On Aug 11, 2009, at 7:40 PM, Stephen Henson via RT wrote:
[seggelm...@fh-muenster.de - Mon Jul 27 17:03:25 2009]:
This patch fixes the timeout handling. The method dtls1_get_timeout()
was intended to determine the next handshake message timeout when
using select() calls, to set their
I have tried this on Windows XP with 8.9.k and on Linux/Ubuntu with
-SNAPSHOT two days ago.
D:\Documents and Settings\ksmelkovsC:\Program
Files\OpenSSL\bin\openssl.exe x509 -inform der -in Desktop\1.cer -text
unable to load certificate
5568:error:0D0680A8:asn1 encoding
Type of request: enhancement request
Operating system: tested on Linux, probably affects all
Version of OpenSSL: tested on 0.9.8k, seen in current CVS as well
Problem:
openssl s_client is a useful tool to debug many kinds of certificate
issues. When it comes to chain verification, however, the
[konr...@smelkovs.com - Wed Aug 12 09:02:19 2009]:
I have tried this on Windows XP with 8.9.k and on Linux/Ubuntu with
-SNAPSHOT two days ago.
D:\Documents and Settings\ksmelkovsC:\Program
Files\OpenSSL\bin\openssl.exe x509 -inform der -in Desktop\1.cer -text
unable to load certificate
Mandatory information:
Request type: PATCH
OS and arch: GNU/Linux on IA-32
OpenSSL version: 0.9.8k
Hi,
I've found a memory leak and a potential buffer overflow in
d2i_SSL_SESSION() function. The fix is attached. Some explanations are
below.
1) First part. Memory leak. When doing simply
Mandatory information:
Request type: PATCH
OS and arch: GNU/Linux on IA-32
OpenSSL version: 0.9.8k
Hi,
This is a small patch for README file which updates the instructions on
how to send bug reports and patches.
--
Best regards,
Alexei Khlebnikov,
Opera Software ASA, Norway.
Thank You,
it works. I can only suggest adding this to FAQ.
--
Konrads Smelkovs
Applied IT sorcery.
On Wed, Aug 12, 2009 at 2:46 PM, Stephen Henson via RT r...@openssl.orgwrote:
[konr...@smelkovs.com - Wed Aug 12 09:02:19 2009]:
I have tried this on Windows XP with 8.9.k and on
Hi,
I'm using Xsupplicant 1.2.8 to authenticate a PC to another with
hostapd-0.6.9 and freeradius-server-2.1.6. Both of them are running OpenSSL
0.9.8g. Authenticating with TLS method there is no problem, but when I try to
authenticate with TTLS (and any inner authentication: mschapv2,
[alexei.khlebni...@opera.com - Wed Aug 12 14:20:14 2009]:
This is a small patch for README file which updates the instructions on
how to send bug reports and patches.
I've updated this with a bit more explanation. Note that openssl-bugs is
an alias for rt so they all end up in the same
Hello,
I have put some effort and succeeded to build version 1.0.0 Beta 3 on
OpenVMS.
... actually the lion part of the job was already done by SMS and
properly merged up to 1.0.0 Beta - as you can read at
http://antinode.info/ftp/openssl/0_9_8j/notes_0_9_8j.txt
I was forced to change few make
From: Arpadffy Zoltan zoltan.arpad...@scientificgames.se
As you probably know VMS has a different DIFF output than UNIX diff and
is not able to produce patch output.
Please advice, how can I share my changes.
May I submit a standard VMS diff output here?
You might try GNU diff for
11 matches
Mail list logo