Hi Mike,
I would like to volunteer for the same. I can spare some time on the weekends
for it. Please do note that even I am new to openssl and it would be good to
get to know more on the code by doing unit test.
Thanks
Darshan
-Original Message-
From: owner-openssl-...@openssl.org
Hi,
Does Openssl support IPv6 officially?.
Thanks Regards
Darshan
-boun...@openssl.org] on behalf of Steve Marquess
[marqu...@openssl.com]
Sent: Friday, May 27, 2016 2:58 PM
To: openssl-dev@openssl.org
Subject: Re: [openssl-dev] FIPs mode and openssl
On 05/27/2016 05:11 AM, Mody, Darshan (Darshan) wrote:
> Hi,
>
>
>
> I have a query with regar
Hi,
I have a query with regards to FIPS mode and use of Openssl. I have put my
kernel image n FIPs mode using the documentation
Hi,
Does Openssl allows NULL ciphers when we put openssl in FIPS mode?
Thanks
Darshan
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Hi
I find there are 2 APIs for SSL renegotiation. SSL_renegotiate and
SSL_renegotiate_abbreviate.
What is the difference between them?
Thanks
Darshan
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
.
Thanks
Darshan
-Original Message-
From: openssl-dev [mailto:openssl-dev-boun...@openssl.org] On Behalf Of Matt
Caswell
Sent: Thursday, March 23, 2017 3:31 PM
To: openssl-dev@openssl.org
Subject: Re: [openssl-dev] Memory leak in application when we use ECDH
On 23/03/17 04:35, Mody
S 10.3 0.2 0:43.23 openssl
Thanks
Darshan
-Original Message-
From: openssl-dev [mailto:openssl-dev-boun...@openssl.org] On Behalf Of Mody,
Darshan (Darshan)
Sent: Thursday, March 23, 2017 7:40 PM
To: openssl-dev@openssl.org
Cc: Bahr, William G (Bill)
Subject: Re: [openssl-dev] Memo
Subject: Re: [openssl-dev] Memory leak in application when we use ECDH
On 23/03/17 10:13, Mody, Darshan (Darshan) wrote:
> Matt,
>
> Even after accounting for the EC_KEY we still observe some leak. The
> leak started after we started using supporting EC with callback
> SSL_set_tm
] Memory leak in application when we use ECDH
On 23/03/17 13:19, Mody, Darshan (Darshan) wrote:
> Can you further elaborate?
>
> What we did is to create a TLS connection and with invalid
> certificates from the client and server on verification would reject
> the certificate. The ci
13:47:10 +0000, "Mody, Darshan (Darshan)" <darshanm...@avaya.com>
said:
darshanmody> Matt,
darshanmody>
darshanmody> Below is the scenario.
darshanmody>
darshanmody> 1. Have server open a listen socket which always validates the
client certificate and chain.
da
== Use --track-origins=yes to see where uninitialised values come from
==15312== ERROR SUMMARY: 91846 errors from 1000 contexts (suppressed: 0 from 0)
Matt
On 27/03/17 09:40, Mody, Darshan (Darshan) wrote:
> Matt, Richard,
>
> I have not created any patch. Instead I am using s_server app
Matt,
But openssl does not release the memory when it has duplicated the EC Key which
comes from the application
/* Duplicate the ECDH structure. */
if (ecdhp == NULL) {
SSLerr(SSL_F_SSL3_SEND_SERVER_KEY_EXCHANGE, ERR_R_ECDH_LIB);
goto err;
memory from cb */
If (NULL !=ecdhp) {
EC_KEY_free(ecdhp);
}
}
}
Thanks
Darshan
-Original Message-
From: openssl-dev [mailto:openssl-dev-boun...@openssl.org] On Behalf Of Mody,
Darshan (Darshan)
Sent: Thursday, Ma
Hi,
Can anyone in the developer forum clarify whether there is an issue here?
Thanks
Darshan
From: openssl-dev [mailto:openssl-dev-boun...@openssl.org] On Behalf Of Mody,
Darshan (Darshan)
Sent: Wednesday, March 15, 2017 11:15 AM
To: openssl-dev@openssl.org
Cc: Bahr, William G (Bill); Vaquero
Hi,
We have observed memory leak when we register for ECDH
callback(SSL_set_tmp_ecdh_callback). While performing negative testing with
load we find that the applications starts leaking memory.
Further checking the Openssl implementation in the s3_srvr.c file (openssl
version 1.0.2). I find
machine and internals.
Thanks
Darshan
-Original Message-
From: openssl-dev [mailto:openssl-dev-boun...@openssl.org] On Behalf Of Matt
Caswell
Sent: Monday, April 03, 2017 3:59 PM
To: openssl-dev@openssl.org
Subject: Re: [openssl-dev] Renegotiation ticket 3712
On 03/04/17 11:24, Mody, Darshan
: [openssl-dev] Renegotiation ticket 3712
On 02/04/17 04:50, Mody, Darshan (Darshan) wrote:
> Hi Matt,
>
> Is re-negotiation fixed with openssl 1.1.0 ?
> https://urldefense.proofpoint.com/v2/url?u=https-3A__rt.openssl.org_Ti
> cket_Display.html-3Fid-3D3712-26user-3Dguest-26pass-3Dg
Hi,
We have modified our codebase to have CRL verification on the incoming
certificates. While doing a negative testing with load of certificates I find
that the resident memory for the module.
My query is when we have CRL verification enabled does openssl caches incoming
certificates?
19 matches
Mail list logo