My previous post generated an auto-response from what is likely a
malware auto-response bot. Best bet is to not follow the links.
This has been reported to Hotmail via spamcop.
[ Looks like Hotmail does not implement RFC 3834 as yet. ]
-- Suspected malware response below --
Return-Path: <>
Rec
On Sun, Apr 21, 2013 at 10:17:31PM -0400, Dave Thompson wrote:
> >scanf("%s",password);
This also mishandles passwords containing whitespace. The code
looks so poor that my guess is that someone is asking us to do
their homework.
--
Viktor.
_
>From: owner-openssl-us...@openssl.org On Behalf Of vinay krishna
>Sent: Sunday, 21 April, 2013 00:52
>Hello I am writing a POP3 client in C on ubuntu. I am using OpenSSl
>I am stuck in the AUTHORIZATION state! I send the user name and get
>a success response, and when i send the password , it a
I don't see any test programs covering "Existing Application-Specific
Key Derivation Function Validation" (ASKDFVS) for the OpenSSL FIPS
validation in the openssl-fips-2.0/test directory, nor any test vectors
for it in http://www.openssl.org/docs/fips/fips-2.0-tv.tar.gz. Is this
because the F
Hi All!
I have updated the OpenSSL PKI tutorial at readthedocs. The tutorial takes a
novel approach without ever referring to openssl.cnf or CA.pl (yuck). You can
find it here:
https://pki-tutorial.readthedocs.org/
Thanks to everyone who has provided feedback for the first version. I heard
yo