Re: [openssl.org #2451] [PATCH] Enhancement: Telnet START_TLS in s_client
Hi, On Fri, Aug 29, 2014 at 1:47 PM, Rich Salz via RT r...@openssl.org wrote: Fixed in rsalz-monolith branch of akamai/openssl fork on github. To be part of post-1.0.2. Thanks! Great. commit 0223322b17f50f2e46c072e4d1cdd2e82426260d I checked this commit, and it looks like PROTO_XMPP's case is missing a break, so it will fall through to PROTO_TELNET. Thanks. David __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org
[openssl.org #2525] [PATCH] Enhancement: Output Format for req Keys
Hi, I have some cases where a binary (DER) private key is more useful than PEM when created along with a certificate request. In the req app, new keys are hard-coded to be written as PEM files. The attached patch uses the value from -keyform to determine the output format which removes the need for manual conversion afterwards. (This is against 1.0.0d, but should be trivial to port to other versions.) To have consistent names, a new option -keyoutform should probably be added for this. I didn't want to change the user interface, so I reused -keyform. I can resubmit with the new option if that is preferred. Comments? Thanks openssl-req-keyoutform.patch Description: Binary data
[openssl.org #2451] [PATCH] Enhancement: Telnet START_TLS in s_client
Hi, I sent this patch to the developer list a while ago after I made it for a proof-of-concept in our network. It turns out we will need to support telnet's START_TLS connection method[1] in our mainframe environment, and it would make things easier for our testing/debugging if this was supported in OpenSSL by default. So, this is my enhancement request to add this functionality. The attached patch applies cleanly against the 1.0.0 releases. Let me know if there are any problems. Thanks [1] https://tools.ietf.org/html/draft-altman-telnet-starttls-02 openssl-telnet-starttls.patch Description: Binary data