Hi,
We are trying to upgrade from 0.9.8 to 1.0.2 and it seems that the fips process
has changed.
Based on the user guide if I can get the canister to build on any platform with
no changes, I can make the the user affirmation from page 59 even if that
platform is not on the supported platform
On 03/05/2015 10:05 AM, Steve d wrote:
Hi,
We are trying to upgrade from 0.9.8 to 1.0.2 and it seems that the fips
process has changed.
Based on the user guide if I can get the canister to build on any
platform with no changes, I can make the the user affirmation from page
59 even if
Hi all,
I just tried out the most recent version of freeradius (v3.0.7), and it failed
to start up with the following message:
Thu Mar 5 11:12:33 2015 : Info: Debugger not attached
Thu Mar 5 11:12:33 2015 : Error: Refusing to start with libssl version OpenSSL
1.0.1e-fips 11 Feb 2013
Hi,
First attempt to cross compile openssl 1.0.1j for an imx53 ARM target. We use
-march=armv7-a -mfpu=neon flags when compiling other libraries and our own
apps. Looking at the Configure script the closest match I could find is
linux-armv4 so my configure line is:
./Configure --prefix=path
if (!openssl_is_patched(CVE-2014-0160”)) {
complain_vociferously();
}
That's an interesting idea. Of course the CVE list would grow, so perhaps
arrays of ints are better
Int OPENSSL_cve_fixed(int year, int vuln);;
?
___
openssl-users
Hi Victor,
I am getting following error while verifying the certificate:
error:0D0C50A1:asn1 encoding routines:ASN1_item_verify:unknown message digest
algorithm ,handle_error
PKCS7_verify call is getting failed.
I have attached the certificate.
Thanks,Nirav Dave
On Wednesday, March 4,
On Thursday, March 5, 2015 4:51 PM, postmas...@disney.com
postmas...@disney.com wrote:
550 5.1.2 ... Message Not delivered due to restricted attachment
*** NOTICE *** *** NOTICE *** *** NOTICE *** *** NOTICE ***
The message you sent:
RECIPIENT(s):
On 5 Mar 2015, at 12:23, Salz, Rich rs...@akamai.com wrote:
if (!openssl_is_patched(CVE-2014-0160”)) {
complain_vociferously();
}
That's an interesting idea. Of course the CVE list would grow, so perhaps
arrays of ints are better
Int OPENSSL_cve_fixed(int year, int vuln);;
?
On Wed, Mar 04, 2015, Welling, Gerhart Gerhart wrote:
I'm partly into researching FREAK, then, realize an answer - or, better, an
explanation - might be available at hand. My first assumption was that
FIPS-mode makes International Step-Up impossible. Right?
Among other things FIPS mode