> On Jun 8, 2018, at 4:03 AM, Matt Caswell wrote:
>
> I think new_session_cb and remove_session_cb should work in 1.0.2 on
> clients.
This has worked since before 0.9.8.
--
Viktor.
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
> On Jun 8, 2018, at 3:02 AM, Sangsub wrote:
>
> pem_base64:"MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAirjFSROMxZ9gW1AmX2nsO4zjs+mvXhdNJs/iQmUBBL6gUQEYlnbHopLMa1rnGeEZ46wp6dOtna3NpJby9xhfnAxIcqLbEk8BmSsjjoP9WC2KKQ8pc/nPdE8eU/iqU6IlwSKZscw2WPtgfLWrpXmDLWwmh/cTAKTfPfHBQH4X0ipcGcgw7QxYJAcjCaYSu
On 08/06/18 11:29, Sangsub wrote:
> char buf[2] = {0,};
> memcpy(buf, pStr, sizeof(buf));
>
> out[i] = (unsigned char)strtol(buf, NULL, 16);
This looks wrong. "buf" is not NUL terminated so strtol could give an
incorrect result.
On 08/06/18 10:18, Angus Robertson - Magenta Systems Ltd wrote:
>> The get_session_cb is only ever called for servers. The
>> new_sesion_cb and remove_session_cb can be called for clients and
>> servers.
>>
>> When you refer to the the "TLSv1.3 notes" do you mean this page?
>> https://wiki.open
(Top posting for consistency).
Once the client receives the TLS1.2 servers choice of DH group,
it can either accept it or abort the connection.
However if both client and server support the "supported_groups"
extension (RFC4492) with the additional DH group identifiers in
RFC7919, they can negot
Thanks Matt for your reply.
The purpose I am doing this is to find the modulus and exponent in the RSA
public key.
My sample code and the current results are shown below.
=
void fnStr2Hex(char* out, char* in) {
int data_len = strlen(
Hi,
> Since I can’t find any current pre-build versions of OpenSSL for this
> platform, I am trying to build OpenSSL 1.1.0h with GCC 4.6.1 on HPUX 11.0.
>
> I’ve tried a basic ./config approach but that appears to select
> hpux-parisc1_1-gcc when I want PARISC2.
>
> I tried building it, but h
Hello,
Thank you Matt and Jordan. So, it seems that it's possible to modify my
client to accept/reject the DH group key length. But i have one more issue
to be clarified.
Is it possible that if a client does not accept the DH group key length
used by the server, then, a different possible cipher (
> The get_session_cb is only ever called for servers. The
> new_sesion_cb and remove_session_cb can be called for clients and
> servers.
>
> When you refer to the the "TLSv1.3 notes" do you mean this page?
> https://wiki.openssl.org/index.php/TLS1.3
Yes, sorry I should have said SSL_CTX_sess_set
On 08/06/18 08:02, Sangsub wrote:
>
> I would like to perform operations such as RSA signature verification
> through an RSA public key file received from an external server.
> Key values are given in der format or pem format as follows.
>
> der:"30820122300d06092a864886f70d01010105000382010f0
On 08/06/18 02:48, John Jiang wrote:
> Is it possible to check Key/IV update feature via these tools?
> Thanks!
Yes. See the "CONNECTED COMMANDS" sections of these pages:
https://www.openssl.org/docs/manmaster/man1/s_server.html
https://www.openssl.org/docs/manmaster/man1/s_client.html
Basicall
On 07/06/18 21:40, wazzu62 wrote:
> read from 0x55f11344dea0 [0x55f113455ee3] (5 bytes => 5 (0x5))
> - 48 54 54 50 2fHTTP/
Here is your problem. s_client sends a TLS ClientHello to the server.
And the server responds with HTTP!!! The server is not using
On 07/06/18 19:48, Angus Robertson - Magenta Systems Ltd wrote:
> I'm reading the TLSv1.3 notes that suggest SSL_CTX_sess_set_get_cb is
> called for both clients and servers, but am confused by the
> documentation.
>
The get_session_cb is only ever called for servers. The new_sesion_cb
and re
I would like to perform operations such as RSA signature verification
through an RSA public key file received from an external server.
Key values are given in der format or pem format as follows.
der:"30820122300d06092a864886f70d01010105000382010f003082010a02820101008ab8c549138cc59f605b50265f69e
14 matches
Mail list logo