Does it mean that it is hard to change the behavior?
--
qun-ying
--- On Fri, 9/24/10, David Schwartz dav...@webmaster.com wrote:
Sounds like OpenSSL wasn't what you wanted. OpenSSL is
intended for use on general-purpose computers with virtual
memory. It is not designed to return virtual
HI,
I am an openSSL User. We implemented SHA1 algorithm.
Here in some specific case SHA1 digest is coming as 152 bits long instead
of 160 bits long.
Please suggest if any bug fix is there for this issue.
Thanking you in anticipation.
Thanks Regards,
Kedar Anilrao Sabnis
Tata Consultancy
On Sat, Sep 25, 2010 at 21:09, Kedar Sabnis kedar.sab...@tcs.com wrote:
HI,
I am an openSSL User. We implemented SHA1 algorithm.
Here in some specific case SHA1 digest is coming as 152 bits long instead
of 160 bits long.
Please suggest if any bug fix is there for this issue.
Thanking
Bonjour,
Hodie V Kal. Oct. MMX, Gumbie scripsit:
I apologize to all for not looking into this more, before asking.
It isn't just a matter of adding the proper extensions. The
various browser software actually has the corporate policy OID
hard coded into the browser code. At first
Kedar Sabnis wrote:
in some specific case SHA1 digest is coming as 152 bits long instead of
160 bits long.
All possible 160 bits values have the same chance of being the output of
a SHA1 digest, *including* those that comprise long strings of all zeros
or all ones.
This mean that,
On Sat, Sep 25, 2010, Vivek Madani wrote:
Hi,
What are the conditions when power-on self tests may fail. We have an
application using OpenSSL in FIPS mode and the power on self test has
always succeeded. However, today on one of the virtual machines the
test failed. What could have
On Mon, Sep 27, 2010 at 6:10 PM, Dr. Stephen Henson st...@openssl.org wrote:
On Sat, Sep 25, 2010, Vivek Madani wrote:
Hi,
What are the conditions when power-on self tests may fail. We have an
application using OpenSSL in FIPS mode and the power on self test has
always succeeded. However,
Why no try the open source PKI book as a starter...
http://ospkibook.sourceforge.net/docs/OSPKI-2.4.7/OSPKI-html/ospki-book.htm
Cheers,
Tomas
On 09/24/2010 10:13 PM, Hasan Rezaul-CHR010 wrote:
Hi All,
Would anyone kindly point me to literature that CLEARLY explains exactly
how:
Hi,
I'm from and live in Denmark. I make and sell a
program (shareware, not someone making me
rich mind you) which has a website crawler.
I use Indy HTTP library for HTTP communication.
...
However, I would like to use OpenSSL with Indy for https:
If I allow my users to download OpenSSL
Hi Rajan,
Bad stuck at the ecdsa with sha256 and sha384 cert and key generation.
Have really short deadlines.
Tried hunting lots
Finally found this but didnt see any reply to your query.
Hope you got your answer..
Can you please help me in generating this cert and key?
Regards,
-Amol
Hi, again,
Could anybody with insight in the OPENSSL_cpuid_setup have a look at
this issue? What is the impact when it doesn't get called on win x64?
Does the section need some flag? I haven't found any resolution to the
problem.
Best regards,
Per Frykenvall
Jakob Bohm wrote:
Actually,
I've found the alternative to self-signing (namely signing with your
own CA) to be a potentially great path for the web application that we
develop; however I can't quite figure out how exactly to tweak the
configuration file to get what I want. It is hard (impossible?) to find
any detailed
On 9/25/2010 9:31 AM, Jayaraghavendran k wrote:
(a) Does OpenSSL plan to support this feature in any of it's future
releases? (Or does any of the releases already support it? I went
through the Change Logs, but couldn't find anything), If no, why not?
I can't answer whether there are any
On 9/26/2010 11:14 PM, zhu qun-ying wrote:
Does it mean that it is hard to change the behavior?
Yes, because it's not implemented in any one particular place. It's a
fundamental design assumption throughout OpenSSL that it's aimed at
general-purpose computers with virtual memory subsystems.
As David said, yes.
On the other hand, you could re-implement malloc() and free() for your platform.
From: owner-openssl-us...@openssl.org on behalf of zhu qun-ying
Sent: Sun 9/26/2010 11:14 PM
To: openssl-users@openssl.org
Subject: Re: where is the memory
On Mon, Sep 27, 2010, Vivek Madani wrote:
On Mon, Sep 27, 2010 at 6:10 PM, Dr. Stephen Henson st...@openssl.org wrote:
On Sat, Sep 25, 2010, Vivek Madani wrote:
Hi,
What are the conditions when power-on self tests may fail. We have an
application using OpenSSL in FIPS mode and the
Hi,
What are the conditions when power-on self tests may fail. We have an
application using OpenSSL in FIPS mode and the power on self test has
always succeeded. However, today on one of the virtual machines the
test failed. What could have possibly lead to this failure? Any ideas?
Clipped earlier communication
What OS is this running on? That error can be caused by a DLL being loaded to
an address that is already in use under Windows and relocation would
invalidate the signature.
You can work around that by specifying an alternative load address when the
DLL is
Clipped earlier communication
What OS is this running on? That error can be caused by a DLL being loaded
to
an address that is already in use under Windows and relocation would
invalidate the signature.
You can work around that by specifying an alternative load address when the
DLL is
Dear All,
I am a contributor to the WCE port of stunnel, using intensively openssl.
I have recently completed the port of stunnel v434 to WCE platform,
and needed a refreshed version of openssl for that target.
I have recompiled openssl v100a with MS EVC4 sp4 free compiler, MS
WCE420 SDK and
20 matches
Mail list logo