/usr/share/doc/openssl/openssl_button.gif
GIF is an outdated old legacy file format.
Please convert it to the modern PNG file format.
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
You are right, it is not a bug.
It was failed as an enhancement, like a feature request.
On Fri, Mar 27, 2015 at 9:38 AM, The default queue via RT r...@openssl.org
wrote:
Greetings,
This message has been automatically generated in response to the
creation of a trouble ticket regarding:
You are right, it is not a bug.
It was failed as an enhancement, like a feature request.
On Fri, Mar 27, 2015 at 1:19 PM, Rich Salz via RT r...@openssl.org wrote:
not a source code bug. not really a bug, even.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
not a source code bug. not really a bug, even.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
When testing s_server/s_client with ECDHE-RSA based ciphers
- with any protocol version
- on the OpenSSL 1.0.1m release
- on x86_64 Fedora 16
the handshake fails with:
140305461679776:error:1408A0C1:SSL routines:SSL3_GET_CLIENT_HELLO:no shared
cipher:s3_srvr.c:1389:
Example commands:
John, Erik,
https://github.com/openssl/openssl/pull/250
Can you verify whether this resolves the problem? (And also, does not
create any new problems.)
Note this is pending team review so is not a definitive fix. But since
we're maintaining this feature more or less blind, we'd appreciate your
Follow up: apparently the problem seems to go away if I add:
::EC_KEY_set_asn1_flag(private_key-pkey.ec, OPENSSL_EC_NAMED_CURVE);
Before the call.
Sadly, I'm facing a similar with the reverse operation (loading EC_KEY
from memory/file) using PEM_read_bio_EC_PUBKEY() when the generated key
Hi Emelia,
I’m not sure that will work as presently designed, as it keys off of the
session object:
-if (s-version = TLS1_VERSION s-tls_session_secret_cb) {
+if (s-version = TLS1_VERSION s-tls_session_secret_cb
+s-session-tlsext_tick) {
Our client uses the public API
Erik Tkal etks...@gmail.com wrote:
In order for EAP-FAST to work it seems that if the client does have a
tls_session_secret that s-hit must NOT be set since there is no indication
in the serverHello as to whether the session_ticket sent by the client is
accepted by the server (the
Brian Smith br...@briansmith.org wrote:
Although the RFC4851 (an informational RFC documenting EAP-FAST) does
not require the server to send the session ticket extension during
resumption, it is based on RFC4507/RFC5077 (which are on the standards
track), which *does* require the server to
10 matches
Mail list logo