Hello there.
There is a bug in ASN1_BITSTRING length calculation during packing to DER (function
i2c_ASN1_BITSTRING).
According to ITU-T X.690, DER encoders should remove all trailing 0 bits BEFORE
encoding.
I.e. the length of the encoded bitstring should be calculated after removing such
hi!
the following code is for the ssl server code
it is not running properly and gives memory access error!
any ideas...?
regards
Deepak Saini
/***
* SSL Server sample *
***/
#include stdio.h
#include windows.h
#include conio.h
#include
hi frinedz!
hope u can help me with this..
the following function call is returning me a value less than 0...
what exactly does this function does.
err = SSL_CTX_use_certificate_file(ctx, servcert.pem, SSL_FILETYPE_PEM);
or may be u can tell me where to look for info on this
regards
Deepak
Hello Noel,
You may as well try to find a way to workaround this problem for your
platform, instead of just removing the offending code (which may break
other things) ...
This is taken from the MSDN library description of
CreateToolhelp32Snapshot():
Windows NT/2000/XP: Included in Windows
Deepak Saini wrote:
hi!
the following code is for the ssl server code
it is not running properly and gives memory access error!
any ideas...?
gdb?
Cheers,
Ben.
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
There is no limit to what a man can do or how far he can
At 15:16 28.05.2002 -0600, you wrote:
Has anyone seen anything like this that we could leverage off? Is there
any source code we could use as a model or even a general discussion of
the architecture that we could use in writing our own server that would
be optimized to handling as many handshakes
The problem is fixed. As Lutz pointed out, we missed enginetest.c
when converting all strdup() to BUF_strdup()...
--
Richard Levitte
[EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
I understand the concern here, but I very strongly disagree with the
solution. Casting everything from size_t to int is going in the wrong
direction.
I'll work on moving int to size_t where needed. If someone can tell
me how to simulate have a 64-bit size_t on Linux, it would make it
Hi, Deepak.
You can try few things:
1. Check whether you passing certificate file with valid path to the
function.
2. Use SSL_get_error() after this function to fetch the exact error from
errors stack (you can use it in loop, as maybe there are few errors
regarding this). Before calling it -
Richard,
Actually, I agree completely. Frankly I was a little afraid to say it,
as it entails so many changes to the code base. The entire concept of
the P64 memory model not allowing int's to be used naturally is foreign
to the ideals set out by the C language. However there is a slim
10 matches
Mail list logo