Rajesh Malepati wrote
On Wed, Jul 24, 2013 at 9:30 PM, kirpit lt;
kirpit@
gt; wrote:
The server doesn't seem to care to respond to clients supporting TLS 1.2
ok:
openssl s_client -tls1 -connect emea.webservices.travelport.com:443
no reply:
openssl s_client -tls1_2 -connect
nehakochar wrote
Is this expected behavior with OpenSSL 1.0.1e? If it is, then this would
need to be fixed as it is not compliant with the RFC.
Correction: I am not sure if it is 1.0.1e that is the problematic version.
But would like to know if this is expected behavior (although incorrect)
Hi,
We are using openssl-1.0.0e. I am facing a memory leak of 98 bytes when I
use d2i_X509() function. This memory leak is seen even if d2i_X509() return
NULL. I couldn't find the source code for d2i_X509() and X509_free()
function. Can you please help me in this.
int
FYI: it's hard to believe the error is on the OpenSSL side (the
software shows timing errors (the way i use it at least), and
these are always handled properly by the OpenSSL layer), but
i have nonetheless added a 'debug-darwin64-x86_64-cc' to
'Configure' and got some debug libraries (
206984
Bonjour,
Le 11/10/2013 03:35, nehakochar a écrit :
Rajesh Malepati wrote
On Wed, Jul 24, 2013 at 9:30 PM, kirpit lt;
kirpit@
gt; wrote:
The server doesn't seem to care to respond to clients supporting TLS 1.2
ok:
openssl s_client -tls1 -connect emea.webservices.travelport.com:443
no
Hi,
Could you please tell me how to do the set up of local ocsp responder as you
did it like http://ocsp_responder:3456.?
Its really urgent and time is less.
--
View this message in context:
http://openssl.6102.n7.nabble.com/OpenSSL-OCSP-tp15350p46874.html
Sent from the OpenSSL - User
I found a Linux FAQ dealing with this subject, but it is very dated
(11.5 years old) and I do not know how much has changed since it was
last updated. While I am a programmer, I am looking only to use
openssl to make the certificates and keys I need, and not to create
new programs using openssl
This might be useful http://unmitigatedrisk.com/?p=194
Ryan Hurst
Sent from my phone, please forgive the brevity.
On Oct 12, 2013, at 12:53 AM, Ted Byers r.ted.by...@gmail.com wrote:
I found a Linux FAQ dealing with this subject, but it is very dated
(11.5 years old) and I do not know how
Not so much. Factoring reached 768 several years ago, and the consensus
seems to be that RSA-1024,
and DSA and DH, is in danger within not too many years though not broken
now. And it often takes months
or years to get new crypto, or even new keys, fully deployed especially when
you can't have
From: owner-openssl-users On Behalf Of Erwann Abalea
Sent: Friday, October 11, 2013 08:49
Le 11/10/2013 03:35, nehakochar a écrit :
Rajesh Malepati wrote
On Wed, Jul 24, 2013 at 9:30 PM, kirpit lt;kirpit@gt; wrote:
The server doesn't seem to care to respond to clients supporting TLS
1.2
10 matches
Mail list logo