> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf
> Of Richard Levitte
> Sent: Friday, February 17, 2017 14:57
>
> In message <1481bc8a-3e0c-4598-9556-0a83f78ac...@dukhovni.org> on
> Fri, 17 Feb 2017 14:15:10 -0500, Viktor Dukhovni us...@dukhovni.org> said:
>
>
> On Feb 17, 2017, at 1:51 PM, Bill Smith wrote:
>
> I pulled down 1.1.0e and tried to build it on Solaris 64. I ran into the
> following error:
>
>
> /tools/solaris/SunStudio12.2/bin/cc -xarch=v9 -mt -o test/ct_test
> test/ct_test.o test/testutil.o -L. -lcrypto
I pulled down 1.1.0e and tried to build it on Solaris 64. I ran into the
following error:
/tools/solaris/SunStudio12.2/bin/cc -xarch=v9 -mt -o test/ct_test
test/ct_test.o test/testutil.o -L. -lcrypto -lresolv -lsocket -lnsl -ldl
-lpthread
cc: Warning: -xarch=v9 is deprecated, use -m64 to
On 17/02/2017 16:21, Stephan Mühlstrasser wrote:
Am 17.02.17 um 16:09 schrieb Jakob Bohm:
On 17/02/2017 15:25, Stephan Mühlstrasser wrote:
Hi,
we use OpenSSL 1.0.2 together with PKCS#11 tokens by plugging methods
into the RSA_METHOD structure that interface with the PKCS#11 token,
and this
>From russellb...@gmail.com Fri Feb 17 09:50:52 MST 2017
to: openssl-users-requ...@openssl.org
subject: set digest
set digest
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
El día Friday, February 17, 2017 a las 09:57:39AM +, Matt Caswell escribió:
>
>
> On 17/02/17 07:46, Matthias Apitz wrote:
> > New, TLSv1/SSLv3, Cipher is DHE-DSS-AES128-GCM-SHA256
>
> Your server appears to be configured with a DSA certificate.
>
> OpenSSL 1.1.0 made changes to the
Am 17.02.17 um 16:09 schrieb Jakob Bohm:
On 17/02/2017 15:25, Stephan Mühlstrasser wrote:
Hi,
we use OpenSSL 1.0.2 together with PKCS#11 tokens by plugging methods
into the RSA_METHOD structure that interface with the PKCS#11 token,
and this works fine so far. However, for creating RSA
On 17/02/2017 15:25, Stephan Mühlstrasser wrote:
Hi,
we use OpenSSL 1.0.2 together with PKCS#11 tokens by plugging methods
into the RSA_METHOD structure that interface with the PKCS#11 token,
and this works fine so far. However, for creating RSA signatures with
PSS padding this strategy
Hi,
we use OpenSSL 1.0.2 together with PKCS#11 tokens by plugging methods
into the RSA_METHOD structure that interface with the PKCS#11 token, and
this works fine so far. However, for creating RSA signatures with PSS
padding this strategy doesn't work anymore, because OpenSSL wants to
On 17/02/17 07:46, Matthias Apitz wrote:
> New, TLSv1/SSLv3, Cipher is DHE-DSS-AES128-GCM-SHA256
Your server appears to be configured with a DSA certificate.
OpenSSL 1.1.0 made changes to the default ciphersuites that get sent.
See this CHANGES entry:
*) Changes to the DEFAULT cipherlist:
Hello,
We run a SSL client/server application, where the server is written in
Java using jdk1.8.0_31 and the client is written in C. We prepare the
update to OpenSSL 1.1.0 for the C client and are facing the problem, that
not even the OpenSSL s_client can now connect to our server. It says:
11 matches
Mail list logo