Problem with make on Solaris 5.6 openssl version 0.9.4

1999-11-16 Thread Sue Beggs
I am trying to build openssl-0.9.4 on Solaris 5.6 and getting the following errors from make after running ./config no-threads: making all in crypto... ( echo "#ifndef MK1MF_BUILD"; \ echo " /* auto-generated by crypto/Makefile.ssl for crypto/cversion.c */"; \ echo " #define CFLAGS \"cc

Make problem with 0.9.4 on HPUX 11.00

1999-11-16 Thread Peter Sorensen
Hi, I have just downloaded the openssl source, and I have som troubles making the certs sa showed below. Make is failing why?? Output from config -t: Operating system: 9000/813-hp-hpux11 Configuring for hpux11 /usr/bin/perl ./Configure hpux11 openssl version: 0.9.4 Output from make

Make Test failure in latest cvs version (cvs commit: openssl/doc/man enc.pod)

1999-11-16 Thread mads
The current cvs version(checked about 11 am today) fails make test on unix for me - with the error: rc4-64 is an unknown cipher options are (Somewhere after exptest) My last compile was friday, without any problems in make test. I think that the problem is from a commit by Stephen Henson:

Re: Problem with make on Solaris 5.6 openssl version 0.9.4

1999-11-16 Thread Guido Van De Velde
Sue Beggs wrote: I am trying to build openssl-0.9.4 on Solaris 5.6 and getting the following errors from make after running ./config no-threads: making all in crypto... ( echo "#ifndef MK1MF_BUILD"; \ echo " /* auto-generated by crypto/Makefile.ssl for crypto/cversion.c */"; \ echo "

X509_NAME_ENTRY problems

1999-11-16 Thread khe
Can anyone see what is wrong with the code below? Unless I specifically set pX509NameEntry = NULL after every call to X509_NAME_ENTRY_free(pX509NameEntry), I get an access violation in libeay32.dll when I do the next call to X509_NAME_ENTRY_create_by_NID(...). Shouldn't X509_NAME_ENTRY_free(...)

Re: X509_NAME_ENTRY problems

1999-11-16 Thread Lutz Jaenicke
On Tue, Nov 16, 1999 at 04:28:35PM +0100, [EMAIL PROTECTED] wrote: Can anyone see what is wrong with the code below? Unless I specifically set pX509NameEntry = NULL after every call to X509_NAME_ENTRY_free(pX509NameEntry), I get an access violation in libeay32.dll when I do the next call to

connect to SSL port authentication request

1999-11-16 Thread Marcin_Citowicki
Hello, I want to learn how the SSL works and I'm trying to write an implementation of it. I have a problem, though - after I connect to SSL port (443) there is already data ready to be read from the socket - it's a message which says "Error: must authenticate before using this service". I

(newbie) Problem connecting with a specific server

1999-11-16 Thread paul anderson
I am having a problem using openssl s_client to connect to the following server: 156.77.100.189:443 When I try to connect, I get an ssl handshake failure. I suspect this has something to do with the fact that I am using the supplied test certificates, but being a total ssl newcomer, I

Re: cvs commit: openssl/ssl ssl_sess.c

1999-11-16 Thread Bodo Moeller
On Tue, Nov 16, 1999 at 10:30:10PM +, Geoff Thorpe wrote: Maybe we should have a naming convention for ..._set_... calls too? There are already such ambiguities for them, e.g. SSL_CTX_set_tmp_rsa vs. SSL_CTX_set_tmp_dh. It seems to be a play-off between backwards compatibility, and

OPENCA NEW RELEASE AVAILABLE (v0.2.0)

1999-11-16 Thread Massimiliano Pala
OpenCA Version 0.2.0 RELEASED - Major Release = OpenCA - The Open Certification Authority Toolkit (http://www.openca.org) The OpenCA core team is proud to announce the new release of the OpenCA. This version incorporates many

Re: (newbie) Problem connecting with a specific server

1999-11-16 Thread Patrik Carlsson
As far as I can see 156.77.100.189:443 doesn't send its full certificate chain => OpenSSL can't verify the server certificate. (Would be nice with a working verify option...) Connecting with Netscape works fine because the issuer (RSA Data Security, Secure Server Certification Authority) is in

SV: X509_NAME_ENTRY problems

1999-11-16 Thread khe
Well, it cannot do that for you. X509_NAME_ENTRY_free() receives the pointer and has write access to change the place to which the pointer is pointing, it however cannot manipulate the pointer itself, which is defined in the calling function. This would only be possible, if the call would