Hi All!
When I built and openssl with -g first I noticed that it needed
another additional library libefence. Second when a malloc of size zero
is done it crashes. Hence planning to ignore -g option. So now my
question is what would the -g plays in the build ?. Since I have seen
few users
Hi all!
How about this meaning?
when I use CA.sh -newreq create a new certificate, and use CA.sh -sign to
sign this caertificate, after that , CA.sh -verify to check this cert, and
the error like this:
error 20 at 0 depth lookup:unable to get local issuer certificate
Best
Thanks .. the information was helpful ..
On Mon, Apr 6, 2009 at 8:09 PM, Victor Duchovni
victor.ducho...@morganstanley.com wrote:
On Mon, Apr 06, 2009 at 06:29:17PM +0530, Anil Tambe wrote:
is the binary compatibility broken in 0.9.8k ?
Not necessarily.
i see the below symbols missing
Patch for PR696 looks fine to me, though attached patch alternative
may be considered .1% 'better' as it more closely mimicks the other
side of the fence: the transmission code in s2_clnt.c:
p=buf;
*(p++)=SSL2_MT_ERROR;
Good day!
I have problem with reading S/MIME PKCS#7 container from membuf. I've
got not enough data error in ASN parsing routine (asn1_d2i_read_bio).
I have sign crypt zip file (430kb) with S/MIME PKCS#7 within PHP. Then
I wrote a small application to decrypt verify:
/* Decrypt */
in =
Thanks .. the information was helpful ..
i found one patch which resolves this issue .. ( Please read
the Disclaimer)
http://rt.openssl.org/Ticket/Display.html?id=696user=guestpass=guest
http://rt.openssl.org/Ticket/Display.html?id=696user=guestpass=guest
i applied that patch and sslv2 client was
Malware scan came out clean.
Debugger tool showed the following error:
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=00bdf6b0 ebx=0098db9c
scratches head
On Thu, Apr 9, 2009 at 7:48 AM, Balaji Kannadassan balaj...@nortel.com wrote:
Hi All!
When I built and openssl with -g first I noticed that it needed another
additional library libefence. Second when a malloc of size zero is done it
crashes. Hence planning to ignore -g
On Thu, Apr 9, 2009 at 2:42 PM, Ger Hobbelt g...@hobbelt.com wrote:
That last line what ADDED to Configure. Save, then invoke ./Configure
with any extras you want, specifying your freshly created debug
target, for example:
./Configure linux-x86_64
should read here (as it does further down):
What may have impact here is that a memory s/s BIO does not act like a
file BIO by default.
To get the same behaviour (at end-of-data == End of File), you should
add the call
BIO_set_mem_eof_return(pio, 0);
after the line
pio = BIO_new(BIO_s_mem())
to ensure you'll get a regular EOF
I've got a win32 exe that occasionally (~2% of the time) hangs during
initialization of the process' usage of openssl. I've seen this for a
long time (and through several versions), so I'm assuming it's
something I'm doing. I'm currently working against openssl-0.9.8j.
Anyway, code of interest
Hi, Im a Nexuiz player (fully GPL FPS ( nexuiz.com ) and allowing
fully-encrypted communications between the nexuiz client and the server has
been discussed and is planned. However the UDP spec for open-ssl is not known.
The architecture of the server (darkplaces) is a single threaded udp
Hi all
I use libcsoap 1.1.0 library, to call some HTTP/HTTPS web services.
libcsoap in turn uses OpenSSL for authenticating the secure sessions
(HTTPS).
Both HTTP and HTTPS web service are functioning well and I get the proper
response in both cases.
But I found many memory leaks when I try to
Hello,
I'm attempting to establish an SSL connection, where everything seems OK
until SSL_connect, which returns -1. error is set to 11, and perror() gives
Resource temporarily unavailable. ERR_error_string rather useless output:
error:0002:lib(0):func(0):system lib, even though both
Very probably an error due to using non-blocking sockets: EWOULDBLOCK.
It's a retriable error.
For pure sockets I/O, no SSL, see W. Richard Stevens's books and other
resources on using nonblocking sockets with connect, read, write,
send, recv, etc.
On UNIX and Windows for pure sockets, most of
As near as I can tell, you're passing a pointer to CRYPTO_set_ex_data,
probably indirectly, that cannot actually be either read from or
written to. (However, this is an old area of the code, and probably
hasn't been looked at in a while. It's possible that bugs are lurking
there.) That's what
It would help if you applied the -debug command to your s_client -ssl2
line so we could see the actual traffic flow?
-Kyle H
On Tue, Apr 7, 2009 at 12:23 AM, Anil Tambe tambe.a...@gmail.com wrote:
hi all,
i am using the latest openssl 0.9.8k. the -verify option works fine
with ssl3 ,
17 matches
Mail list logo