Re: Extension of certificate expiry date

2020-06-08 Thread Viktor Dukhovni
On Mon, Jun 08, 2020 at 07:43:46PM -0700, Anand Sridharan wrote: > We have used hardcoded certificate information in a piece of code , we > don't want to change it often. There aren't any other reasons for it. Just generate a new certificate, you can use the same key if you like. --

Re: Extension of certificate expiry date

2020-06-08 Thread Anand Sridharan
Hi Viktor , we have used hardcoded certificate information in a piece of code , we don't want to change it often. There aren't any other reasons for it. On Mon, Jun 8, 2020 at 4:21 PM Viktor Dukhovni wrote: > On Mon, Jun 08, 2020 at 04:01:37PM -0700, Anand Sridharan wrote: > > > is there a way

Re: Extension of certificate expiry date

2020-06-08 Thread Viktor Dukhovni
On Mon, Jun 08, 2020 at 04:01:37PM -0700, Anand Sridharan wrote: > is there a way on openssl to extend the expiry of certificate date? > > I created a certificate with an expiry date set for 365 days but looking > now to extend it longer or indefinitely. You need to sign a new certificate for

Extension of certificate expiry date

2020-06-08 Thread Anand Sridharan
Hi openssl users, is there a way on openssl to extend the expiry of certificate date? I created a certificate with an expiry date set for 365 days but looking now to extend it longer or indefinitely. -- thanks, Anand.S

Re: Are there any flag that control client finished hash verification

2020-06-08 Thread Benjamin Kaduk via openssl-users
On Mon, Jun 08, 2020 at 06:53:32PM +, Neil Proctor via openssl-users wrote: > Hello, > > Specific to OpenSSL v1.0.2p and TLS1.2 are there any flags or options like, > SSL_CERT_FLAG_TLS_STRICT, that set whether or not the client handshake > finished hash is verified by the server? Or is

Are there any flag that control client finished hash verification

2020-06-08 Thread Neil Proctor via openssl-users
Hello, Specific to OpenSSL v1.0.2p and TLS1.2 are there any flags or options like, SSL_CERT_FLAG_TLS_STRICT, that set whether or not the client handshake finished hash is verified by the server? Or is this always performed regardless of configuration? During some of our testing, it seems

Re: How to help with getting KTLS patches merged

2020-06-08 Thread Kurt Roeckx
On Thu, Jun 04, 2020 at 09:00:08AM -0700, John Baldwin wrote: > At the moment there are 3 open PRs related to Kernel TLS offload > support that I'm aware of: > > - 11589 adds TLS1.3 for Linux, has one approval from Matt Caswell > - 10626 adds TLS1.3 for FreeBSD, from which 11589 is derived, but