On Wed, Apr 11, 2007 at 05:50:04PM -0700, David Schwartz wrote:
> Why can't/doesn't Postfix use a separate SSL process? That's the right way
> to do this for a variety of reasons.
There is no single "right way". The current tradeoffs work reasonably
well. It would be useful to migrate established
Apologies if this was already responded to:
> Or if I put it in another way, if SSL_read() returns,
> SSL_ERROR_WANT_READ or SSL_ERROR_WANT_WRITE (from SSL_get_error())
> on the socket "fd" then, can I send data on the same socket using
> SSL_write() ? (Provided, both read and write operations on
On Wed, Apr 11, 2007, k b wrote:
> Hi,
> I'm trying to figure out if a particular cert that i receive has SHA1 or
> SHA256 as its signature algorithm.
>
> I know this could be done by using either i2t_ASN1_OBJECT(buffer,
> x509->sig_alg->algorithm) or i2a_ASN1_OBJECT(bio, x509->sig_alg->algorit
Hi All,
I tried to compile the openssl source in vc 6.0.
for this i followed the instructions in instal-32 file
Firstly you should run Configure:
> perl Configure VC-WIN32 --prefix=c:/some/openssl/dir
Where the prefix argument specifies where OpenSSL will be installed to.
Next
> It would be immensely useful in Postfix, because we could cache and
> re-use TLS encrypted connections. I would minimize the utility of the
> feature, but it is nearly impossible to retrofit. The design would have
> to support very complex serialization or many related data structures
> and I/O
On Wed, Apr 11, 2007 at 05:18:37PM -0700, David Schwartz wrote:
>
> > Victor
> >
> > Thanks for your reply.
> > Is there a specific reason why this is not supported
> > by openssl?
>
> It would add a lot of overhead and complexity to a significant fraction of
> the code for a feature that isn't
> Victor
>
> Thanks for your reply.
> Is there a specific reason why this is not supported
> by openssl?
It would add a lot of overhead and complexity to a significant fraction of
the code for a feature that isn't all that useful and wouldn't be used all
that often. It also creates a few thorny
Hi,
I'm trying to figure out if a particular cert that i receive has SHA1 or
SHA256 as its signature algorithm.
I know this could be done by using either i2t_ASN1_OBJECT(buffer,
x509->sig_alg->algorithm) or i2a_ASN1_OBJECT(bio, x509->sig_alg->algorithm)
The problem is, if the cert has sha1 s
On Wed, Apr 11, 2007 at 03:50:46PM -0700, Jyothi Jagadish wrote:
> Victor
>
> Thanks for your reply.
> Is there a specific reason why this is not supported
> by openssl?
Because the code does not work that way, and checkpointing al the relevant
data structures is very difficult. It would be nice
Victor
Thanks for your reply.
Is there a specific reason why this is not supported
by openssl?
Thanks
Jyothi
--- Victor Duchovni
<[EMAIL PROTECTED]> wrote:
> On Wed, Apr 11, 2007 at 03:31:36PM -0700, Jyothi
> Jagadish wrote:
>
> > Hi
> > I am looking at how to share SSL session between
> > pa
On Wed, Apr 11, 2007 at 03:31:36PM -0700, Jyothi Jagadish wrote:
> Hi
> I am looking at how to share SSL session between
> parent and child processes
>
> So scenario would be
>
> Application opens up a SSL session
> Does Read write
> Forks and then does read write
> Then when child process exit
Hi
I am looking at how to share SSL session between
parent and child processes
So scenario would be
Application opens up a SSL session
Does Read write
Forks and then does read write
Then when child process exits, the parent process
would continue to read and write.
Any help on this topic is app
Valient Gough wrote:
My previous mail doesn't seem to have appeared on the list, so sending
again:
Hello,
As the maintainer of a package which uses OpenSSL, I've received some
reports
of 0.9.8e failing to decrypt data which was encrypted by previous
versions of
OpenSSL.
Attached is a sm
These scripts are great thank you very much to all involved who
contributed (no e-mail address for 'mastrboy'). . I'm considering
spending some time adding additional functionality:
--
In addition to simply parsing the date and comparing the date/time, I'd
like to test the validity of the
On Wed, Apr 11, 2007, Iain Pople wrote:
> Hi,
>
> I am trying to replace a legacy system with openssl. The legacy system
> used RSA keys but stored them in its own format. I can extract the RSA
> components but I'm not sure how to generate a PEM formatted RSA key.
> What is the easiest way to
Hello,
> I am trying to replace a legacy system with openssl. The legacy system
> used RSA keys but stored them in its own format. I can extract the RSA
> components but I'm not sure how to generate a PEM formatted RSA key.
> What is the easiest way to do this? Can the command line tools do it,
> On 2007.04.10 at 19:16:03 +0200, Christophe Devine wrote:
>
> > I cross-compiled OpenSSL on ARM and MIPS a couple months ago, to
> > perform some RSA benchmarking. I remember hacking the linux-
> > generic target to use arm-linux-gcc instead of gcc also added
> > -static to the CFLAGS. There i
On 2007.04.10 at 19:16:03 +0200, Christophe Devine wrote:
> I cross-compiled OpenSSL on ARM and MIPS a couple months ago, to perform
> some RSA benchmarking. I remember hacking the linux-generic target to
> use arm-linux-gcc instead of gcc also added -static to the CFLAGS. There
> is probably a mo
18 matches
Mail list logo