On Mon, Jun 08, 2020 at 07:43:46PM -0700, Anand Sridharan wrote:
> We have used hardcoded certificate information in a piece of code , we
> don't want to change it often. There aren't any other reasons for it.
Just generate a new certificate, you can use the same key if you like.
--
Hi Viktor ,
we have used hardcoded certificate information in a piece of code , we
don't want to change it often.
There aren't any other reasons for it.
On Mon, Jun 8, 2020 at 4:21 PM Viktor Dukhovni
wrote:
> On Mon, Jun 08, 2020 at 04:01:37PM -0700, Anand Sridharan wrote:
>
> > is there a way
On Mon, Jun 08, 2020 at 04:01:37PM -0700, Anand Sridharan wrote:
> is there a way on openssl to extend the expiry of certificate date?
>
> I created a certificate with an expiry date set for 365 days but looking
> now to extend it longer or indefinitely.
You need to sign a new certificate for
Hi openssl users,
is there a way on openssl to extend the expiry of certificate date?
I created a certificate with an expiry date set for 365 days but looking
now to extend it longer or indefinitely.
--
thanks,
Anand.S
On Mon, Jun 08, 2020 at 06:53:32PM +, Neil Proctor via openssl-users wrote:
> Hello,
>
> Specific to OpenSSL v1.0.2p and TLS1.2 are there any flags or options like,
> SSL_CERT_FLAG_TLS_STRICT, that set whether or not the client handshake
> finished hash is verified by the server? Or is
Hello,
Specific to OpenSSL v1.0.2p and TLS1.2 are there any flags or options like,
SSL_CERT_FLAG_TLS_STRICT, that set whether or not the client handshake finished
hash is verified by the server? Or is this always performed regardless of
configuration?
During some of our testing, it seems
On Thu, Jun 04, 2020 at 09:00:08AM -0700, John Baldwin wrote:
> At the moment there are 3 open PRs related to Kernel TLS offload
> support that I'm aware of:
>
> - 11589 adds TLS1.3 for Linux, has one approval from Matt Caswell
> - 10626 adds TLS1.3 for FreeBSD, from which 11589 is derived, but