Gayathri the core and the binary file are attached with the message.
Please let me know if you get any idea.
If you aware how the call back mechanism works. Please share the same.
Thanks in advance.
Gayathri Sundar-3 wrote:
Can u share the parsed core file?
On Wednesday, May 11, 2011,
dhoward wrote on Wednesday, May 11, 2011 20:01:
I was recently playing around with OpenSSL's EC_KEY interface, specifically
generating and examining keys generated using the curve sect233r1, when I
decided to print the raw key out, in hex form. A quick analysis showed me
that the key was
Any inputs?
This same application on windows does hand shake successfully.
Server is same in both linux and windows client application.
pradeepreddy wrote:
Hi,
I have the SSL_library_init() in my app, which will load the algos.
Erik Tkal wrote:
I think that means you have not
It's not clear if you're talking about the private or public part of the key.
If you're talking about the private part, that's because only a
negligible number of private keys for that curve need 233 bits to be
stored. This is due to the fact that the large, prime-order subgroup
has the form
Hi all,
I have run a vulnerability scanning against some systems and some
vulnerabilities have come up related with OpenSSL. However, some of them have
not 443 port open or have nothing but a single file named as openSSL inside
some other's application folder. I asked about the operation of
On Thu May 12 2011, Argyris Ps wrote:
Hi all,
I have run a vulnerability scanning against some systems and some
vulnerabilities have come up related with OpenSSL. However, some of them have
not 443 port open or have nothing but a single file named as openSSL inside
some other's
can you give some specific cipher like rc4-md5 using the --cipher command
and see if it goes thro? maybe the 1st cipher suite sent by the client is
not available with the server or something..you can use mozilla and edit the
cipher suites in the advance tab or use openssl client connect command
Hi,
I have tried with all the ciphers. This same application works well on
windows.
I run my application again with s_server, but hit with the same error:
SSL_ERROR_SSL
error:140D308A:SSL routines:TLS1_SETUP_KEY_BLOCK:cipher or hash unavailable
This time, instead of using my own server, I have
From: owner-openssl-us...@openssl.org On Behalf Of Mohan Radhakrishnan
Sent: Thursday, 12 May, 2011 00:04
I think I have been able to replace only the intermediate certificate
which has a different validity period. I believe this can be done
because what the intermediate certificate is
Hi,
Actually the procedure is similar
1. Use Keytool and convert JKS to PKCS12.
2. Use OpenSSL to convert PKCS12 contents to pem. Now this has the
private key and the entire chain.
3. Use open source Java tool to build a new keystore *after replacing
the intermediate with the one
From: owner-openssl-us...@openssl.org On Behalf Of pradeepreddy
Sent: Thursday, 12 May, 2011 18:37
I have tried with all the ciphers. This same application works well on
windows.
I run my application again with s_server, but hit with the same error:
SSL_ERROR_SSL
error:140D308A:SSL
So I tried that procedure.
If you export your existing leaf cert, and concatenate it
with the new intermediate and import that combination, it will work.
1. If my lowermost leaf is first in the .pem file then a new alias is
created and the certificate is imported. Not what I want.
2. If the
12 matches
Mail list logo