Michael D'Errico wrote:
I want to find out how big a DSA key is (to enforce
a lower limit) but DSA_size only reports the size
of a signature. Is there some way to find out how
many bits the key is?
in case you mean with "size of the key" the size of the modulus
p you could do something like BN_num
I've manage to diagnose this down further to a snippet of code inside
ERR_STATE *ERR_get_state(void)
on roughly line 1022 of crypot/err/err.c of the 0.9.7-f-snapshot
(from the 11th):
if (ERRFN(thread_get_item)(ret) != ret)
{
cmb_ssl_dbg( "crypto thread_get_item failed" );
ERR_STATE_free(ret); /* co
Great !!!
On Thu, 17 Mar 2005 15:50:16 +0100, Kammen van, Marco, Springer SBM
<[EMAIL PROTECTED]> wrote:
> Yeah installing the latest snapshot did the trick :D
>
> -
> Marco van Kammen
> Springer
> Unix / NT System Manager
> Floor Manager / Postmaster
> -
> Van Godewijckstraat 30 | 3311 GX
> Off
I want to find out how big a DSA key is (to enforce
a lower limit) but DSA_size only reports the size
of a signature. Is there some way to find out how
many bits the key is?
Thanks,
Mike
__
OpenSSL Project
I've written a callback function to verify certificates because I
need to verify if the user can access some resources.
cert_verify_callback()
{
if ! preverify_ok
log error
return 0
if ! depth // user certificate
check if certificate CN is an allowed user
Yeah installing the latest snapshot did the trick :D
-
Marco van Kammen
Springer
Unix / NT System Manager
Floor Manager / Postmaster
-
Van Godewijckstraat 30 | 3311 GX
Office Number: 05E21
P.O. Box 17 | 3300 AA
Dordrecht | The Netherlands
tel +31 (0) 78 657 6446
fax
Ok, try and keep news.
Regards
On Thu, 17 Mar 2005 15:30:47 +0100, Kammen van, Marco, Springer SBM
<[EMAIL PROTECTED]> wrote:
> I just found this reply from a dev a few minutes ago:
>
> > when installing openssl-0.9.7e on IRIX 5.3 (using GNU make 3.80) there
> > are some shell issues with the i
On Tue, Mar 15, 2005 at 10:24:11AM -0500, Victor Duchovni wrote:
> Is there an officially condoned mechanism to avoid caching the peer
> certificate of unverified clients? I want to cache the session keys,
> but if the peer certificate is not verified, there is not much point in
> burning storage
I just found this reply from a dev a few minutes ago:
> when installing openssl-0.9.7e on IRIX 5.3 (using GNU make 3.80) there
> are some shell issues with the installation. At certain points it
fails:
>
> making install in fips/sha1...
> gmake[2]: Entering directory
>
`/usr/people/schwarz/pkgsrc
Well,
I am not sure about the shared libraries, but I solved my problem..
I downloaded the Solaris package from sunfreeware ahd that's all, not
from source.
To finish, I installed Nessus from source code not by usin the Script,
and all it's ok right now, I am running Nessus.
Regards
On Wed, 1
10 matches
Mail list logo