On Windows, the socket function returns a value of type SOCKET (i.e.
*not* int). On 64 bit Windows (at least, Windows XP x64), SOCKET is
defined as unsigned __int64.
Sockets have to be passed to the openssl library using the call
SSL_set_fd. This functions accepts an int to pass the socket
-c.liu.se said:
levitte OPENSSL-SNAP-20090513 : PASSED
levitte OPENSSL-1_0_0-STABLE-SNAP-20090513 : PASSED
levitte OPENSSL-0_9_8-STABLE-SNAP-20090513 : PASSED
--
Richard Levitte rich...@levitte.org
http://richard.levitte.org/
Life
[seggelm...@fh-muenster.de - Tue May 12 16:44:34 2009]:
I have updated the last patch, considering the suggestions of Daniel
Mentz.
The previous solutions were done in the BIO object, which was not a
good choice. Additionally they didn't allow non-blocking sockets to be
used.
[danie...@sent.com - Thu May 07 12:40:28 2009]:
I hope that somebody can fix that problem or at least print out a log
message saying No DTLS support for ECDHE
This looks like this bit of DTLS code hasn't been updated for 1.0.0 .
The code in question looks like it is similar (identical?)
Thanks for applying this patch, as well as others, on my behalf.
PG
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List
This patch is broken due to line wrap issues. Try a plain text
attachment or if that fails a gziped one.
Ok, let's try a plain text attachment...
Some of the changes break source compatibility with previous
versions of
the patch. That's ok for now but once this stuff appears in a
On Wed, 2009-05-13 at 16:08 +0200, Robin Seggelmann via RT wrote:
This patch is broken due to line wrap issues. Try a plain text
attachment or if that fails a gziped one.
Ok, let's try a plain text attachment...
Some of the changes break source compatibility with previous
versions
[seggelm...@fh-muenster.de - Wed May 13 16:08:12 2009]:
This patch is broken due to line wrap issues. Try a plain text
attachment or if that fails a gziped one.
Ok, let's try a plain text attachment...
OK that's better but the patch doesn't apply cleanly to 1.0.0-stable:
getting
I wrote and submitted a documentation file for the OpenSSL AES routines
a 13 months ago. I was studying the code and thought I could be helpful
to the project. I believe that the file I wrote was entirely accurate
at the time of the submission. However, no one has taken the ticket or
commented
[steve - Wed May 13 14:29:35 2009]:
[danie...@sent.com - Thu May 07 12:40:28 2009]:
I hope that somebody can fix that problem or at least print out a log
message saying No DTLS support for ECDHE
This looks like this bit of DTLS code hasn't been updated for 1.0.0 .
The code in
From: Richard Levitte rich...@levitte.org
I just had the latest snapshots built, and all of them pass on OpenVMS
Alpha V8.3 using HP C V7.1-015 and the TCP/IP libraries from HP TCP/IP
Services for OpenVMS Alpha Version V5.6.
I'll ask one more time: Any chance that you've looked at the
I have added SSL_pending after select call just to ensure that data is
even not present in SSL buffers, incase select returns no data.
Should i add the same login for SSL_ERROR_WANT_READ:
SSL_ERROR_WANT_WRITE and then do a SSL_read.
Please advice.
Regards,
Pavan
On Tue, May 12, 2009 at 8:00
Sudarshan Soma wrote:
I have added SSL_pending after select call just to ensure that data is
even not present in SSL buffers, incase select returns no data.
That just makes more work for you. Unless you have some good reason not to,
you should just call SSL_read. If there is data already
OK that's better but the patch doesn't apply cleanly to 1.0.0-stable:
getting rejects in bss_dgram.c
Oh, I was still using beta 2 to create the patches and haven't noticed
the changes you made in the meantime. Here is a new version attached.
It was the change of the name of
14 matches
Mail list logo