I had been always successful with Configure for last several releases. But with
1.0.2h, I am not able to run Configure correctly. Note that I am on Windows
msys.
Here is what I get :
$ ./configure no-symlinks shared mingw
Configuring for mingw
no-ec_nistp_64_gcc_128 [default]
On Thu, May 26, 2016 at 5:51 PM, Jakob Bohm wrote:
> On 26/05/2016 18:33, R-D intern wrote:
>>
>> Hello,
>> I have implemented ssl for my internal server that listens over
>> a
>> private ip. Can anyone suggest how can I test my ssl_server? For eg.
>> Qualys
>>
On 27/05/16 13:23, counterpoint wrote:
> Thanks for the comments, Matt.
>
>> read_ahead and SSL_pending() do not play nicely together unfortunately.
>> See the master (1.1.0) version of the SSL_pending() documentation which
>> discusses this issue and introduced the new function
Hi,
I cannot find the implementation of EVP_aes_128_gcm() in openssl-1.0.2g
(2016-Mar-01). I searched all files but it's not there. Also when compiling
openssl as a lib, it's missing.
I can only find the header prototype of EVP_aes_128_gcm() which doesn't help
much.
Any idea where I can find
Thanks for the comments, Matt.
> read_ahead and SSL_pending() do not play nicely together unfortunately.
> See the master (1.1.0) version of the SSL_pending() documentation which
> discusses this issue and introduced the new function SSL_has_pending()
> which addresses it:
>
On 27/05/16 14:49, Jensen, Jens H wrote:
> Hi,
>
>
>
> I cannot find the implementation of EVP_aes_128_gcm() in openssl-1.0.2g
> (2016-Mar-01). I searched all files but it’s not there. Also when
> compiling openssl as a lib, it’s missing.
>
>
>
> I can only find the header prototype of
On 27/05/16 07:32, counterpoint wrote:
> Hmm, some progress, but still puzzled. When my code is acting as the client,
> it seems that the problem can be overcome by calling SSL_set_read_ahead with
> a zero parameter, to turn off reading ahead. This is done just before
> calling SSL_connect. The
Two or more calls to ssl_shutdown() resulted in a lock. ssl_shutdown would
not return for over 60 seconds or more. The server, or host, is Microsoft
IIS.
Could OpenSSL add a setting function to the library which will set the
timeout/waketime for ssl_shutdown() (process)?
Thank you.
Gary Pham
Seems to always be zero, Matt, as it should be. This gives some idea of what
is going on:
Breakpoint 4, dcb_basic_read_SSL (dcb=0x7fffdc0158d0,
nsingleread=0x7fff86fc) at /root/MaxScale/server/core/dcb.c:12181218
switch (SSL_get_error(dcb->ssl, *nsingleread))$352 = 16384Breakpoint
Thank you so much.I tried searching for a downloadable ssl_server test
source code for internal servers but couldn't get any.how could I get one?
Thanks and regards,
R-D Intern
--
View this message in context:
http://openssl.6102.n7.nabble.com/regarding-ssl-server-test-tp66354p66400.html
Thanks Matt, good points. Not easy to implement though!
In the problem case, my code is the server (it is a proxy), and the standard
MariaDB command line client is the client. Yes, it does look as if
everything is happening as it should, except that the process stops before
all the data has been
On 27/05/16 15:51, counterpoint wrote:
> Seems to always be zero, Matt, as it should be. This gives some idea of
> what is going on:
>
> Breakpoint 4, dcb_basic_read_SSL (dcb=0x7fffdc0158d0,
> nsingleread=0x7fff86fc) at /root/MaxScale/server/core/dcb.c:1218
> 1218switch
On 27/05/16 16:20, counterpoint wrote:
> Thanks Matt, good points. Not easy to implement though!
>
> In the problem case, my code is the server (it is a proxy), and the standard
> MariaDB command line client is the client. Yes, it does look as if
> everything is happening as it should, except
> Perhaps using an eNULL ciphersuite might help?
> Matt
Good idea, I'll give it a try.
--
View this message in context:
http://openssl.6102.n7.nabble.com/OpenSSL-non-blocking-epoll-hanging-on-data-receiving-tp66355p66398.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
All,
We are using OpenSSL 1.0.1e/FIPS 2.0.11 on CentOS6 x86_64 and I have a question
about the TLS GCM Cipher suites -
Do the TLS GCM suites satisfy the requirements of Section 8 of SP 800-38D ?
If I am reading the document right, the following are the requirements therein.
1) The
Hmm, some progress, but still puzzled. When my code is acting as the client,
it seems that the problem can be overcome by calling SSL_set_read_ahead with
a zero parameter, to turn off reading ahead. This is done just before
calling SSL_connect. The application now seems able to read megabytes of
16 matches
Mail list logo