Thanks David,
#4 seems to be the simplest solution to me.
while trying #4, I get exception on windows platform. Usually the excpetion
occurs in ERR_clear_error while allocating memory.
I call ERR_remove_state() at end of library functions. With single thread it
works find. But as soon as I increas
Pankaj Aggarwal wrote:
> I am able to think about the following approaches :
> 1. Keep a record a threads which are spawned.
> 2. Expose a function from our library for cleanup when the thread exits
> Is there any other way to avoid the memory leak caused by error queues ?
There are severa
Thanks, do I need to free these string when I shutdown the app?
On Sat, May 29, 2010 at 1:24 PM, Kyle Hamilton wrote:
> Don't forget to call SSL_load_error_strings() and
> CRYPTO_load_error_strings() just after you initialize the library for
> this to work.
>
> -Kyle H
>
> On Fri, May 28, 2010 at
Don't forget to call SSL_load_error_strings() and
CRYPTO_load_error_strings() just after you initialize the library for
this to work.
-Kyle H
On Fri, May 28, 2010 at 4:19 PM, Dallas Clement
wrote:
> Perfect. Thanks very much!
>
> On Fri, May 28, 2010 at 3:14 PM, Dave Thompson wrote:
>>> From:
On Saturday 29 May 2010 12:02:44 a list member wrote:
> As somebody who audits CAs for purpose of them getting into trusted root
> list, this is what you have to do:
> a) Obtain WebTrust for certification authorities or ETSI 101 456 standard
> (+ EV guidelines from cabforum.org)
> b) Implement sys
The only difference between a trusted and untrusted CA cert is that... the
former is trusted.
There are two ways this can happen:
1) The client software (e.g. browser) has certain lists of trusted certs built
in. Others have already explained how to get on that list in far better detail
than I
Thanks all for the information. This is good stuff to know too. What
I was really trying to understand is the nuts-n-bolts mechanics of how
a legit CA certificate differs from a self-created one (I know, this
is a dumb question...)
For example, I can create my own for test purposes this way:
op
As somebody who audits CAs for purpose of them getting into trusted root
list, this is what you have to do:
a) Obtain WebTrust for certification authorities or ETSI 101 456 standard (+
EV guidelines from cabforum.org)
b) Implement systems in line with one of these standards. Not cheap. HSM
devices
On 28-May-10, at 8:04 PM, Dallas Clement wrote:
This is probably a dumb question, but if I wanted to be come the next
Verisign of this world, how do I create a legitimate CA cert? I'd
like to be able to create my own that passes verification without
throwing errors, like "unknown CA".
Well, t