I didn't call that one, but I'll give it a try. I also read that if someone
subsequently calls ENGINE_load_builtin_engines()that it'll reset things
back to how they were so I'll look at that also.
Thanks,
BW
On Wed, Dec 10, 2014 at 1:06 AM, Dmitry Belyavsky beld...@gmail.com wrote:
Hello
I checked and ENGINE_set_RAND function is being called. What I can't figure
out is the following:
1. RAND_get_rand_method() is called to get the random method and in a
normal case default_RAND_METHOD would be null which would cause code to
call ENGINE_get_rand() to be called to get the random
Now POODLE is hitting TLS
http://www.computerworld.com/article/2857274/security0/poodle-flaw-tls-itbwcw.html
Any fixes in the works?
--
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
God,Queen and country!Never Satan President Republic!Beware AntiChrist
Now POODLE is hitting TLS
http://www.computerworld.com/article/2857274/security0/poodle-flaw-tls-
itbwcw.html
Any fixes in the works?
As has already been covered in the openssl-dev list. OpenSSL does not have
this defect.
--
Principal Security Engineer, Akamai Technologies
IM:
On Wed, Dec 10, 2014 at 09:51:15AM -0700, The Doctor wrote:
Now POODLE is hitting TLS
http://www.computerworld.com/article/2857274/security0/poodle-flaw-tls-itbwcw.html
Any fixes in the works?
As already said previously, openssl is not affected by this.
kurt
Hi
I am working on issue involving openssl TLS 1.2 finish message decryption. I
was wondering if anyone can tell me how I can generate encrypted handshake
message (client finish message) record larger than 64 bytes only using RSA
AES256-SHA/ AES128-SHA/DES-CBC3-SHA.
Your suggestion is greatly