Hi Mike,
I would like to volunteer for the same. I can spare some time on the weekends
for it. Please do note that even I am new to openssl and it would be good to
get to know more on the code by doing unit test.
Thanks
Darshan
-Original Message-
From: owner-openssl-...@openssl.org [m
Hi,
Does Openssl support IPv6 officially?.
Thanks & Regards
Darshan
Hi,
I have a query with regards to FIPS mode and use of Openssl. I have put my
kernel image n FIPs mode using the documentation
(https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/sect-Security_Guide-Federal_Standards_And_Regulations-Federal_Informatio
-boun...@openssl.org] on behalf of Steve Marquess
[marqu...@openssl.com]
Sent: Friday, May 27, 2016 2:58 PM
To: openssl-dev@openssl.org
Subject: Re: [openssl-dev] FIPs mode and openssl
On 05/27/2016 05:11 AM, Mody, Darshan (Darshan) wrote:
> Hi,
>
>
>
> I have a query with regards t
Hi,
Does Openssl allows NULL ciphers when we put openssl in FIPS mode?
Thanks
Darshan
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Hi
I find there are 2 APIs for SSL renegotiation. SSL_renegotiate and
SSL_renegotiate_abbreviate.
What is the difference between them?
Thanks
Darshan
--
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Hi,
We have modified our codebase to have CRL verification on the incoming
certificates. While doing a negative testing with load of certificates I find
that the resident memory for the module.
My query is when we have CRL verification enabled does openssl caches incoming
certificates?
Please
Hi,
We have observed memory leak when we register for ECDH
callback(SSL_set_tmp_ecdh_callback). While performing negative testing with
load we find that the applications starts leaking memory.
Further checking the Openssl implementation in the s3_srvr.c file (openssl
version 1.0.2). I find tha
Hi,
Can anyone in the developer forum clarify whether there is an issue here?
Thanks
Darshan
From: openssl-dev [mailto:openssl-dev-boun...@openssl.org] On Behalf Of Mody,
Darshan (Darshan)
Sent: Wednesday, March 15, 2017 11:15 AM
To: openssl-dev@openssl.org
Cc: Bahr, William G (Bill); Vaquero
Matt,
But openssl does not release the memory when it has duplicated the EC Key which
comes from the application
/* Duplicate the ECDH structure. */
if (ecdhp == NULL) {
SSLerr(SSL_F_SSL3_SEND_SERVER_KEY_EXCHANGE, ERR_R_ECDH_LIB);
goto err;
memory from cb */
If (NULL !=ecdhp) {
EC_KEY_free(ecdhp);
}
}
}
Thanks
Darshan
-Original Message-
From: openssl-dev [mailto:openssl-dev-boun...@openssl.org] On Behalf Of Mody,
Darshan (Darshan)
Sent: Thursday, Ma
.
Thanks
Darshan
-Original Message-
From: openssl-dev [mailto:openssl-dev-boun...@openssl.org] On Behalf Of Matt
Caswell
Sent: Thursday, March 23, 2017 3:31 PM
To: openssl-dev@openssl.org
Subject: Re: [openssl-dev] Memory leak in application when we use ECDH
On 23/03/17 04:35, Mody
Subject: Re: [openssl-dev] Memory leak in application when we use ECDH
On 23/03/17 10:13, Mody, Darshan (Darshan) wrote:
> Matt,
>
> Even after accounting for the EC_KEY we still observe some leak. The
> leak started after we started using supporting EC with callback
> SSL_set_tm
] Memory leak in application when we use ECDH
On 23/03/17 13:19, Mody, Darshan (Darshan) wrote:
> Can you further elaborate?
>
> What we did is to create a TLS connection and with invalid
> certificates from the client and server on verification would reject
> the certificate. The ci
3 Mar 2017 13:47:10 +, "Mody, Darshan (Darshan)"
said:
darshanmody> Matt,
darshanmody>
darshanmody> Below is the scenario.
darshanmody>
darshanmody> 1. Have server open a listen socket which always validates the
client certificate and chain.
darshanmody> 2. On ser
S 10.3 0.2 0:43.23 openssl
Thanks
Darshan
-Original Message-
From: openssl-dev [mailto:openssl-dev-boun...@openssl.org] On Behalf Of Mody,
Darshan (Darshan)
Sent: Thursday, March 23, 2017 7:40 PM
To: openssl-dev@openssl.org
Cc: Bahr, William G (Bill)
Subject: Re: [openssl-dev] Memory
suppressed errors, rerun with: -v
==15312== Use --track-origins=yes to see where uninitialised values come from
==15312== ERROR SUMMARY: 91846 errors from 1000 contexts (suppressed: 0 from 0)
Matt
On 27/03/17 09:40, Mody, Darshan (Darshan) wrote:
> Matt, Richard,
>
> I have not cre
Hi Matt,
Is re-negotiation fixed with openssl 1.1.0 ?
https://rt.openssl.org/Ticket/Display.html?id=3712&user=guest&pass=guesthttps://rt.openssl.org/Ticket/Display.html?id=3712&user=guest&pass=guest
>From the ticket it seems its marked resolved but your patch is not in the
>openssl base due to
: [openssl-dev] Renegotiation ticket 3712
On 02/04/17 04:50, Mody, Darshan (Darshan) wrote:
> Hi Matt,
>
> Is re-negotiation fixed with openssl 1.1.0 ?
> https://urldefense.proofpoint.com/v2/url?u=https-3A__rt.openssl.org_Ti
> cket_Display.html-3Fid-3D3712-26user-3Dguest-26pass-3Dg
machine and internals.
Thanks
Darshan
-Original Message-
From: openssl-dev [mailto:openssl-dev-boun...@openssl.org] On Behalf Of Matt
Caswell
Sent: Monday, April 03, 2017 3:59 PM
To: openssl-dev@openssl.org
Subject: Re: [openssl-dev] Renegotiation ticket 3712
On 03/04/17 11:24, Mody, Darshan
20 matches
Mail list logo