Re: Use of OpenSSL for EPOC 32 used by Psion.

2000-11-15 Thread Dr S N Henson
[EMAIL PROTECTED] wrote: Hi all, Can we use OpenSSL to implement security in EPOC32.? Well there's no public port of OpenSSL to EPOC32 but there are a couple of problems anyway. OpenSSL is currently rather large so the result would be larger than 1Mb. The second is a problem with

RE: cvs commit: openssl/crypto/asn1 asn1t.h tasn_dec.c tasn_fre.ctasn_new.c tasn_utl.c

2000-11-15 Thread Frank Balluffi
Steve Henson said: BOOLEAN is an evil thing for the ASN1 code. Its declared as an 'int'. Every other type is declared as a pointer which is allocated as required: if it is NULL then the field is omitted (I'll be adding a check to see if thats allowed at some point: i.e. only if the type is

RE: Error in Apache SSL

2000-11-15 Thread Leyla Tolun
Title: RE: Error in Apache SSL I use Solaris 2.7 - Sparc with all patches applied. Leyla Tolun -Original Message- From: Vadim Fedukovich [mailto:[EMAIL PROTECTED]] Sent: Wednesday, November 15, 2000 5:29 PM To: Leyla Tolun Subject: Re: Error in Apache SSL Leyla, signal 11 is

Re: cvs commit: openssl/crypto/asn1 asn1t.h tasn_dec.c tasn_fre.ctasn_new.c tasn_utl.c

2000-11-15 Thread Dr S N Henson
Frank Balluffi wrote: Steve Henson said: BOOLEAN is an evil thing for the ASN1 code. Its declared as an 'int'. Every other type is declared as a pointer which is allocated as required: if it is NULL then the field is omitted (I'll be adding a check to see if thats allowed at some

The Net Detective. Spy on any....

2000-11-15 Thread 61723744
READY TO KNOW? CONFIDENTIAL! The SOFTWARE They Want BANNED In all 50 STATES. Why? Because these secrets were never intended to reach your eyes... Get the facts on anyuone! Locate Missing Persons, find Lost Relatives, obtain Addresses and Phone Numbers of

Plz help ! Can't build OpenSSL 0.9.6 with BCB4.

2000-11-15 Thread Fedor Utenkov
Hello all, I'm try to build an OpenSSL 0.9.6 with Borland C++ Builder 4 and it fails. The problem is that compiler don't like type cast from 'something' to void. The output messages log file attached and also put at the end of message. If somebody have a solution (i'm sure it

Re: Plz help ! Can't build OpenSSL 0.9.6 with BCB4.

2000-11-15 Thread Ulf Moeller
On Wed, Nov 15, 2000 at 11:06:15PM +0300, Fedor Utenkov wrote: I'm try to build an OpenSSL 0.9.6 with Borland C++ Builder 4 and it fails. The problem is that compiler don't like type cast from 'something' to void. Is it really that? It looks more like it doesn't match ANSI C

SSL_CTX_new question

2000-11-15 Thread J. Coates
What is the purpose of the SSL_get_ex_data_X509_STORE_CTX_idx() chain of function calls in the above function ? I get lost every time I try to track through it . . . Thanks, Joe Coates __ Do You Yahoo!? Yahoo! Calendar - Get organized for

ssl3_get_client_key_exchange() ssl3_get_message() max length too small

2000-11-15 Thread Jeffrey Altman
In ssl\s3_srvr.c ssl3_get_client_key_exchange() there is a call to n=ssl3_get_message(s, SSL3_ST_SR_KEY_EXCH_A, SSL3_ST_SR_KEY_EXCH_B, SSL3_MT_CLIENT_KEY_EXCHANGE, 400, /* */ ok); The problem is that

Re: Plz help ! Can't build OpenSSL 0.9.6 with BCB4.

2000-11-15 Thread Rich Salz
The real fix would be to eliminate all remaining non-ANSI constructs (that have still be left in because of their implicit type conversion). Are there any of those? Functions that take unpromoted types, I mean. There are some that should just be fixed -- the function parameters for

Re: Hmm... (discoveries about BIGNUM code)

2000-11-15 Thread Rich Salz
after I pointed it out), that calling realloc() in the code will leave lots of copies of private keys and other sensitive data lying around in memory. The bignum code should never call the libc realloc(), but should instead use a safe realloc which does a malloc(), a memcpy(), a memset() to

Re: Hmm... (discoveries about BIGNUM code)

2000-11-15 Thread Geoff Thorpe
On Thu, 16 Nov 2000, Peter Gutmann wrote: Richard Levitte - VMS Whacker [EMAIL PROTECTED] writes: One might wonder what the importance of this is, until you realise that a realloc() most often has the same cost as malloc() and a free() put together, especially when we you have growing

Re: nonblocking crypto (was: Re: ASN1 non blocking I/O...)

2000-11-15 Thread Dan Kegel
Geoff Thorpe wrote: On Tue, 14 Nov 2000, Dan Kegel wrote: I don't think we need nonblocking crypto; it would be enough to be able to shunt the crypto off into another thread. That's what my API proposal was about. I think that misses the entire point of why a form of async public-key

RSA encryption. How to use xxx_PADDING.

2000-11-15 Thread Fedor Utenkov
Hello all, I'm new to encryption. I'm using an OpenSSL 0.9.6 to encrypt data using RSA. The data length is about 4 times longer against RSA_size() of my key. To encrypt all data I split it to blocks with length equal to key size and encrypt one by one w/o PADDING. The