From: owner-openssl-...@openssl.org On Behalf Of Viktor Dukhovni
Sent: Monday, March 31, 2014 09:09
To: openssl-dev@openssl.org
Subject: Re: Insecure DEFAULT cipher set
On Mon, Mar 31, 2014 at 08:49:37AM -0400, Hubert Kario wrote:
Problem is that RC4 is providing comparable security to
Hello!
I use openssl-1.0.1e in a debian system and i try to make some scenarios
with TLSv1.2 using the applications s_server and s_client.
I run on the same system in different consoles
openssl s_server -accept 4061 -tls1_2 -cert /root/CERT.pem -key
/root/CERTKey.pem -pass stdin -CApath /root/
On Thu, Apr 03, 2014 at 02:33:17PM +0300, Costas Stasimos wrote:
[ I think this thread belongs on openss-users, not openssl-dev, setting
Reply-To: accordingly. ]
I use openssl-1.0.1e in a debian system and i try to make some scenarios
with TLSv1.2 using the applications s_server and
On Thu, Apr 03, 2014 at 02:33:17PM +0300, Costas Stasimos wrote:
Hello!
I use openssl-1.0.1e in a debian system and i try to make some scenarios
with TLSv1.2 using the applications s_server and s_client.
Is that the version from debian, or are you building your own
version?
There was a
Hi,
following I will show the code line excerpt affected.
OpenSSL version: 1.0.1f
Operating System: Windows7
C++ Compiler: VS2005
Source File: ssl/s23_clnt.c
Affected Line: 286
Excerpt:
int ssl_fill_hello_random(SSL *s, int server, unsigned char *result, int
len)
{
int send_time = 0;