If you're using a Java program, you should also be using the Java
keystore, which has an integrated PKCS12 parser.
However, it's possible you may need to use an OpenSSL 0.9.8k instance
to work with it. (The error message states that it's expecting a
PKCS12 header, but the file that you passed on
l rpm but no spec file)
what you're looking for is openssl-0.9.7a-35.src.rpm. It's usually
under an SRPMS directory, not an RPMS directory.
>
>
> thanks
>
> dmdm
>
> View this message i
to openssl rpm already installed.
>
> is it just a question of running
> rpm -Fvh
>
>
>
> dmdm
> ________
> View this message in context: Re: openssl 0.9.7a
> Sent from the OpenSSL - User forum at Nabble.com.
_
just a small thought when I get to the stage of installing new rpm (I assume this has to be done?)
then what happens to openssl rpm already installed.
is it just a question of running
rpm -Fvh
dmdm
View this message in context: Re: openssl 0.9.7a
Sent from the OpenSSL - User forum at
-FLSA_2005_166939__Updated_openssl_packages_fix_security_issues.html
(the url did the the legacy rpm arch i686 is what I need but cannot find spec file
and last
openssl-0.9.7a-35.i686.rpm (i dowmladed the normal rpm but no spec file)
thanks
dmdm
View this message in context: Re: openssl 0.9.7a
Sent from the OpenSSL - User forum at Nabble.com.
The IDEA algorithm is patented in the United States and other
countries. To avoid patent infringement, the Fedora Core team
configures it with the -no-idea switch.
To fix it, get the source RPM, modify the .spec file to not include
that switch, and then 'rpm build'.
-Kyle H
On 1/28/06, dmdm (se
On Tue, Aug 02, 2005, Chevalier, Victor T. wrote:
>
> Can someone explain why it keeps telling me error pkey not loading!!! I
> have tried this with the FILE *fp method as well. Is there something
> else I need to do, cause this is confounding me.
>
How about reading the FAQ?
Steve.
--
Dr St
Chevalier, Victor T. wrote:
I am having trouble with openssl 0.9.7a. I can't use a newer version
cause I am using standard redhat.
I am trying to load a private key into an EVP_PKEY using either a fp or
a BIO.
So far neither have worked.
Heres a quick example of what I'm testing.
EVP_PKEY *p
Just try this, remove the debugging & memory leak check stuff & see if you still see a
leak.
-- Fred
-Original Message-
From: Anthony Neal [mailto:[EMAIL PROTECTED]
Sent: Friday, December 12, 2003 11:07 AM
To: [EMAIL PROTECTED]
Subject: Re: OpenSSL 0.9.7a - Small (585 byte) mem
leanup_all_ex_data();
> }
>
> -Original Message-
> From: Fred Crable
> Sent: Friday, December 12, 2003 10:55 AM
> To: '[EMAIL PROTECTED]'
> Subject: RE: OpenSSL 0.9.7a - Small (585 byte) memory leak
>
> Couldn't hurt to do the state(0) :)
>
> -
ose(m_fd);
m_fd= -1;
ERR_free_strings();
ERR_remove_state(0);
EVP_cleanup();
CRYPTO_cleanup_all_ex_data();
}
-Original Message-
From: Fred Crable
Sent: Friday, December 12, 2003 10:55 AM
To: '[EMAIL PROTECTED]'
Subject: RE: OpenSSL 0.9.7a - Small (585 byte) memo
Couldn't hurt to do the state(0) :)
-Original Message-
From: Anthony Neal [mailto:[EMAIL PROTECTED]
Sent: Friday, December 12, 2003 10:40 AM
To: [EMAIL PROTECTED]
Subject: Re: OpenSSL 0.9.7a - Small (585 byte) memory leak
Thanks for the response! :)
Nope, they're in there, i
Thanks for the response! :)
Nope, they're in there, in shutdown():
ERR_free_strings();
for_each(_threadIdCache.begin(), _threadIdCache.end(),
ERR_remove_state);
We actually maintain a cache of all threads that access the plugin and
remove the error state for them.
Unless we have to do a
You are missing calls to:
ERR_free_strings();
ERR_remove_state(0);
-Original Message-
From: Anthony Neal [mailto:[EMAIL PROTECTED]
Sent: Friday, December 12, 2003 9:32 AM
To: [EMAIL PROTECTED]
Subject: OpenSSL 0.9.7a - Small (585 byte) memory leak
Hi there,
One of our proje
On Thu, 20 Feb 2003 10:53:49 +, Andrew Marlow wrote:
>Yes, it's annoying that OpenSSL did this, but there it is.
>OpenSSL 0.9.7 has this file in the source tree, it just doesn't
>install it!
Because this file is for OpenSSL internal use only.
>OpenSSL 0.9.6 installs it properly, so I
That is how current versions of the software work. You can of course
hack the code and remove the checks on your system if you would like. I
do not predict what the future may hold.
Phil Howard wrote:
On Thu, Feb 20, 2003 at 06:17:02PM -0500, Jeffrey Altman wrote:
| OpenSSH and C-Kermit both
On Thu, Feb 20, 2003 at 06:17:02PM -0500, Jeffrey Altman wrote:
| OpenSSH and C-Kermit both perform checks of the version string of the
| library versus the version string of the headers the program was
| compiled with. This is done to ensure that the OpenSSL header constants
| and APIs used t
In message <[EMAIL PROTECTED]> on Thu, 20 Feb 2003 17:10:28 -0600,
Phil Howard <[EMAIL PROTECTED]> said:
phil-openssl-users> On Thu, Feb 20, 2003 at 12:23:40PM +0100, Richard Levitte - VMS
Whacker wrote:
phil-openssl-users>
phil-openssl-users> | phil-openssl-users> What I had to do to get aroun
OpenSSH and C-Kermit both perform checks of the version string of the
library versus the version string of the headers the program was
compiled with. This is done to ensure that the OpenSSL header constants
and APIs used to build the program match those in the library.
Both products must be ei
On Thu, Feb 20, 2003 at 12:23:40PM +0100, Richard Levitte - VMS Whacker wrote:
| phil-openssl-users> What I had to do to get around the problem was to
| phil-openssl-users> build critical programs like OpenSSH statically so
| phil-openssl-users> they had no dependency on the shared library.
|
| T
20 matches
Mail list logo