Hello,
I received the Original Message below and a shorter message
CC'ed to [EMAIL PROTECTED], that I paste further below
as Original Message 2.
The problem is: I NEVER WROTE THE ORIGINAL QUESTION
My e-mail address is correct. The last time I wrote to [EMAIL PROTECTED]
has been on Fri, 27 Sep
Someone on the list is infected with the Win32.Bugbear worm, see
www.vet.com.au. I've been getting a fair bit of these strange messages
recently. Bugbear scans the computer for email, and can compose a message
taken from a fragment of email that it finds, fake the from address with an
address
I have setup a very simple SSL connection over sockets, and use the
SSL_read and SSL_write functions to get and send encrypted data. With
the socket read/write functions in C you can send/recv OOB (out of band)
data - which I use for state maintenance. Is it possible to send/recv
OOB data with
You cannot use OOB data with SSL/TLS.
I have setup a very simple SSL connection over sockets, and use the
SSL_read and SSL_write functions to get and send encrypted data. With
the socket read/write functions in C you can send/recv OOB (out of band)
data - which I use for state maintenance.
Interesting - okay ;-) Thanks for the info.
Do you know whether is is simply because its not in the ssl code, or is
it a restriction based on SSL design? i.e. is it possible by hacking the
openssl lib, or are they mutually exclusive?
Thanks!
Nate
On Thu, 2002-10-31 at 10:26, Jeffrey Altman
Anyone there have an idea as to when the new 0.9.6h release will occur ?
We need to build a kit that includes the race condition fixes implemented several
weeks
ago, but I can't see any chatter as to when the official release will be.
Thanks,
Barry L. Moore
Software Engineer
TECSys
Hi,
When I generate a CRL form an intermediate CA the issuer for the CRL is the issuer
of the intermediate CA, although the CRL is signed with the intermediate CA key.
So I looked in the CA source code and that's what I found:
apps/ca.c:1459
if (!X509_CRL_set_issuer_name(crl,
Dear Sir/Madam,
I would like to use your Open SSL 0.9.6 for web project for security
purpose..
These are the Steps we did.
1) Downloaded the files( openssl-engine-0.9.6g.tar.gz and
openssl-0.9.6g.tar.gz ) from http://www.openssl.org/source/
2) Unzipped using Win Ace2.1
3) Installed Perl from
In message [EMAIL PROTECTED] on Thu, 31 Oct 2002 22:44:42
+0100 (MET), Frédéric Giudicelli via RT [EMAIL PROTECTED] said:
rt apps/ca.c:1459
rt if (!X509_CRL_set_issuer_name(crl, X509_get_issuer_name(x509))) goto err;
rt
rt Shouldn't it be
rt if (!X509_CRL_set_issuer_name(crl,
In message [EMAIL PROTECTED] on Thu, 31 Oct 2002 22:44:42
+0100 (MET), Frédéric Giudicelli via RT [EMAIL PROTECTED] said:
rt apps/ca.c:1459
rt if (!X509_CRL_set_issuer_name(crl, X509_get_issuer_name(x509))) goto err;
rt
rt Shouldn't it be
rt if (!X509_CRL_set_issuer_name(crl,
In message [EMAIL PROTECTED] on Thu, 31 Oct 2002 22:44:33
+0100 (MET), Frédéric Giudicelli via RT [EMAIL PROTECTED] said:
rt The authorityKeyIdentifier extension seems to behave weirdly...
rt
rt I have a two level CA architecture:
rt ROOT CA
rt INTERMEDIATE CA
rt For both CA:
rt
In message [EMAIL PROTECTED] on Thu, 31 Oct 2002 22:44:33
+0100 (MET), Frédéric Giudicelli via RT [EMAIL PROTECTED] said:
rt The authorityKeyIdentifier extension seems to behave weirdly...
rt
rt I have a two level CA architecture:
rt ROOT CA
rt INTERMEDIATE CA
rt For both CA:
rt
All I know, is that MS Windows 2000 SP3 consider the chain broken, it links
the EndUser Cert with the ROOT CERT, and since the issuer of the EndUser
Cert is not ROOT CA, badaboum, unusable certificate.
When authorityKeyId=keyid, it works, when authorityKeyId=keyid, issuer -
doesn't work.
So I
Barry Moore wrote,
Anyone there have an idea as to when the new 0.9.6h release will
occur ?
We need to build a kit that includes the race condition fixes
implemented several weeks ago, but I can't see any chatter as to
when the official release will be.
Thanks for pointing me at this patch.
In message [EMAIL PROTECTED] on Thu, 31 Oct 2002 23:19:17
+0100 (MET), Frédéric Giudicelli via RT [EMAIL PROTECTED] said:
rt All I know, is that MS Windows 2000 SP3 consider the chain broken,
rt it links the EndUser Cert with the ROOT CERT, and since the issuer
rt of the EndUser Cert is not ROOT
In message [EMAIL PROTECTED] on Thu, 31 Oct 2002 23:19:17
+0100 (MET), Frédéric Giudicelli via RT [EMAIL PROTECTED] said:
rt All I know, is that MS Windows 2000 SP3 consider the chain broken,
rt it links the EndUser Cert with the ROOT CERT, and since the issuer
rt of the EndUser Cert is not
Well Microsoft support tells me it's openssl's fault, and you tell me it's
microsoft's ?
It's dead end, what am I supposed to tell my clients ?
Well... altough PKIX recommends the use of the authorityKeyId, and that the
French Government says you must to have this extension, to be certified,
I'll
I am using EVP_Open, EVP_Seal to exchange information in several iterations,
i.e open message 1, seal response 1, open message 2, seal response 2 using
the same keys, etc (same EVP_CIPHER_CTX). I can do EVP_OpenInit,
OpenUpdate,OpenFinal followed EVP_SealUpdate, EVP_SealFinal which works
fine,
Hi,
I'm running openssl-0.9.6g (on WinXP, compiled with VC6 and masm).
As I understands it, the i2d_X509_fp function should return the cert length
(in bytes) upon success. It doesn't, 1 is always returned. When I stepped
into the code, I end up in a function called ASN1_i2d_bio (a_i2d-fp.c).
19 matches
Mail list logo