Re: Post-2010 future of the OpenSSL FIPS Object Module?

2010-02-20 Thread Steve Marquess
Jason Schultz wrote: One point of confusion for me, I read this email to say the OpenSSL FIPS Object Module v1.2 will(may?) not be usable beyond 2010. But in the first discussion link, I read that to say that the v1.2 Module will not be suitable for private label validations(which require

Re: Post-2010 future of the OpenSSL FIPS Object Module?

2010-02-20 Thread Steve Marquess
Michael Sierchio wrote: Forgive my ignorance, but are you a 501(c)3? Can you communicate that in a signature line so it's obvious? The OpenSSL Software Foundation (OSF) is *not* a non-profit corporation. It was created for the purpose of supporting the commercial activities of OpenSSL

RE: Post-2010 future of the OpenSSL FIPS Object Module?

2010-02-19 Thread Jason Schultz
One point of confusion for me, I read this email to say the OpenSSL FIPS Object Module v1.2 will(may?) not be usable beyond 2010. But in the first discussion link, I read that to say that the v1.2 Module will not be suitable for private label validations(which require changes to FIPS module

Re: Post-2010 future of the OpenSSL FIPS Object Module?

2010-02-19 Thread Michael Sierchio
Steve Marquess wrote: In the three years since the open source based FIPS 140-2 validated OpenSSL FIPS Object Module became available many software vendors have directly or indirectly utilized it to realize substantial cost and schedule savings. We're glad to see the widespread benefits of

Re: Post-2010 future of the OpenSSL FIPS Object Module?

2010-02-19 Thread Jeffrey Altman
On 2/19/2010 11:00 AM, Michael Sierchio wrote: Steve Marquess wrote: In the three years since the open source based FIPS 140-2 validated OpenSSL FIPS Object Module became available many software vendors have directly or indirectly utilized it to realize substantial cost and schedule savings.

Re: post-connection assertions

2009-09-04 Thread Daniel Mentz
Dave Thompson wrote: 3. Use SSL_set_verify() and provide a callback function. This sounds promising but the callback function gets called for every certificate in the chain. How can I find out whether the certificate in question is the peer's cert and not some intermediate cert?

RE: post-connection assertions

2009-09-03 Thread Dave Thompson
From: owner-openssl-us...@openssl.org On Behalf Of Daniel Mentz Sent: Wednesday, 02 September, 2009 08:27 To: openssl-users@openssl.org Subject: post-connection assertions I'm wondering what's the best way to check the identity of the peer [in its cert just after connection] So I call

Re: Segmentation fault in SSL_read() (Re-post)

2008-04-21 Thread Ion Scerbatiuc
- Original Message From: Kyle Hamilton [EMAIL PROTECTED] To: openssl-users@openssl.org Sent: Friday, April 18, 2008 5:32:49 PM Subject: Re: Segmentation fault in SSL_read() (Re-post) ergh. My apologies for not catching that. You're right, it shouldn't matter on the client side. Okay

Segmentation fault in SSL_read() (Re-post)

2008-04-18 Thread Ion Scerbatiuc
Sorry for the fist post. It seems like I have some problems with the other email client. A new try :) I have wrote a multi-threaded server (UNIX) and I use OpenSSL for encrypting communication between the server and the client (the client is an MFC application, but I think this doesn't

Re: Segmentation fault in SSL_read() (Re-post)

2008-04-18 Thread Ion Scerbatiuc
- Original Message From: Ion Scerbatiuc [EMAIL PROTECTED] To: openssl-users@openssl.org Sent: Friday, April 18, 2008 1:15:35 PM Subject: Segmentation fault in SSL_read() (Re-post) Sorry for the fist post. It seems like I have some problems with the other email client. A new try :) I have

Re: Segmentation fault in SSL_read() (Re-post)

2008-04-18 Thread Kyle Hamilton
My initial idea would be that you're passing in an invalid pointer to SSL_read. Does this happen with, say, openssl s_client? Remember a couple of things: 1) You MUST use the proper version of the library (debug or release) with the appropriate build setting in your project (debug or release).

Re: Segmentation fault in SSL_read() (Re-post)

2008-04-18 Thread Ion Scerbatiuc
or questions? Thanks for your time! Regards, Scerbatiuc Ion - Original Message From: Kyle Hamilton [EMAIL PROTECTED] To: openssl-users@openssl.org Sent: Friday, April 18, 2008 2:14:03 PM Subject: Re: Segmentation fault in SSL_read() (Re-post) My initial idea would be that you're passing

Re: Segmentation fault in SSL_read() (Re-post)

2008-04-18 Thread Kyle Hamilton
@openssl.org Sent: Friday, April 18, 2008 2:14:03 PM Subject: Re: Segmentation fault in SSL_read() (Re-post) My initial idea would be that you're passing in an invalid pointer to SSL_read. Does this happen with, say, openssl s_client? Remember a couple of things: 1) You MUST use the proper

Re: Segmentation fault in SSL_read() (Re-post)

2008-04-18 Thread Ion Scerbatiuc
Hamilton [EMAIL PROTECTED] To: openssl-users@openssl.org Sent: Friday, April 18, 2008 2:33:03 PM Subject: Re: Segmentation fault in SSL_read() (Re-post) How are you creating an MFC executable on Linux? -Kyle H On Fri, Apr 18, 2008 at 4:29 AM, Ion Scerbatiuc [EMAIL PROTECTED] wrote: Thanks

Re: Segmentation fault in SSL_read() (Re-post)

2008-04-18 Thread Kyle Hamilton
ergh. My apologies for not catching that. You're right, it shouldn't matter on the client side. Okay... going back to basics (I'm sorry if this seems a bit patronizing, I honestly don't intend it to be such), a segfault occurs on a pointer dereference, trying to gain access to memory which is

Re: Post

2007-05-09 Thread Michael Fedor
Samuel what does that mean... if you live in NY i'll buy you dinner On 5/9/07, Samuel Reed [EMAIL PROTECTED] wrote: Is it worth something? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Michael Fedor Sent: Wednesday, May 09, 2007 2:52 PM To:

Re: Post

2007-05-09 Thread Rick Jones
Michael Fedor wrote: Thanks do you know who the list maintainer is. I suspect that instructions for contacting the list maintainer could be had via the [EMAIL PROTECTED] email listed in the trailer appended to all emails sent via the list. Sending it a message containing a line that reads

Re: Post

2007-05-09 Thread Keith Thompson
On Wed 07-05-09 17:52, Michael Fedor wrote: How can I delete any post that have my email address. [EMAIL PROTECTED] there is data that should not be out on the net You may or may not be able to persuade the list maintainer to delete your posts, but it won't do you much good. I have my own

Re: Post

2007-05-09 Thread Michael Fedor
Im cool On 5/9/07, Keith Thompson [EMAIL PROTECTED] wrote: On Wed 07-05-09 17:52, Michael Fedor wrote: How can I delete any post that have my email address. [EMAIL PROTECTED] there is data that should not be out on the net You may or may not be able to persuade the list maintainer to delete

RE: Post

2007-05-09 Thread David Schwartz
If you're talking about the cert and session key you posted, anyone can get the cert from the server and the master key is useless. DS __ OpenSSL Project http://www.openssl.org

RE: POST to HTTPS

2003-09-26 Thread Perez, Ian
Title: RE: POST to HTTPS Hey Josh.. actually I just discovered the WinInet functions and they are capable of posting to HTTPS. I have already written code for this and it works great. I appreciate the help though. Thanks! Ian -Original Message- From: Joshua Juran [mailto:[EMAIL