X509 problem

2014-09-24 Thread Amir Reda
dear all i have problem in my code it is a client send a certificate request to server which reply by the X509 certificate my problem is i have put in the client side a function called void Client::SetCert(X509_REQ *req) that set the certificate for the client also write it in a pem file so i

Re: X509 problem

2014-09-24 Thread nicolas . kox
it seems that function CreateCertificate is not defined in client.cc Regards - Mail original - De: Amir Reda amirale...@gmail.com À: openssl-users@openssl.org Envoyé: Mercredi 24 Septembre 2014 13:37:13 Objet: X509 problem dear all i have problem in my code it is a client send a

Re: X509 problem

2014-09-24 Thread Amir Reda
no sir it is defined i have a pointer from the server as an attribute in the client side if it isn't defined it will give a syntax error and i don't have a syntax error thx for reply On Wed, Sep 24, 2014 at 2:44 PM, nicolas@free.fr wrote: it seems that function CreateCertificate is not

Re: X509 problem

2014-09-24 Thread nicolas . kox
my bad... good luck anyway - Mail original - De: Amir Reda amirale...@gmail.com À: openssl-users@openssl.org Envoyé: Mercredi 24 Septembre 2014 13:53:30 Objet: Re: X509 problem no sir it is defined i have a pointer from the server as an attribute in the client side if it isn't

Re: X509 problem

2014-09-24 Thread nicolas . kox
I don't want to make a mistake again, but when you create you create your client you still need to set the pointer m_ca to server Client :: Client(Server* srv) { m_myCertReq = X509_REQ_new(); m_myCert = X509_new(); m_name = X509_NAME_new();

Leak in BN_rand_range?

2014-09-24 Thread Jeffrey Walton
I've got a program that repeatedly calls BN_rand_range. Valgrind is reporting 2.4 MB of leaks. If I comment out the loop that generates the range value, then the leak summary drops to 0. Is there anything else I should be doing below? ** Error checking was removed from the sample, but

Re: Leak in BN_rand_range?

2014-09-24 Thread Mounir IDRASSI
Hi, The leak comes from the fact that you are passing a NULL value parameter to BN_rand_range. This is unexpected as this is where the result is supposed to be written. Internally, because of this NULL pointer, OpenSSL allocate temporary BIGNUM that gets lost (allocated in the call to BN_bin2bn

Re: Leak in BN_rand_range?

2014-09-24 Thread Jeffrey Walton
On Wed, Sep 24, 2014 at 1:04 PM, Mounir IDRASSI mounir.idra...@idrix.net wrote: The leak comes from the fact that you are passing a NULL value parameter to BN_rand_range. This is unexpected as this is where the result is supposed to be written. Internally, because of this NULL pointer,