[EMAIL PROTECTED] wrote:
Hi all,
Can we use OpenSSL to implement security in EPOC32.?
Well there's no public port of OpenSSL to EPOC32 but there are a couple
of problems anyway.
OpenSSL is currently rather large so the result would be larger than
1Mb.
The second is a problem with
Steve Henson said:
BOOLEAN is an evil thing for the ASN1 code. Its declared as an 'int'.
Every other type is declared as a pointer which is allocated as
required: if it is NULL then the field is omitted (I'll be adding a
check to see if thats allowed at some point: i.e. only if the type is
Title: RE: Error in Apache SSL
I use Solaris 2.7 - Sparc with all patches applied.
Leyla Tolun
-Original Message-
From: Vadim Fedukovich [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, November 15, 2000 5:29 PM
To: Leyla Tolun
Subject: Re: Error in Apache SSL
Leyla,
signal 11 is
Frank Balluffi wrote:
Steve Henson said:
BOOLEAN is an evil thing for the ASN1 code. Its declared as an 'int'.
Every other type is declared as a pointer which is allocated as
required: if it is NULL then the field is omitted (I'll be adding a
check to see if thats allowed at some
READY TO KNOW?
CONFIDENTIAL!
The SOFTWARE They Want BANNED In all 50 STATES.
Why? Because these secrets were never intended to reach your eyes...
Get the facts on anyuone!
Locate Missing Persons, find Lost Relatives, obtain Addresses
and Phone Numbers of
Hello all,
I'm try to build an OpenSSL 0.9.6 with Borland C++ Builder 4 and it
fails. The problem is that compiler don't like type cast from
'something' to void. The output messages log file attached and also
put at the end of message.
If somebody have a solution (i'm sure it
On Wed, Nov 15, 2000 at 11:06:15PM +0300, Fedor Utenkov wrote:
I'm try to build an OpenSSL 0.9.6 with Borland C++ Builder 4 and it
fails. The problem is that compiler don't like type cast from
'something' to void.
Is it really that? It looks more like it doesn't match ANSI C
What is the purpose of the
SSL_get_ex_data_X509_STORE_CTX_idx()
chain of function calls in the above function ? I get
lost every time I try to track through it . . .
Thanks,
Joe Coates
__
Do You Yahoo!?
Yahoo! Calendar - Get organized for
In ssl\s3_srvr.c ssl3_get_client_key_exchange() there is a call to
n=ssl3_get_message(s,
SSL3_ST_SR_KEY_EXCH_A,
SSL3_ST_SR_KEY_EXCH_B,
SSL3_MT_CLIENT_KEY_EXCHANGE,
400, /* */
ok);
The problem is that
The real fix would be to eliminate all
remaining non-ANSI constructs (that have still be left in because of
their implicit type conversion).
Are there any of those? Functions that take unpromoted types, I mean.
There are some that should just be fixed -- the function parameters for
after I pointed it out), that calling realloc() in the code will leave lots of
copies of private keys and other sensitive data lying around in memory. The
bignum code should never call the libc realloc(), but should instead use a safe
realloc which does a malloc(), a memcpy(), a memset() to
On Thu, 16 Nov 2000, Peter Gutmann wrote:
Richard Levitte - VMS Whacker [EMAIL PROTECTED] writes:
One might wonder what the importance of this is, until you realise that a
realloc() most often has the same cost as malloc() and a free() put together,
especially when we you have growing
Geoff Thorpe wrote:
On Tue, 14 Nov 2000, Dan Kegel wrote:
I don't think we need nonblocking crypto; it would be enough to be able
to shunt the crypto off into another thread. That's what my API proposal
was about.
I think that misses the entire point of why a form of async public-key
Hello all,
I'm new to encryption. I'm using an OpenSSL 0.9.6 to encrypt data
using RSA. The data length is about 4 times longer against
RSA_size() of my key. To encrypt all data I split it to blocks with
length equal to key size and encrypt one by one w/o PADDING. The
14 matches
Mail list logo