Hello folks,
there seems to be a minor bug
in the pasword getter:
Bye
Goetz
Index: apps/apps.c
===
RCS file: /usr/cvsroot/openssl/apps/apps.c,v
retrieving revision 1.73
diff -u -r1.73 apps.c
--- apps/apps.c 2003/10/29 14:25:50
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
Hello Richard,
Richard Levitte - VMS Whacker wrote:
In message [EMAIL PROTECTED]
on Thu, 26 Jun 2003 12:55:22 -0400, Lee Dilkie [EMAIL PROTECTED] said:
OK, I've been follownig this discussion for a while, and it's time I
ake action. Basically, to provide for all the current and future ways
of
Hello,
[EMAIL PROTECTED] wrote:
64-bit vs 32-bit systems
It looks to me like a 64-bit client cant connect to a 32-bit server.
The ASN1 structures/headers have int's and longs scattered throughout
them (and probably in other parts of the openssl libraries). In fact,
the 32-bit server fails
Hello Bodo,
Bodo Moeller wrote:
Server: cvs.openssl.org Name: Bodo Moeller
Root: /e/openssl/cvs Email: [EMAIL PROTECTED]
Module: openssl Date: 19-Mar-2003 19:58:56
Branch: OpenSSL_0_9_7-stable Handle:
Hello Steve,
Stephen Henson via RT wrote:
I've committed a fix to address this issue which will appear in the next
dev and stable snapshot (i.e. so it will appear in 0.9.7a).
Let me know of any problems ASAP.
I finally got around to do some quick tests.
Seems to be OK.
Could
Hello Bodo,
Bodo Moeller wrote:
Please test snapshot openssl-0.9.7-stable-SNAP-20030214.tar.gz
(or later), which will be available today around 8 p.m. GMT at
URL: ftp://ftp.openssl.org/snapshot;type=d .
OpenSSL 0.9.7a-dev XX xxx 2003
built on: Fri Feb 14 22:35:41 CET 2003
platform:
Hello Steve,
Stephen Henson via RT wrote:
[[EMAIL PROTECTED] - Mon Feb 10 16:53:48 2003]:
Stephen Henson via RT wrote:
[[EMAIL PROTECTED] - Fri Feb 7 14:09:28 2003]:
It really needs replacing with something less horrible. For example it
might:
1. Build the chain using the normal
Hello Steve,
Stephen Henson via RT wrote:
[[EMAIL PROTECTED] - Mon Feb 10 20:02:40 2003]:
OK.
I should clarify myself:
It is to do it correctly, but not needed to fix the actual problem.
However option 4 easy to do and could be argued as being a bug fix.
OK.
Perhaps something like:
Hello Lutz,
Lutz Jaenicke wrote:
On Thu, Feb 06, 2003 at 07:42:39PM +0100, Götz Babin-Ebell wrote:
Hell folks,
there seems to be a strange behavior with CA certificates
in SSL server:
I create a SSL_CTX for a server,
set the certificate and the private key
and add some CA certificates
Geoff Thorpe schrieb:
(b) any/all access information (eg. control commands, authorisation
data, the ENGINE id if necessary, etc) that you *want* to include
in the key file should not go into the raw PEM format itself but
instead should be embedded in the per-'nid' data
Lutz Jaenicke schrieb:
On Tue, Jul 30, 2002 at 09:35:40PM +0200, Götz Babin-Ebell wrote:
PLEASE: could these message be digitally signed ?
We will update our release procedures.
Fine...
(A signature file for the 0.9.7e beta would be nice...)
The signature file is available from the ftp
Lutz Jaenicke schrieb:
Hello,
The third beta release of OpenSSL 0.9.7 is now available from the
OpenSSL FTP site URL: ftp://ftp.openssl.org/source/. Quite a lot
of code changed between the 0.9.6 release and the 0.9.7 release, so
a series of 3 or 4 beta releases is planned before the final
Lutz Jaenicke schrieb:
On Sat, Jun 15, 2002 at 01:01:08AM +0200, Richard Levitte - VMS Whacker wrote:
In message [EMAIL PROTECTED] on Fri, 14 Jun 2002
20:59:59 +0200 (MET DST), [EMAIL PROTECTED] said:
jaenicke diff -u -r1.7.8.1 -r1.7.8.2
jaenicke --- c_all.c 2002/02/23 02:09:25
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
Lutz Jaenicke schrieb:
On Sat, Jun 15, 2002 at 07:38:40PM -0400, Geoff Thorpe wrote:
On Fri, 14 Jun 2002, [ISO-8859-15] Götz Babin-Ebell wrote:
In the ..._ctrl()-Function of the engines a passed string
is only referenced and not copyed.
This is bad if the buffer with the passed data
Richard Levitte - VMS Whacker wrote:
From: Jani Taskinen [EMAIL PROTECTED]
sniper From CHANGES:
sniper
sniper *) Rename 'des_encrypt' to 'des_encrypt1'. This avoids the clashes
sniper with des_encrypt() defined on some operating systems, like Solaris
sniper and
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]
Götz Babin-Ebell via RT wrote:
Oups.
It seems I didn't mention the OpenSSL version:
0.9.6c / 0.9.7 (snap from 28.05.2002)
Sorry...
Hello folks,
there seems to be a bug in pkcs12/p12_kiss.c:
PKCS12_parse():
if you enter the function with an allocated
ca stack and the parse fails
Ralf S. Engelschall wrote:
In article [EMAIL PROTECTED] you wrote:
On Tue, Apr 23, 2002 at 10:24:23PM -0600, Kurt Seifried wrote:
[...]
I cannot comment on the OpenSSL-Announce list. Only the core members
should be allowed to send via this list.
Probably the list should be switched
John Cebasek wrote:
Hi All;
Hello John,
I need some comments.
We've been creating some 'black boxes' for other developers in our company
to work with. One of the black boxes is opensll. We want to distribute to
our developers just 'enough'. So they'll be getting the libraries, but
Hello,
is there a way to ask the random engine about how much randomness
it contains ?
RAND_status() returns 1 if the random pool contains at least
20 bytes (ENTROPY_NEEDED in rand_lcl.h).
That is OK for SSL handshake, but for asymetric key generation
we need a lot of more entropy.
Something
from e_os.h:
#if defined(THREADS) || defined(sun)
^^^
#ifndef _REENTRANT
#define _REENTRANT
#endif
#endif
why ?
and why is it exported ?
Bye
Goetz
--
Goetz Babin-Ebell, TC TrustCenter AG, http://www.trustcenter.de
Sonninstr. 24-28, 20097 Hamburg, Germany
Dave Barter wrote:
I hope I have the right list for this, my apologies if I don't.
I would like to modify the openssl genrsa program to quietly generate
keys, ie. Not print the '.' and '+' characters to STDOUT when generation
occurs. Basically I would like to add the flag -quiet to the
[EMAIL PROTECTED] wrote:
Index: mem_dbg.c
===
if (mh == NULL) return;
+ /* Need to turn off memory checking when allocated BIOs ... especially
+ * as we're creating them at a time when we're trying to
Richard Levitte - VMS Whacker wrote:
From: Jani Taskinen [EMAIL PROTECTED]
sniper From CHANGES:
sniper
sniper *) Rename 'des_encrypt' to 'des_encrypt1'. This avoids the clashes
sniper with des_encrypt() defined on some operating systems, like Solaris
sniper and
Richard Levitte wrote:
Hello Richard,
As a few people noticed, not only was the announcement of OpenSSL 0.9.6b sent
more than once (due to, eh, technical error...), but the version number was
0.9.6a everywhere in the message body!
Shit happens...
OpenSSL version 0.9.6b released
Andy Brown wrote:
I believe I've found a bug with the UNIX command-line "openssl enc"
It's not a bug, it's a feature... ;-)
utility. If you specify the hex key (with -K) on the command line, the IV
is some randomish garbage, probably whatever happens to be in memory.
Shouldn't the default
[EMAIL PROTECTED] wrote:
levitte 29-Mar-2001 09:45:09
Modified:crypto/des Tag: OpenSSL_0_9_6-stable xcbc_enc.c speed.c
pcbc_enc.c ofb_enc.c ofb64enc.c ncbc_enc.c
ede_cbcm_enc.c ecb_enc.c des_opts.c des_enc.c des.h
Hallo,
has the EVP interface (sign/verify) a way to specify
the padding for the signed data ?
And I would like to add a way to support other padding types
(something like
RSA_add_padding(..., int adding, int (*fct)(unsigned char *to,
int tlen, unsigned char *from,int flen))
)
By
Goetz
--
32 matches
Mail list logo