Jason Schultz wrote:
One point of confusion for me, I read this email to say the OpenSSL
FIPS Object Module v1.2 will(may?) not be usable beyond 2010. But in
the first discussion link, I read that to say that the v1.2 Module
will not be suitable for private label validations(which require
Michael Sierchio wrote:
Forgive my ignorance, but are you a 501(c)3? Can you communicate
that in a signature line so it's obvious?
The OpenSSL Software Foundation (OSF) is *not* a non-profit
corporation. It was created for the purpose of supporting the
commercial activities of OpenSSL
One point of confusion for me, I read this email to say the OpenSSL FIPS Object
Module v1.2 will(may?) not be usable beyond 2010. But in the first discussion
link, I read that to say that the v1.2 Module will not be suitable for private
label validations(which require changes to FIPS module
Steve Marquess wrote:
In the three years since the open source based FIPS 140-2 validated
OpenSSL FIPS Object Module became available many software vendors have
directly or indirectly utilized it to realize substantial cost and
schedule savings. We're glad to see the widespread benefits of
On 2/19/2010 11:00 AM, Michael Sierchio wrote:
Steve Marquess wrote:
In the three years since the open source based FIPS 140-2 validated
OpenSSL FIPS Object Module became available many software vendors have
directly or indirectly utilized it to realize substantial cost and
schedule savings.
Dave Thompson wrote:
3. Use SSL_set_verify() and provide a callback function.
This sounds promising but the callback function gets called
for every certificate in the chain. How can I find out
whether the certificate in question is the peer's cert and
not some intermediate cert?
From: owner-openssl-us...@openssl.org On Behalf Of Daniel Mentz
Sent: Wednesday, 02 September, 2009 08:27
To: openssl-users@openssl.org
Subject: post-connection assertions
I'm wondering what's the best way to check the identity of
the peer [in its cert just after connection]
So I call
- Original Message
From: Kyle Hamilton [EMAIL PROTECTED]
To: openssl-users@openssl.org
Sent: Friday, April 18, 2008 5:32:49 PM
Subject: Re: Segmentation fault in SSL_read() (Re-post)
ergh. My apologies for not catching that. You're right, it shouldn't
matter on the client side.
Okay
Sorry for the fist post. It seems like I have some problems with the other
email client. A new try :)
I have wrote a multi-threaded server (UNIX) and I use OpenSSL for encrypting
communication between
the server and the client (the client is an MFC application, but I think this
doesn't
- Original Message
From: Ion Scerbatiuc [EMAIL PROTECTED]
To: openssl-users@openssl.org
Sent: Friday, April 18, 2008 1:15:35 PM
Subject: Segmentation fault in SSL_read() (Re-post)
Sorry for the fist post. It seems like I have some problems with the other
email client. A new try :)
I have
My initial idea would be that you're passing in an invalid pointer to
SSL_read. Does this happen with, say, openssl s_client?
Remember a couple of things:
1) You MUST use the proper version of the library (debug or release)
with the appropriate build setting in your project (debug or release).
or questions?
Thanks for your time!
Regards,
Scerbatiuc Ion
- Original Message
From: Kyle Hamilton [EMAIL PROTECTED]
To: openssl-users@openssl.org
Sent: Friday, April 18, 2008 2:14:03 PM
Subject: Re: Segmentation fault in SSL_read() (Re-post)
My initial idea would be that you're passing
@openssl.org
Sent: Friday, April 18, 2008 2:14:03 PM
Subject: Re: Segmentation fault in SSL_read() (Re-post)
My initial idea would be that you're passing in an invalid pointer to
SSL_read. Does this happen with, say, openssl s_client?
Remember a couple of things:
1) You MUST use the proper
Hamilton [EMAIL PROTECTED]
To: openssl-users@openssl.org
Sent: Friday, April 18, 2008 2:33:03 PM
Subject: Re: Segmentation fault in SSL_read() (Re-post)
How are you creating an MFC executable on Linux?
-Kyle H
On Fri, Apr 18, 2008 at 4:29 AM, Ion Scerbatiuc [EMAIL PROTECTED] wrote:
Thanks
ergh. My apologies for not catching that. You're right, it shouldn't
matter on the client side.
Okay... going back to basics (I'm sorry if this seems a bit
patronizing, I honestly don't intend it to be such), a segfault occurs
on a pointer dereference, trying to gain access to memory which is
Samuel what does that mean... if you live in NY i'll buy you dinner
On 5/9/07, Samuel Reed [EMAIL PROTECTED] wrote:
Is it worth something?
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Michael Fedor
Sent: Wednesday, May 09, 2007 2:52 PM
To:
Michael Fedor wrote:
Thanks do you know who the list maintainer is.
I suspect that instructions for contacting the list maintainer could be had via
the [EMAIL PROTECTED] email listed in the trailer appended to all emails
sent via the list. Sending it a message containing a line that reads
On Wed 07-05-09 17:52, Michael Fedor wrote:
How can I delete any post that have my email address.
[EMAIL PROTECTED]
there is data that should not be out on the net
You may or may not be able to persuade the list maintainer to delete
your posts, but it won't do you much good. I have my own
Im cool
On 5/9/07, Keith Thompson [EMAIL PROTECTED] wrote:
On Wed 07-05-09 17:52, Michael Fedor wrote:
How can I delete any post that have my email address.
[EMAIL PROTECTED]
there is data that should not be out on the net
You may or may not be able to persuade the list maintainer to delete
If you're talking about the cert and session key you posted, anyone can
get
the cert from the server and the master key is useless.
DS
__
OpenSSL Project http://www.openssl.org
Title: RE: POST to HTTPS
Hey Josh.. actually I just discovered the WinInet functions and they are capable of posting to HTTPS. I have already written code for this and it works great. I appreciate the help though.
Thanks!
Ian
-Original Message-
From: Joshua Juran [mailto:[EMAIL
21 matches
Mail list logo