Am 21.09.2011 23:27, schrieb Chang Lee:
> Does anyone know of a way to take an ASN1_OCTET_STRING that contains a
> DER encoded Sequence and extract the contents of the Sequence as an
> ASN1_STRING. Essentially, I want to construct an ASN1 object of the
> Sequence. I guess I could manually parse t
Does anyone know of a way to take an ASN1_OCTET_STRING that contains a DER
encoded Sequence and extract the contents of the Sequence as an ASN1_STRING.
Essentially, I want to construct an ASN1 object of the Sequence. I guess I
could manually parse the Sequence (and deal with the different types o
On Sep 21, 2011, at 9:40 PM, Huaqing Wang wrote:
> Hi,
>
> I don't know if any other person met this issue.
> I use openssl1.0.0e, and working on dtls, in client side, if I set
> SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_QUERY_MTU);
> SSL_set_mtu(ss_ssl, 1500);
> I met a segmentation fault on the
On 21 Sep 2011, at 6:17 AM, Akanksha Shukla wrote:
> Currently we are using OpenSSL 0.9.8 version. I have question about few of
> the API's support for IPV6.
>
> 1) BIO_new_connect()
[...]
>
> Queries :
> 1) Do the above mentioned API's support IPv6?
I don't think so. BIO_new_connect() (and BIO
On Wed, Sep 21, 2011, Gabriel Marques wrote:
> I'm developing a tool for signing digital TV apps, and one of the
> goals was to embed OCSP responses into the CMS signature file of the
> application.
> The idea is that the broadcaster equipment would query the OCSP and
> update t
Hi,
I don't know if any other person met this issue.
I use openssl1.0.0e, and working on dtls, in client side, if I
set SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_QUERY_MTU);
SSL_set_mtu(ss_ssl, 1500);
I met a segmentation fault on the client side, using gdb I saw the error
happens in:
memcpy()
dtls
Hello folks,
I'm developing a tool for signing digital TV apps, and one of the
goals was to embed OCSP responses into the CMS signature file of the
application.
The idea is that the broadcaster equipment would query the OCSP and
update the response with certain f
Hi,
This have been already discussed in the openssl-dev mailing list. Go to
the mailing list archive and take a look at the subject "openssl 1.0.1
and rumors about TLS 1.0 attacks".
To be brief, this attack has been known for 7 years now and OpenSSL
implemented an effective countermeasure agai
The Register published an article yesterday that some people here might
be interested in on TLS 1.0 being "cracked":
http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/
The Register points their Finger of Blame right at OpenSSL.
Of course, a lot of places then blew this out of
I know the OpenSSL equivalent of most of these fields, and I have tried
to guess the last one, see below.
On 9/21/2011 1:05 AM, Matthew F. Hymowitz wrote:
We are trying to set up of VPN tunnel using IKE v2 between a windows
2008 VPN server and a linux machine running strongswan. We are trying
Hi,
Currently we are using OpenSSL 0.9.8 version. I have question about few of
the API's support for IPV6.
1) BIO_new_connect()
2) BIO_set_nbio()
3) BIO_do_connect()
Queries :
1) Do the above mentioned API's support IPv6?
2) If yes, then is there any specific syntax for mentioning the IPv6 addr
11 matches
Mail list logo