From: Bob Beck [EMAIL PROTECTED]
Subject: Re: obj_dat.h in openssl-0.9.6-engine
Date: Wed, 13 Dec 2000 15:37:35 -0700
Message-ID: [EMAIL PROTECTED]
beck
beck The engine branch is not used any more, since the contents have been
beck merged into the main trunk. Please use the main trunk.
beck
From: "Reddie, Steven" [EMAIL PROTECTED]
Steven.Reddie I've come across four race conditions in the following
Steven.Reddie functions in rsa_eay.c:
Steven.Reddie RSA_public_encrypt
Steven.Reddie RSA_public_decrypt
Steven.Reddie RSA_eay_mod_exp (x2)
Steven.Reddie
Steven.Reddie These can cause
On Thu, 14 Dec 2000, Richard Levitte - VMS Whacker wrote:
From: "Reddie, Steven" [EMAIL PROTECTED]
Steven.Reddie I've come across four race conditions in the following
Steven.Reddie functions in rsa_eay.c:
Steven.ReddieRSA_public_encrypt
Steven.ReddieRSA_public_decrypt
Any one on the team doing an rpm version of openssl?
c
--
Charlie Collinson Acrylis, Inc.
http://www.whatiflinux.com
Intelligent Software Management for more informed decisions.
tel: 978-251-1987 x236 73 Princeton St.
fax: 978-251-1989North Chelmsford
could you please tell me if it is possible to run open SSL as a service on
NT
Thanks
Sherrie Kasper
Kincaid Technologies, Inc.
(W) (719) 785-2132
(F) (719) 785-2199
[EMAIL PROTECTED]
CONFIDENTIAL: The information contained in this e-mail message is
privileged and confidential information
At 10:21 AM 12/14/00 -0700, Sherrie wrote:
could you please tell me if it is possible to run open SSL as a service on
NT
No, because it's not a free-standing service.
SSL is an application-layer protocol and OpenSSL
provides a library that is directly called by applications.
Dan Kegel provides
As has been mentioned before, I've given some thought to having
thread-locks with a higher granularity than we have today. As it is
now, the locking is done at type level (class level for the OO
fanatics). This means that if some thread locks CRYPTO_LOCK_RSA, all
operations that need to lock
The message that you sent was undeliverable to the following:
DWILBUR
Information about your message:
Subject: Re: The cost of pthread-mutexes or corresponding...
I thought that in this case it was simply a matter of using the existing
CRYPTO_LOCK_RSA. I had a look at the other few references and can't see any
way that a deadlock could occur due to this reuse. Or is this lock only
supposed to be used for thread-safe reference counting?
Since the use of
Tom,
Another question - there is one case in there where
the comment says "we have SSLv3/TLSv1 in an SSLv2
header" - did I miss this in the Netscape V3 spec,
or is it specified somewhere else?
In my version of the Netscape V3 spec, it is in Appendix E, "Version 2.0
Backward
The hardware that I am creating an ENGINE module for
is capable of generating random numbers, so I'm adding
a RAND_METHOD.
I think our hardware's basic method of generating
randomness is pretty good, but the HW engineer is going
to stir and combine the first stage randoms even further
to get
Hi there,
On Thu, 14 Dec 2000, Tom Biggs wrote:
Ah, what I wouldn't give to strap a profiler to a really busy
Apache/mod_ssl commerce server, to see exactly what
gets heavily used and what is hardly touched. This is
just one of the many questions I have which could be
answered by such
I hope someone can help me on this:
I've been trying to verify a PKCS#7 format signature using
RSA_public_decrypt() function. I have no problem verifying it if i sign
it with a NonRepudiation certificate. However, RSA_public_decrypt gives
me -1 when the signature is signed using a
From: Rich Salz [EMAIL PROTECTED]
rsalz It's probably OK to create, say,
rsalz 1 of the former without ay problem, the latter would create
rsalz problems in those quantities:
rsalz
rsalz 10,000 locks? That concerns me.
I did exagerate a bit, but I see the possibility in big-scale SSL
14 matches
Mail list logo