Hi, here's one more cleanup prior to my larger patch:
Remove the inclusion of sys/times.h from crypto/rand/rand_unix.c.
--
Johan Gill, [EMAIL PROTECTED]
Index: crypto/rand/rand_unix.c
===
RCS file:
On Fri, Oct 28, 2005 at 04:07:32PM +0300, Claudiu Dragalina-Paraipan wrote:
I have noticed that BIO_do_connect doesn't start the connection upon
call, instead the connection is established on the first BIO_puts, in
my case.
I am not sure if this is a bug or not, but I have traced it to
Rüdiger Plüm wrote:
are there any plans to add support for rfc3546 (Transport Layer Security (TLS)
Extensions),
especially Server Name Indication to openssl in the near future?
See the mail in this list from Peter Sylvester with the subject TLS
Extension support - Server Name Indication
I'm using 0.9.8a with the latest OpenSSH 4.2 on Solaris 8. Sometimes the ssh
client will dump core.
There was a report on OpenSSH list last year about intermittent failures
on multi-CPU UltraSPARC system. It was not as fatal as core dump, but it
was sporadic. They asserted that ssh worked
without filing a bug, just wanted to notice that after successful
installation OpenSSL-0.9.8a on linux 32, openssl version produces:
OpenSSL 0.9.6b [engine] 9 Jul 2001
while for linux 64
OpenSSL 0.9.7a Feb 19 2003
Well, it means that you ether failed to upgrade or you keep
Quoting Andy Polyakov [EMAIL PROTECTED]:
Concensus was that the failure is caused by a hardware
deficiency. What's your hardware?
Mostly Sun Ultra 10s, running Solaris 8. I can produce the error on more than
one host, too.
- state which platform line was used, run 'openssl version -a' to
We are using OpenSSL to implement S/MIME. When we sign and
encrypt a message we use an intermediate memory BIO to hold the message.
The same is true when we decrypt and verify a message. If the message we
are processing is large (200K) we find that the performance is very
bad.
Hi Richard,
Thanks for taking a look at this.
[guest - Thu Oct 6 11:55:10 2005]:
This stops our engine working with the openssl application (as it
registers a lock debugging callback) and Apache 2.x (and other apps
too no doubt)
That's because those applications don't set up
john via RT wrote:
Why is it that the static locks have not been removed completely for
0.9.8? If it is to keep some backward compatibility with older apps,
or ones that see no reason to change, would it not be preferable if
the whole of openssl was compatible in this way, including the
On 11/10/2005 03:03 PM, Richard Koenning wrote:
Rüdiger Plüm wrote:
are there any plans to add support for rfc3546 (Transport Layer
Security (TLS) Extensions),
especially Server Name Indication to openssl in the near future?
See the mail in this list from Peter Sylvester with the
10 matches
Mail list logo