Hawk wrote:
Those are last two lines of my thread execution callback.
If you call any openssl's free function after ERR_remove_state(0), you
will have a memory leak, because it will create another thread context
that will never be freed.
So i can do
SSL_free(clientssl);
SSL
I will be out of the office starting 05/04/2004 and will not return until
05/05/2004.
I will be out of the office the afternoon of Tuesday May 4, 2004. I will
return your message when I return on May 5, 2004. If this is an urgent
matter, please contact Barb Reilly.
___
Janet Pytlik wrote:
Hi,
Does anyone know what the following error messages mean and/or how I can
find out more about what they mean? I am obtaining these error strings
via the ERR_get_error and ERR_error_string functions but I can't seem to
find any documentation anywhere to further explain ho
Title: RSA_private_decrypt errors
Hi,
Does anyone know what the following error messages mean and/or how I can find out more about what they mean? I am obtaining these error strings via the ERR_get_error and ERR_error_string functions but I can't seem to find any documentation anywhere t
> Those are last two lines of my thread execution callback.
>
> If you call any openssl's free function after ERR_remove_state(0), you
> will have a memory leak, because it will create another thread context
> that will never be freed.
So i can do
SSL_free(clientssl);
SSL_CTX_free(clientsslctx);
The test vectors you were using were from a Monte Carlo test which uses
a number of iterations of the algorithm. More info can be found at
http://csrc.nist.gov/CryptoToolkit/aes/katmct/katmct.pdf
Thanks for your input. I will check that paper.
Nevertheless, I assumed that the given test-vector
On Tue, May 04, 2004 at 07:26:36AM -0700, Reese Williams wrote:
: I have quite a few Apache and IIS 5.0 web servers and I am looking to
: automate in a script notifications concerning certificate expirations.
You could also use Recon to do this for you --
http://www.BrandXDev.Net
Recon's
Is RSA ver 2 (SSH) compatiblity with SSL by design or
a given fact? I haven't found any references anywhere
addressing this or any security concern. In addition,
are there any downstream problems using a cert based
off of a ssh-keygen as opposed to an "openssl genrsa"?
For example:
Hrm...I am curious if anyone on the list has any idea about what might
be going on with this error. I saw a prior thread that just ended over
a year ago with no resolution or explanation.
Thanks!
--
Jason A. Pfeil jason=at=jasonpfeil.com.NOSPAM
-- Forwarded me
On Tue, 2004-05-04 at 09:38, Troy Monaghen wrote:
> On Tue, 2004-05-04 at 03:03, Ramon Amat Jimenez wrote:
> > Using aes-128-encryption with a testvector from NIST for encryption does
> > not match! I have been mostly using code from example
> > ./openssl-0.9.7d/crypto/evp/evp_test.c to conduct t
On Tue, 2004-05-04 at 03:03, Ramon Amat Jimenez wrote:
> Using aes-128-encryption with a testvector from NIST for encryption does
> not match! I have been mostly using code from example
> ./openssl-0.9.7d/crypto/evp/evp_test.c to conduct this test.
>
> #cipher:key:iv:plaintext:ciphertext:0/1(dec
OK...thanksJoseph Bruni <[EMAIL PROTECTED]> wrote:
Try using the -enddate option to get the expiration date.On May 3, 2004, at 12:50 PM, Reese Williams wrote:> Brand new to openssl.> Anyone use openssl x509 -text -n //certificate-name.pem with a > Verisign> certificate to get expiration date?> I ha
12 matches
Mail list logo