Dr. Stephen Henson st...@openssl.org writes:
On Tue, Oct 12, 2010, Hanno Bck wrote:
Hi,
I wanted to ask if there are any plans when openssl 1.1 or at least
a pre/alpha/beta-version of it is going to be released.
(the background I'm asking this is that I'm currently interested in
the
On Wed, Oct 13, 2010, Henrik Grindal Bakken wrote:
Dr. Stephen Henson st...@openssl.org writes:
On Tue, Oct 12, 2010, Hanno Bck wrote:
Hi,
I wanted to ask if there are any plans when openssl 1.1 or at least
a pre/alpha/beta-version of it is going to be released.
(the
Hi, Mounir.
Thanks for your help; we can now negotiate between 1.0 and 1.1. My only
comment is that -- based on our testing -- only SSLv23_{server,
client}_method allows negotiation. TLSv1_*_method will *not* accept TLS
1.1 connections. And SSL3_*_method will not accept TLS connections.
This
Ingo, you might be interested in OpenPACE [1] and Virtual Smart Card
Architecture [2]. The first offers crypto algorithms to talk to the new
German identity card the latter has tools (for example pace-tool), which
can talk to the actual card. Both tested with ePA - BDr GmbH - Testkarte
v1.00.
Ingo, you might be interested in OpenPACE [1] and Virtual Smart Card
Architecture [2]. The first offers crypto algorithms to talk to the new
German identity card the latter has tools (for example pace-tool), which
can talk to the actual card. Both tested with ePA - BDr GmbH - Testkarte
v1.00.
Hi,
openssl pkeyutl -peerform will SEGV due to dereferencing the NULL
termination of the argv array, here's a fix:
Index: pkeyutl.c
===
RCS file: /cvs/src/lib/libssl/src/apps/pkeyutl.c,v
retrieving revision 1.1.1.2
diff -u -p
Hi Paul,
I'm glad to see that my post helped you even if it was not completely
correct.
I answered too quickly and I wrongly extrapolated the
SSLv23_server_method behavior to the others.
Cheers,
--
Mounir IDRASSI
IDRIX
http://www.idrix.fr
On 10/13/2010 8:10 PM, Paul Suhler wrote:
Hi,