This is a patch suggestion that I submitted previously
and am sending again (this time via RT) at Nils'
request.
It was for an SSL compression methods free function
which may be called to free the SSL compression
methods stack in a similar fashion to the
EVP_cleanup() function for the EVP digest
Hi list,
I am currently reading openssl code of version 0.9.8-beta2, and I don't
quite understand the piece of comment above the function
dh_builtin_genparams() in /crypto/dh/dh_gen.c.
In general it says: if $p$ is a safe prime, and $2$ is a generator of
the cyclic group modulo $p$(i.e, $2$ is
Hi
I know there was a thread a while ago concerning openssl for windoze
mobile. Has this become reality in the meantime?
Thanks
Erich Titl
__
OpenSSL Project http://www.openssl.org
Development
Windows CE has been supported since OpenSSL 0.9.7. Some post 0.9.8 patches
seem to have fixed some issues that were preventing eVC4 from being used.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Erich Titl
Sent: Thursday, 22 September 2005 11:39 PM
Steven Reddie wrote:
Windows CE has been supported since OpenSSL 0.9.7. Some post 0.9.8 patches
seem to have fixed some issues that were preventing eVC4 from being used.
Thanks for the info, do you know if anyone has a binary package
available, else I will have to dig in embedded VC++
Thanks
Windows CE is supported since 0.9.7 but no support is given to Pocket PCs or
Windows Mobile editions. Windows CE, surname CE: compact edition, is a
huge operating system for a Mobile device. To use windows CE in mobiles
devices and Mobile phones, profiles named as Mobile or PocketPC has been
There is no official binary package available, but maybe someone on the list
can help.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Erich Titl
Sent: Friday, 23 September 2005 1:10 AM
To: openssl-dev@openssl.org
Subject: Re: openssl for windows mobile
OpenSSL 0.9.7 does support Pocket PC (the original and Pocket PC 2002
editions), in fact it should work with anything that eVC3 supports. I think
it was Pocket PC 2003 that first required eVC4 and so that release was not
supported until the recent post-0.9.8 patches.
-Original Message-
On Thu, Sep 22, 2005 at 04:07:06PM +0200, Martin Kraemer wrote:
I have an Apache-2.3 (HEAD revision) server with SSL, and was testing
a configuration with
SSLVerifyClient require
switched on.
As long as the SSLCACertificateFile file contained only the cert
of my own CA, everything was
Sorry, i have not tested openssl with 2002 versions. All i said is for 2003
versions. I have built OpenSSL for 2003 versions, if needed i will forward
another time the patch I sent to this list a pair of months ago.
Dani
*´¯`*.¸¸.*´¯`*.¸¸.*´¯`*.¸¸.*´¯`*.¸¸.*´¯`*.¸¸
Hi,
I think that there's a race with OpenSSL-0.9.8 updating the
new, post-0.9.7 shared mt_blinding object on a multithreaded
(MySQL-4.1 for instance) environment.
The proposed solution is to use an exclusive write lock while
invert()ing the blinding process. This guarrantees that the
update of
[SunOS 4.1.4]
making all in apps...
make[1]: Entering directory `.../openssl-0.9.8-stable-SNAP-20050921/apps'
gcc -DMONOLITH -I.. -I../include -O3 -mv8 -Dssize_t=int -c -o verify.o
verify.c
In file included from apps.h:115,
from verify.c:62:
../e_os.h:569: o_str.h: No
Sorry, i have not tested openssl with 2002 versions. All i said is for 2003
versions. I have built OpenSSL for 2003 versions, if needed i will forward
another time the patch I sent to this list a pair of months ago.
By mid-August 0.9.8 snapshots were reported to compile out-of-box on a
number
This patch fixes the misplacement of a generated .pdb file when
building a debug version of openssl with Visual C.
Attached file 0.9.7-stable-SNAP-20050922-yang-diffs.patch is the patch
for 0.9.7-stable snapshot 20050922.
Attached file 0.9.8-stable-SNAP-20050922-yang-diffs.patch is the patch
Leandro Santi wrote:
Hi,
I think that there's a race with OpenSSL-0.9.8 updating the
new, post-0.9.7 shared mt_blinding object on a multithreaded
(MySQL-4.1 for instance) environment.
The proposed solution is to use an exclusive write lock while
invert()ing the blinding process. This
[EMAIL PROTECTED] via RT wrote:
Hi
We have ported the openSSL code for our project.We use SSL to
authenticate the users who use FTP to the controller(which is basically
a printer). We have different groups such as developer, user, designer
etc. each will have access permissions
I am
We use DES encryption algorithm.When the user try to add an user with
the password 12345678 ,user couldn't login. So itried printing the DES
decrypted password, it returns junk password. Since it is junk user
couldn't login. Basically we maintain a file which will have the list of
users added
17 matches
Mail list logo