James Dabbs <[EMAIL PROTECTED]>:
> I believe that many enterprises that do not allow an unbroken SSL
> connection directly from the client throught the proxy/firewall to
> the remote server. [...] SSL is "broken" at the proxy, and
> reestablished with a seperate SSL session between the proxy an
Dr Stephen Henson <[EMAIL PROTECTED]>:
> Bodo Moeller:
>> [EMAIL PROTECTED]:
>>> VC6.0 detected memory leaks in the following code! And the code do
>>> only PEM_read_bio_PrivateKey()!!
>> You should free your OpenSSL objects (pKey, in) *before* freeing
>> the library-internal stuff (EVP_cleanup(
Hi
>I was wondering if I could create my own E-Mail Certificate. I looked
> through OpenSSL docs but the only thing I could find about that topic was
a
> little function to encrypt and decrypt text messages. I'd like to be able
to
> use my E-Mail Certificate with Netscape Messenger like the o
Hi
Sorry, my sed is no good (I use perl) - what does the PKCS7 look like after
being run through sed? You did use crl2pkcs7 first to make it into PKCS7,
didn't you?
Luke
> I'm having problems when installing an openssl signed client certificate
> into MSIE. I use Microsofts controll xenroll, b
Al,
I'm afraid that while you are technically correct, you might leave the wrong
impression. Although, it is true that there is little to *prevent* a user
from handing out his private key, there is also no reason for users to do
this and applications do not generally make it easy. Also, in this r
Odpowiedz automatyczna:
Do 5 maja przebywam na zasluzonym urlopie.
W pilnych sprawach prosze o kontakt z Kamilem Kilinskim.
Z powazaniem,
Michal Trojnara
>>> "[EMAIL PROTECTED]" 04/29/00 19:33 >>>
Cristina Nita <[EMAIL PROTECTED]>:
> I am using the BN interface from libcrypto and I notice
Odpowiedz automatyczna:
Do 5 maja przebywam na zasluzonym urlopie.
W pilnych sprawach prosze o kontakt z Kamilem Kilinskim.
Z powazaniem,
Michal Trojnara
>>> "[EMAIL PROTECTED]" 04/29/00 19:36 >>>
Ted Powell <@tgivan.com>:
> When I ran openssl-0.9.5a's "make test", the tmp.bntest file tha
Bodo Moeller wrote:
>
> [EMAIL PROTECTED]:
>
> > VC6.0 detected memory leaks in the following code! And the code do only
>PEM_read_bio_PrivateKey()!!
> >
> > When I enabled the OpenSSL_add_ssl_algorithms() and the PEM_read_bio_PrivateKey
> > () finished sucessful, there is no memory leaks.
> >
Hello Mike,
Here's a step-by-step you want. It's written for Apache, but you can
use it as well.
Saturday, April 29, 2000, 8:30:33 AM, you wrote:
MF> I've just installed OpenSSL 0.94.3 on a Linux box with hopes of eventually
MF> setting up a secure POP3/IMAP server (perhaps using stunnel).
MF>
[EMAIL PROTECTED]:
> In s_server and s_client is there the following structure:
> if (SSL_accept(ssl) <= 0){
> .
> }
> if (SSL_connect(ssl) <= 0){
> .
> }
>
> where are the macro-defines for the error message? What do the returned integers
>exactly mean?
See the SSL_get_error() manual
[EMAIL PROTECTED]:
> VC6.0 detected memory leaks in the following code! And the code do only
>PEM_read_bio_PrivateKey()!!
>
> When I enabled the OpenSSL_add_ssl_algorithms() and the PEM_read_bio_PrivateKey
> () finished sucessful, there is no memory leaks.
> But when I disable(comment out) the
Cristina Nita <[EMAIL PROTECTED]>:
> I am using the BN interface from libcrypto and I noticed that
> BN_mod does not work correctly for negative numbers.
> I did a very very simple test where I tried to compute
> -6 mod 5. The result was -1
BN_div rounds to zero, and accordingly the remainder, w
Ted Powell <@tgivan.com>:
> When I ran openssl-0.9.5a's "make test", the tmp.bntest file that was
> written contained (out of 1800+ tests) seven expressions which Solaris 7's
> 'bc' evaluated to give non-zero results.
[...]
> When I feed the problematic tmp.bntest to GNU bc (version 1.05a, on Red
I believe that many enterprises that do not allow an unbroken SSL connection
directly from the client throught the proxy/firewall to the remote server.
This is because security policy may allows/disallow certain MIME types in
the entity of the HTTP response. For this reason, SSL is "broken" at th
> Does mod_ssl or some other materials explains how to hack netscape's browser?
Yes.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automa
15 matches
Mail list logo