Hello folks,
There seems to be a ressource leak in the chil engine:
Afer running 6 hours, apache stops to accept SSL requests:
[Mon Aug 26 20:41:02 2002] [error] OpenSSL: error:26089076:engine
routines:HWCRHK_MOD_EXP:request fallback
[Mon Aug 26 20:41:02 2002] [error] OpenSSL:
Hi,
Is management material (re-keying data etc) send before or after user data?
Let me try to explain the senario:
There is a Server S and a Client C and a SSL connection
established between them. S always sends 16 bytes packets of
data. C has to listen on the SSL connection and for user input
That's pretty much what I've done, although overloading no-hw. I'll change
this to no-engine and send on some pacthes. I've totally ifdef'd out the
engine related code in RSA_new_method, etc., although these functions are of
course still passed an ENGINE* which gets ignored. I wasn't sure
of
functions to add to the toolkit, but the base functionality is there. I
decided to test the toolkit so far on OpenSSL, since it's basically just
packing a bunch of files (and adding to PATH). If anyone is curious,
here is a patch:
ftp://ftp.runestig.com/pub/misc/openssl-0.9.6g-msi-20020828.zip
http
works fine for me - no leaks - but then I'm not using Solaris 2.5.1 -
thats a bit old isnt it, I'm using chil on sol2.6 sol7 and sol8 ok
Götz Babin-Ebell wrote:
Hello folks,
There seems to be a ressource leak in the chil engine:
Afer running 6 hours, apache stops to accept SSL requests:
Title: Message
Is anyone out there
contemplating adding LDAP lookup to the stock certificate validation code on the
server side? Does this make sense as part of the library?
Dear Richard and the OpenSSL team,
I am very sorry for this delay. We have now got our legal review and
approval of the export license. We will be ready now to submit our changes
to OpenSSL organization to get it reviewed and approved. We would like to
use OpenSSL name to our port because
Hi,
I have a problem with `make test' on Irix 6.5.15 (cc used):
NIST curve P-384 -- Generator:
x =
0xAA87CA22BE8B05378EB1C71EF320AD746E1D3B628BA79B9859F741E082542A385502F25DBF55296C3A545E3872760AB7
y =
It seems possible that for certain very long certificate
chains the length will exceed the maximum ssl record
length (16384). While this appears to be very unlikely
the code could be buggy. Any thoughts?
__
OpenSSL Project
Does OpenSSL support ietf-tls-extensions-05.txt, the extension added to
enable TLS to operate as effectively as possible in new environment like
wireless?
Thanks,
Ling
__
OpenSSL Project
I hate buggy compilers! Building crypto/rand/rand_lib.c with -g flag fixes
the randtest problem and allows most of the tests to succeed. The treq fails
because openssl can't find subjectKeyIdentifier. Rebuilding crypto/x509v3
with -g clears this up. What a pain. (At this point the obvious thing
Ok, so after getting past the previous problems, the testca script failed.
Fixing this last problem allows the tests to successfully run to completion.
The problem was that the ca app didn't like the result it got from
ASN1_PRINTABLE_type() (apps/ca.c, line 1586) because the ASN1_PRINTABLE_type
By the way, here's the end of the successful make test...
make[1]: Leaving directory `/c56/c56006/openssl-0.9.6g/test'
OpenSSL 0.9.6g 9 Aug 2002
built on: Wed Aug 28 20:11:13 EDT 2002
platform: OS390-Unix
options: bn(32,32) md2(char) rc4(idx,char) des(ptr,cisc,16,long) idea(int)
blowfish(ptr)
13 matches
Mail list logo