On 8/5/21 00:55, Dr Paul Dale wrote:
> Dennis,
>
> Thanks for the information. Solaris and z/OS are not tested by the
> project, so it's good to know they aren't too far from working out of
> the box.
>
> We would definitely be interested in a pull request with your fixes at
> some stage --
> On 10 Aug 2021, at 4:48 pm, Ma Zhenhua wrote:
>
> In Openssl 1.1.1a, how can I force the TLS1.2 user to use the
> "rsa_pkcs_sha512" signature algorithm? Many thanks in advance.
Your question is not very specific. Please explain what you mean in more
detail.
--
Viktor.
On 2021-08-11 13:52, Keine Eile wrote:
Hi list members,
I have a .p7f in hands, which seems to be a DER encoded PKCS7
structure in some way, I can use 'openssl pkcs' to transform it in a
PEM form, I also can pull a bunch of certificates out of it. But I
know, there is some encrypted pay load
Hi list members,
I have a .p7f in hands, which seems to be a DER encoded PKCS7 structure in some
way, I can use 'openssl pkcs' to transform it in a PEM form, I also can pull a
bunch of certificates out of it. But I know, there is some encrypted pay load
in this file, which I can not decipher.
On 11/08/2021 08:16, Paramashivaiah, Sunil wrote:
Hi All,
In our application we are using MD5_CBLOCK, SHA_CBLOCK, SHA256_CBLOCK,
SHA512_CBLOCK macros which are deprecated in openssl 3.0.
We are trying upgrade our application from using openssl
1.0.2 to openssl 3.0.
Hi All,
In our application we are using MD5_CBLOCK, SHA_CBLOCK, SHA256_CBLOCK,
SHA512_CBLOCK macros which are deprecated in openssl 3.0.
We are trying upgrade our application from using openssl 1.0.2 to
openssl 3.0.
Can we use EVP_MAX_BLOCK_LENGTH to replace all these