DecryptInit requires the ctx to be
initialized in OpenSSL 0.9.7 (RedHat openssl 0.9.7-3 i686)
To repeat:
EVP_CIPHER_CTX ctx;
unsigned char key[] = {0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15};
unsigned char iv[] = {1,2,3,4,5,6,7,8};
memset(ctx, 42,
[[EMAIL PROTECTED] - Fri Feb 7 18:39:43 2003]:
Contrary to the documentation EVP_DecryptInit requires the ctx to be
initialized in OpenSSL 0.9.7 (RedHat openssl 0.9.7-3 i686)
This was fixed a couple of weeks back. The fix is in any 0.9.7 stable
snapshot and will appear in 0.9.7.
[[EMAIL PROTECTED] - Fri Feb 7 14:09:28 2003]:
According to RFC 2246 a server can omitt the root certificate:
[...]
certificate_list
This is a sequence (chain) of X.509v3 certificates. The sender's
certificate must come first in the list. Each following
On Fri, Feb 07, 2003, Stephen Henson via RT wrote:
[[EMAIL PROTECTED] - Fri Feb 7 18:39:43 2003]:
Contrary to the documentation EVP_DecryptInit requires the ctx to be
initialized in OpenSSL 0.9.7 (RedHat openssl 0.9.7-3 i686)
This was fixed a couple of weeks back. The fix is in
On Fri, 7 Feb 2003, Stephen Henson via RT wrote:
[[EMAIL PROTECTED] - Fri Feb 7 18:39:43 2003]:
Contrary to the documentation EVP_DecryptInit requires the ctx to be
initialized in OpenSSL 0.9.7 (RedHat openssl 0.9.7-3 i686)
This was fixed a couple of weeks back. The fix is in
13 matches
Mail list logo