Did you run './config 386'?
-Kyle H
On Tue, Jun 9, 2009 at 10:09 PM, Paul Rogers wrote:
> I found the "make report" and ran that on a pristine copy of my
> tarball with this result:
> OpenSSL self-test report:
>
> OpenSSL version: 0.9.7g
> Last change: Fixes for newer kerberos headers. NB:
I found the "make report" and ran that on a pristine copy of my
tarball with this result:
OpenSSL self-test report:
OpenSSL version: 0.9.7g
Last change: Fixes for newer kerberos headers. NB: the casts
are nee...
Options: no-krb5
OS (uname): Linux pandora 2.4.31 #2 Wed Feb 14
Hi,
Does OpenSSL have a function for getting the common name from a X509
certificate?
Thanks,
Jerry
So I used BIGNUM conversion BN_bn2mpi for the BIGNUM conversions into my
own format. I hope this won't cause any problems.
For the meth, when I create a new RSA struct with RSA_new(), it fills
most of the information in. Is this enough to do?
My ENGINE seems to always be 0 so I am ignoring that.
> From: owner-openssl-us...@openssl.org On Behalf Of Ashwin Chandra
> Sent: Monday, 08 June, 2009 19:48
> I am using the RSA_generate_keys to generate an RSA * structure.
> I wish to pack or serialize all the information in this structure
> into an array of bytes and then deseri
> From: owner-openssl-us...@openssl.org On Behalf Of chithuanand
> Sent: Tuesday, 09 June, 2009 00:13
> The Winsock2 WSAGetLastError() returns 100054, means "Socket
> forcefully shut down by remote host".
>
Precisely 10054 is connection-reset. In TCP "shut down" normally
is used for the normal
I just wanted to make sure I'm not missing something. Converting an ASN1 spec
to code is a manual process, right? There is no parser/code generator as part
of openssl?
I'm looking at asn1c (http://lionet.info/asn1c/) but the code it generates
seems stand-alone, not based on the existing openssl cod
Greetings Listers!
I am trying to determine how versions of SUNWopenssl compare with
SMCopenssl. I am researching CVE-2009-1386 and trying to determine the
version of SSL included with Solaris is equivalent to the recommended
version, OpenSSL v0.9.8i.
Here's what I have:
root# pkginfo -l SUNWop
Thank you.
--satish
-Original Message-
From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of Brad Mitchell
Sent: Tuesday, June 09, 2009 12:55 AM
To: openssl-users@openssl.org
Subject: RE: Certificates in a buffer
You could do this to read in a certif
> Hi All
>
> I have certificate and private key in a buffer (not in a file). How do
> I pass on these to OpenSSL with out storing in a temp file? In other
> words are there any APIs that take certificate from a buffer instead
> of a file?
>
> I could only find APIs that expect a file argument or X
Hi All,
One of our embedded products (running Linux) uses open ssl for RPC
connections.
The daemon handling RPC connections intermittently crashes with the
following back trace.
Looks like it crashes with signal 4 illegal instruction from inside BIO_ctrl
library function of libcrypto.
Did anybod
The Winsock2 WSAGetLastError() returns 100054, means "Socket forcefully shut
down by remote host".
Initially we had only one webservice class. This webservice class is based
on gSOAP generated proxy classes, which will in turn use openSSL functions
to access a secured webservice.All the methods
Hello All,
I have a question regarding Fragment packets handling in ssldump. We are
working on giving the Virtually Fragmented (i.e link all the fragments no
reassebly is done to make it look like one packet) packet from TCP to
ssldump to decrypt the packet. This is not command line option but fee
You could do this to read in a certificate:
X509* loadCert(const char* inputBuffer)
{
BIO *cert = NULL;
X509* x509Cert = NULL;
cert = BIO_new_mem_buf(inputBuffer, -1);
if (cert)
{
X509Cert = PEM_read_bio_X509(cert, NULL, 0, NULL);
}
14 matches
Mail list logo