Re: [openssl-users] Using weak ciphers in OpenSSL v 1.1.0e client

2017-06-07 Thread gerritvn
Solution found! Add the following line: SSL_CTX_set_cipher_list(*ppctx, "ALL"); -- View this message in context: http://openssl.6102.n7.nabble.com/Using-weak-ciphers-in-OpenSSL-v-1-1-0e-client-tp71061p71064.html Sent from the OpenSSL - User mailing list archive at Nabble.com. --

Re: [openssl-users] Using weak ciphers in OpenSSL v 1.1.0e client

2017-06-07 Thread gerritvn
Thank you Ben, but I am afraid it does not work unless I'm doing something wrong. Here is a code snippet: int CSSL::createCTX(SSL_CTX **ppctx, int ) { X509_NAME *xn; SSL *ssl; X509 *pX509; POSITION pos; TCHAR name[256], *cert_file = NULL, *CAfile, certInfo[512] = _T("");

Re: [openssl-users] Using weak ciphers in OpenSSL v 1.1.0e client

2017-06-07 Thread Benjamin Kaduk via openssl-users
On 06/07/2017 11:13 AM, gerritvn wrote: > We are using OpenSSL in a terminal emulation product. > We recently upgraded from OpenSSL v 1.0.2g to OpenSSL v 1.1.0e. > Some servers we connect to do not support any of the strong ciphers which > are compiled by default in OpenSSL v 1.1.0e and returns an

[openssl-users] Using weak ciphers in OpenSSL v 1.1.0e client

2017-06-07 Thread gerritvn
We are using OpenSSL in a terminal emulation product. We recently upgraded from OpenSSL v 1.0.2g to OpenSSL v 1.1.0e. Some servers we connect to do not support any of the strong ciphers which are compiled by default in OpenSSL v 1.1.0e and returns an alert with "handshake error". We recompiled