On Mon, Dec 18, 2000 at 12:56:21PM -0800, Geoff Thorpe wrote:
[...]
What if the code was structured as follows;
if((rsa-_method_mod_n == NULL) [etc])
{
BN_MONT_CTX *bn_mont_ctx;
int bailout;
if((bn_mont_ctx=BN_MONT_CTX_new()) == NULL)
[do
On Mon, Dec 18, 2000 at 12:27:45PM -0500, Tom Biggs wrote:
[...]
Then it says "The ability to send v2 ClientHello messages will
be phased out with all due haste" etc. Good thing too.
But has it happened?
How many browsers still do this? I guess some old ones
are still doing this, I
Hi everybody,
I just wanted to point out a trap, which I encountered. I am developing an SSL
enhancement
for our SMTP interface and I am using
OpenSSL. I start testing under Win2000 and everything worked fine. After that I tried
it
out under NT4.0 (SP6) and the application hang up
on
On Mon, Dec 18, 2000, [EMAIL PROTECTED] wrote:
bodo18-Dec-2000 17:36:11
Modified:.Tag: OpenSSL_0_9_6-stable CHANGES
crypto/rsa Tag: OpenSSL_0_9_6-stable rsa_eay.c
Log:
Obtain lock CRYPTO_LOCK_RSA before creating BN_MONT_CTX
structures and
The problem with only locking during the assignment is that potentially
mutliple threads will be doing [extensive] work that will be thrown away
when they discover that another thread beat them to it. The result could be
that the lock is held for less time, but all threads do more work and
Hi,
i am trying to parse a pkcs#5 encrypted pkcs#8 private
key. it is B64 encoded, with -BEGIN ENCRYPTED
PRIVATE KEY- as a name, but no header info, using
the following command:
openssl pkcs8 -in keyfile
i am getting an error:
Warning: broken key encoding: No Octet String in
PrivateKey
Zeo Bartoli wrote:
Hi,
i am trying to parse a pkcs#5 encrypted pkcs#8 private
key. it is B64 encoded, with -BEGIN ENCRYPTED
PRIVATE KEY- as a name, but no header info, using
the following command:
openssl pkcs8 -in keyfile
i am getting an error:
Warning: broken key encoding:
Hi,
On Wed, 20 Dec 2000, Reddie, Steven wrote:
The problem with only locking during the assignment is that potentially
mutliple threads will be doing [extensive] work that will be thrown away
when they discover that another thread beat them to it. The result could be
that the lock is held
Geoff touches on (actually, implies :) some good points.
Again, I want to point interested folks to the following:
http://gatekeeper.dec.com/pub/DEC/SRC/research-reports/abstracts/src-rr-035.html
Written by Andrew Birrell in 1989, 35 highly readable pages. The abstract:
This paper provides
Thanks for the clarification Geoff. I see where you're coming from. In my
application it is only the single instance of the application's private key
that really needs protecting. The per-worker-thread public keys are never
shared across threads and therefore don't need to incur the cost of
I'm a bit of a newbie and am trying to get some clarification and better
understanding on an issue (spurred by Seifred's controversial article):
How does using Stanford SRP solve (or does it?) verification, the MITM
problem, and need for a CA?
I'm a bit of a newbie and am trying to get some clarification and better
understanding on an issue (spurred by Seifred's controversial article):
How does using Stanford SRP solve (or does it?) verification, the MITM
problem, and need for a CA?
12 matches
Mail list logo