Thanks for your quick response. See inline.
On Mon, Nov 24, 2014 at 7:31 AM, Matt Caswell via RT r...@openssl.org wrote:
On Sun Nov 23 19:09:46 2014, prav...@viptela.com wrote:
This happens when the server is unreachable. The client when it is trying
to resend the client_hello is barfing on
Version : 1.0.1j
Platform : mips64
The client is trying to reach a server that does not exist. And we are
trying to free the ssl peer. It has probably tried a retransmission after 1
second and SSL_connect returned ERR_WANT. Any help here is greatly
appreciated.
Please let me know if you need any
On Mon Nov 24 21:52:04 2014, prav...@viptela.com wrote:
* state = 4384,*
This is SSL3_ST_CR_SRVR_HELLO_A, i.e. we are trying to read a ServerHello. This
confirms what we expected.
So if s-init_num is 0 then frag_len is 0 and frag-fragment gets
set to
NULL.
What I missed in the above is
On Thu Nov 20 21:35:45 2014, phil...@redfish-solutions.com wrote:
Can the following function please be added:
int RSA_public_digest(const RSA* key, const EVP_MD *type, unsigned
char *md, unsigned int *len);
which would use “type” to generate a digest over the DER encoding of
the public
2. When will RT2574 be integrated to protect our ECC keys in the inevitable
presence of software defects like this?
http://rt.openssl.org/Ticket/Display.html?id=2574user=guestpass=guest
Timing attacks on ECC isn't a very high priority right now, given all the other
bigger easier to exploit
On 11/25/2014 07:48 AM, Matt Caswell via RT wrote:
On Thu Nov 20 21:35:45 2014, phil...@redfish-solutions.com wrote:
Can the following function please be added:
int RSA_public_digest(const RSA* key, const EVP_MD *type, unsigned
char *md, unsigned int *len);
which would use “type” to generate
On 11/25/2014 07:48 AM, Matt Caswell via RT wrote:
On Thu Nov 20 21:35:45 2014, phil...@redfish-solutions.com wrote:
Can the following function please be added:
int RSA_public_digest(const RSA* key, const EVP_MD *type, unsigned
char *md, unsigned int *len);
which would use “type” to
We will soon be freezing the mailing list memberships for a couple of days.
We are moving to a new server and upgrading the mail infrastructure.
(For mail wonks who might care: replacing the aging majordomo setup with a
more-current mailman setup, among other things.)
--
Principal Security
OpenSSL is currently not supported under Cygwin64.
There is a port:
http://sourceforge.net/p/cygwin-ports/cygwin64-openssl/ci/master/tree/1.0.1-cygwin64.patch
You may wish to submit this defect there.
Closing this ticket.
Matt
On Tue, Nov 25, 2014, Philip Prindeville via RT wrote:
On 11/25/2014 07:48 AM, Matt Caswell via RT wrote:
On Thu Nov 20 21:35:45 2014, phil...@redfish-solutions.com wrote:
Can the following function please be added:
int RSA_public_digest(const RSA* key, const EVP_MD *type, unsigned
Thanks for your submission. However Steve Henson has already commited a similar
patch, therefore closing this ticket.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Thanks for the reply, Rich.
2. When will RT2574 be integrated to protect our ECC keys in the inevitable
presence of software defects like this?
http://rt.openssl.org/Ticket/Display.html?id=2574user=guestpass=guest
Timing attacks on ECC isn't a very high priority right now, given all the
OP reports this now working. Closing ticket.
Matt
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Hello everyone,
Greetings for the day.. !
I was trying to add a new cipher to openssl so as to use it with the
digital certificate, is it possible ?
Thankyou.
Regards,
Niraj.
On Wed, Nov 26, 2014 at 10:44:34AM +0530, Niraj Sorathiya wrote:
I was trying to add a new cipher to openssl so as to use it with the
digital certificate, is it possible ?
Is this a homework assignment? A class project?
This question does not belong on the openssl-dev list, moved to
Bcc,
Hi Viktor,
Yes it's project and I think I would need to deal with openssl library and
developers know well about library.
Can you suggest me on this ?
-Niraj
On 26-Nov-2014 11:04 AM, Viktor Dukhovni openssl-us...@dukhovni.org
wrote:
On Wed, Nov 26, 2014 at 10:44:34AM +0530, Niraj Sorathiya
16 matches
Mail list logo