On 2/20/08, David Schwartz <[EMAIL PROTECTED]> wrote:
>
>
> > But, the application code tries to clear out/shutdown existing
> > SSL session with orderly bi-directional alerts. Once shutdown it
> > creates a new SSL object 'ssl' [ssl = SSL_new (ctx)]
> > for the next session in persistent connectio
Hello All,
I want to use the openssl on uClinux, and use the engine for openssl.
But my uClinux does not support the dynamic linking, anyone could provide me
a good solution please?
There is no dl.h or dlfcn.h on this system!
--
Best regards to you and your family
Not sure whether this mail reached earlier..
Hi Gurus,
My application server crashes giving the following core dump. It goes for
ssl
negotiation ( using openssl) and dumps core on solaris8. Any clues please?
Thanks
Biswatosh
PS: The stack trace below:
core './scripts/core' of 28920:/op
> But, the application code tries to clear out/shutdown existing
> SSL session with orderly bi-directional alerts. Once shutdown it
> creates a new SSL object 'ssl' [ssl = SSL_new (ctx)]
> for the next session in persistent connection..
This is nearly impossible to do. It's possible that you did
But, the application code tries to clear out/shutdown existing SSL session
with orderly bi-directional alerts. Once shutdown it creates a new SSL
object 'ssl' [ssl = SSL_new (ctx)]
for the next session in persistent connection..
When the app simulates limited clients , say, 100, each client makes
Hello, seems that Openssl do not support some OID's:
businessCategory=2.5.4.15
jurisdictionOfIncorporationLocalityName=1.3.6.1.4.1.311.60.2.1.1
jurisdictionOfIncorporationStateOrProvinceName=1.3.6.1.4.1.311.60.2.1.2
jurisdictionOfIncorporationCountryName=1.3.6.1.4.1.311.60.2.1.3
It's possible set
Whoops I sent the wrong output, see new addition/change in bold below.
-Original Message-
From: Andrew Bryce
Sent: 20 February 2008 16:26
To: 'openssl-users@openssl.org'
Subject: SSL3_BUFFER Problem
Hi,
I am new to SSL development. I am using a Linux box:
> I have a SSL client and a server application.The client connects to a
> SSL server in a TCP socket persistence mode, i.e, it does a data
> exchange with the server through a SSL connection , tears down the SSL
> connection but again sends out a client_hello in the same TCP socket
> connection it
Hi,
I am new to SSL development. I am using a Linux box:
Linux tmrp0023.uk.tmo 2.6.9-67.ELsmp #1 SMP Wed Nov 7
13:56:44 EST 2007 x86_64 x86_64 x86_64 GNU/Linux
The SSL I am using is:
/opt/eiis/pkgs/openssl-0.9.8g
Hi,
I am using this function sslc.lib 2.3.3 PEM_read_bio_PrivateKey in my code.
Sample:
EVP_PKEY *evp_key = NULL;
evp_key = PEM_read_bio_PrivateKey(mem_bio, &evp_key, my_pem_password_cb);
if (evp_key == NULL)
return errorcode;
If i give password as "1234" it's returning evp_key valu
Hi,
After a DTLS connection established a peer fails (e.g. the client). The
other peer (e.g. the server) maintains the connection state ignoring
clients failure. When the client starts up and tries to establish a new
connection, the server ignore the received packets because they arent
proces
Hi,
I have a SSL client and a server application.The client connects to a
SSL server in a TCP socket persistence mode, i.e, it does a data
exchange with the server through a SSL connection , tears down the SSL
connection but again sends out a client_hello in the same TCP socket
connection it had
Hi Gurus,
My application server crashes giving the following core dump. It goes for
ssl
negotiation ( using openssl) and dumps core on solaris8. Any clues please?
Thanks
Biswatosh
PS: The stack trace below:
core './scripts/core' of 28920:/opt/arcot/sbin/dsserver.real
- l
OK, I got it. I followed the sources and found the switch happening in
ssl23_get_client_hello().
Thanks,
-anirudh
--
This message was sent on behalf of [EMAIL PROTECTED] at openSubscriber.com
http://www.opensubscriber.com/message/openssl-users@openssl.org/8644125.html
RichTaylor wrote:
I recently inherited the task of adding FIPS support to our product. The
product has a fairly large codebase that I'm still coming up to speed on,
including our existing use of OpenSSL.
I've read the Security Policy and User Guides for 1.1.2 and have been
analyzing our code
Jon wrote:
> I'm attempting to use stunnel between pop3s and pop3 to secure mail
> traffic sent to a proprietary mail daemon that doesn't know pop3s.
>
> When running stunnel3 -c -d pop3s -r 127.0.0.1:110 -f then connecting
> with Thunderbird once the exact output is:
>
> 2008.02.19 12:49:43 LOG5[2
Thanks jb for your reply.
I understand from you reply that if SSL_Pending is called on the SSL object
during the handshake phase, then ssl_undefined_const_function will get called,
but once the switch to the appropriate server_method happens,
ssl_undefined_const_function should no longer be cal
Thanks a lot!!!> Date: Wed, 20 Feb 2008 09:18:18 +0100> From: [EMAIL
PROTECTED]> To: openssl-users@openssl.org> Subject: Re: Howto asume yes by
default when generate a certificate..> > Francisco Javier schrieb:> > Hello, I
am trying to generate a certificate using an external > > application, b
Francisco Javier schrieb:
Hello, I am trying to generate a certificate using an external
application, but I need to automaticaly answer YES to the question
Sign the certificate? [y/n]:
exec("openssl ca -out certificados_usuarios/ALL/ALL_cert.pem -passin
pass:mipass -days 365 -infiles c
Hello, I am trying to generate a certificate using an external application, but
I need to automaticaly answer YES to the question
Sign the certificate? [y/n]:
exec("openssl ca -out certificados_usuarios/ALL/ALL_cert.pem -passin
pass:mipass -days 365 -infiles certificados_usuarios/ALL/AL
auth 2a705f37 subscribe openssl-users [EMAIL PROTECTED]
21 matches
Mail list logo