On 04/18/2016 11:01 AM, Tristan Leask wrote:
> Hi All,
>
> I am currently trying to setup an automated build process for a
> cloned copy of the code. ...
>
> In the link mentioned, it is talked about modifying the perl script
> to change how STDOUT works, however when you are compiling FIPS you
>> plus you're constrained by the
>> requirements of the Security Policy to build the module with precisely
>> the commands:
>>
>> gunzip -c openssl-fips-2.0.12.tar.gz | tar xvf -
>> cd openssl-fips-2.0.12
>> ./config
>> make
Silly question... I know that you should only run the above
[ Redirecting to openssl-users@openssl.org ]
On Tue, Apr 19, 2016 at 01:11:38AM +, CHOW Anthony wrote:
> I am trying to do “openssl verify –CAfile server.pem” and the command hang.
It is supposed to hang (reading standard input) when (incorrectly)
invoked this way. You've left out the
Hi.
Are you using the Apache server?
On 18 April 2016 at 14:46, james sqawz [via OpenSSL] <
ml-node+s6102n65566...@n7.nabble.com> wrote:
> Hi all,
>
> Thanks for the providing the forum for discussion on TLS/OPENSSL related
> issue.
>
> I am very new to openssl.
>
> Currently I am trying to
@danigrosu
Not exactly Apache server.
But from some different client it properly responded with "SERVER HELLO" .
Thanks
On Mon, Apr 18, 2016 at 6:22 PM, wrote:
> Send openssl-users mailing list submissions to
> openssl-users@openssl.org
>
> To
Hi all,
Thanks for the providing the forum for discussion on TLS/OPENSSL related
issue.
I am very new to openssl.
Currently I am trying to implement HTTP over TLS.(TLS Version 1.2)
For that purpose I send connect request to the server,but connection is
getting failed.
Following fields are
So the problem is on client side since you receive server hello.
Please give some more details. What are you trying to do and
especially how.
Regards,
Dani Grosu
--
View this message in context:
http://openssl.6102.n7.nabble.com/Re-openssl-users-Digest-Vol-17-Issue-24-tp65568p65570.html
Sent
Hi All,
I am currently trying to setup an automated build process for a cloned copy of
the code. I can run through the process manually by issuing all the commands
required from a command line without issue. If I then take all these commands
and put them into a CI job using Jenkins, I then
On 19/04/2016 05:55, Alex Samad wrote:
Hi
I have a SHA.sha file
/usr/bin/openssl ts -query -data SHA.sha -sha256 | /usr/bin/curl -s -H
Content-Type:application/timestamp-query --data-binary @-
http://sha256timestamp.ws.symantec.com/sha256/timestamp > SHA.sha.tsr
/usr/bin/openssl ts -reply -in
On 04/18/2016 04:05 PM, Leaky wrote:
>>> plus you're constrained by the
>>> requirements of the Security Policy to build the module with precisely
>>> the commands:
>>>
>>> gunzip -c openssl-fips-2.0.12.tar.gz | tar xvf -
>>> cd openssl-fips-2.0.12
>>> ./config
>>> make
>
> Silly question...
On 19/04/2016 01:51, Steve Marquess wrote:
On 04/18/2016 04:05 PM, Leaky wrote:
plus you're constrained by the
requirements of the Security Policy to build the module with precisely
the commands:
gunzip -c openssl-fips-2.0.12.tar.gz | tar xvf -
cd openssl-fips-2.0.12
./config
make
Hello,
Could anybody explain how to deal with the output length in the
EVP_EncryptUpdate?
The function EVP_EncryptUpdate has the outl output parameter, which is
designed for returning the length of the resulting ciphertext. Then
internally it calls the do_cipher callback which does not take such
On 18/04/16 15:55, Dmitry Belyavsky wrote:
> Hello,
>
> Could anybody explain how to deal with the output length in the
> EVP_EncryptUpdate?
>
> The function EVP_EncryptUpdate has the outl output parameter, which is
> designed for returning the length of the resulting ciphertext. Then
>
On 18/04/16 06:32, James wrote:
> Hi there,
> In the below link I could see TLS 1.3 support will be added in future
> releases
> https://www.openssl.org/policies/roadmap.html
>
> I think the support is not yet added. From when it will be added
TLS1.3 will not be in the next release which is
14 matches
Mail list logo