Thanks Guys,
At the moment I'm trying to distinguish if n p, as the x co-ordinate does not
wrap around n (so x = r in all cases) - to verify if this is always the case
Sent from my iPad
On 20 Dec 2013, at 04:16, Billy Brumley bbrum...@gmail.com wrote:
... yet it seems you are free to use
On 20 December 2013 09:09, Patrick McCorry stonecold...@gmail.com wrote:
Thanks Guys,
At the moment I'm trying to distinguish if n p, as the x co-ordinate does
not wrap around n (so x = r in all cases) - to verify if this is always the
case
n can be greater than p, e.g. see the
First time trying to retro-fit an app with SSL so could use some help...
Compiling on Scientific Linux 6.4
openssl-devel 1.0.1e-15.el6_5.x86-64
#include openssl/ssl.h
gcc -lssl -lcrypto-pipe -Wall -Wno-unused-parameter -ggdb3 -fPIC
-fno-strict-aliasing -rdynamic -I/opt/apps/include
Florian:
It would be great to have a self-contained reproducer, so that
we can test this before we enable the NSS-backed crypto
provider in OpenJDK again. Can you use official channels for this?
I can provide you with the x86_64 openssl 1.0.2 utility I built yesterday as
the client plus an
I'm testing the FIPS Capable OpenSSL library with nginx. nginx start a
master process which calls:
SSL_library_init();
SSL_load_error_strings();
OpenSSL_add_all_algorithms();
The master then starts a number of child processes. It does so by
forking without an exec (if I am reading
I don’t use Fedora and track its versions, but assuming those are recent
RedHat including Fedora recently enabled ECC in its openssl packages
after years of excluding it over concerns about Certicom’s patent.
That increases the number of cipher suites in the Client Hello message
and also
Thanks Dave,
I have approached the server operator about the security shortcomings that
you pointed out. In the interim I used your suggestion and altered the
cipher list to SSL_cipher_list DEFAULT:!ECDH.
This has sorted the problem. I am very grateful for your assistance.
Peter.
On 21