Hi,
I am writing one sample ssl based client server model which uses
SSL_Read SSL_Write API provided by openssl. But I found that my
application is very slow it takes around 40 mins to copy 700MB file. While
same file using scp finishes in 10 mins.
So my query is that is there an
Hi,
CVE-2014-3510 affects anonymous DH and ECDH ciphersuites only.
The additional modification for RSA key exchange is just us being pedantic:
we added an internal error for an impossible-to-reach condition. It is a
safety net to avoid regression, should something change in the surrounding
code.
Hi,
After searching the web, I am writing to this address as my questions are still
un-answered.
1) Can a SSL structure, allocated memory once via SSL_CTX be used with various
socket descriptors just
by changing the descriptors using SSL_set_fd? The socket descriptor used would
have been
1) That doesn't make sense. Maybe you mean the socket come from (TCP-level)
accept and you give it to SSL_set_fd?
That does make sense and should work for one connection=socket at a time
i.e. accept #3, connect SSL to #3,
do send and receive until connection closed, close socket and SSL_clear,
This is not a –dev question, and there’s no need to send three times.
scp uses the SSH protocol. OpenSSL does not implement SSH.
OpenSSH, which is a different product from a different source, implements
SSH, although in their design the scp program doesn’t do any comms at all,
it just
dear all
i'm trying to generate rsa keypair to be used in a class that has an
attribute
RSA*rsa_keyPair;
and i use function
RSA
AeroRoutingProtocol :: GenerateRSAKeyPair ( )
{
rsa_keyPair = RSA_generate_key(2084,RSA_F4,NULL,NULL);
return rsa_keyPair;
}
when i try to
On Sun, Sep 07, 2014 at 01:00:17PM +0530, Alok Sharma wrote:
I am writing one sample ssl based client server model which uses
SSL_Read SSL_Write API provided by openssl.
If you transfering each block of data as an RPC, with a round-trip
acknowledgement before sending the next block, and
On 07/09/2014 05:43, Prasad Dabak wrote:
Hello,
Given a signed Windows portable executable, I want to programmatically
verify two things using openssl APIs
1. Verify the digital signature.
2. Confirm that the executable is signed by a specific company using
that company's public key.
It
Hi,
RAND_xxx
CRYPTO_xxx
ERR_xxx
ENGINE_xxx
EVP_xxx
sk_xxx
X509_xxx
BIGNUM_xxx
RSA_xxx
BN_xxx
ASN1_xxx
EC_xxx
etc etc etc.
May I understand why it was decided that OpenSSL can own all the
prefixes or namespaces in the world? How is it possible that OpenSSL
owns the ERR_ prefix (for example
The reason is legacy. Eric Young was not conscious of namespace pollution
when he implemented SSLeay; since then, even after the migration to the OpenSSL
name and team, the focus has been more on maintaining source compatibility than
in creating new interoperability opportunities.
To meet the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
The OpenSSL Development Team have today released the OpenSSL Project
Security Policy.
The policy has been published at:
https://www.openssl.org/about/secpolicy.html
The policy details how we handle and classify security issues, as well
as who we
Hmm...
Switch strongly and definitely to C++
Not for fancy object programming, but for more practical syntaxES for
things like this.
And I am an old C fan programmer...
Pierre Delaage
Le 08/09/2014 00:04, Kyle Hamilton a écrit :
The reason is legacy. Eric Young was not conscious of
And how would you do that without breaking compatibility with every
program (in C, C++ or any other language) that already uses openssl and
depends on the current API names?
Providing the API, semantics and portability of the original SSLeay
library is thesecond-most important feature of OpenSSL
The page https://www.openssl.org/news/state.html, which is supposed
to indicate what the current/next version numbers are is out of date.
Specifically, it was not updated for the August 6 security updates,
so it still claims thatthe versions released on that day have not
yet been released.
All,
I am getting the following with my client cert when trying to connect to an
SSL-enabled MongoDB:
2014-09-03T13:37:56.881-0500 ERROR: cannot read PEM key file:
/users/apps/tstlrn/u019807/DTCD9C3B2F42757.ent.wfb.bank.corp_mongo_wells.pem
error:0906D06C:PEM routines:PEM_read_bio:no start
15 matches
Mail list logo