Speed improvements like this are certainly
interesting, but unfortunately there *are* reasons
why this particular approach cannot be used: namely,
US patent 6,396,926 and similar patents elsewhere.
Hm, that looks painfully familiar. I was working off
other articles that mentioned no such
Server: cvs.openssl.org Name: Dr. Stephen Henson
Root: /e/openssl/cvs Email: [EMAIL PROTECTED]
Module: openssl Date: 27-Apr-2005 18:27:15
this should be fixed in 0.9.8
Cheers,
Nils
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
fixed in 0.9.8
Cheers,
Nils
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager [EMAIL
I've committed something similar to 0.9.8, see [1]. Please try a
recent snapshot.
[1] http://marc.theaimsgroup.com/?l=openssl-cvsm=111455472305028w=2
Cheers,
Nils
__
OpenSSL Project
Hello Nagendra,
I had one question on the timer management and retransmission. I see that there is a new BIO type in the file bss_dgram.c. My question is if the application does not use the dgram BIO type and use the memory BIO instead, does the application has to take the responsibility of timer
Hi,
This is my first email message to the list, please bear with me if this
is not the right place to send it in.
I was wondering if someone else experienced problems handshaking with
the s_server using an ECDSA certificate for client authentication. The
following ciphersuite is being used :
* Prashant Kumar [EMAIL PROTECTED] [2005-04-28 06:11:38 -0700]:
I had one question on the timer management and retransmission. I see that
there is a new BIO type in the file bss_dgram.c. My question is if the
application does not use the dgram BIO type and use the memory BIO instead,
does
Irina Souiki wrote:
Hi,
This is my first email message to the list, please bear with me if this
is not the right place to send it in.
I was wondering if someone else experienced problems handshaking with
the s_server using an ECDSA certificate for client authentication. The
following
Hi Nils,
I will try to add the patch and recompile tomorrow. The reason I was
saying the point compression was enabling ECC is because without it
the server cannot load the ECC certificate. Or maybe I am missing
something...
I will let you know how this works.
Thanks,
Irina
Nils Larsch wrote:
Irina Souiki wrote:
Hi Nils,
I will try to add the patch and recompile tomorrow. The reason I was
saying the point compression was enabling ECC is because without it
the server cannot load the ECC certificate. Or maybe I am missing
something...
well if you have a cert with compressed points
So my understanding is that by default point compression is off. I do
believe all certificates I have have compressed points. I will not go
into the debate which is standard or not, but I would suggest having an
option to enable point compression more user friendly. Can you tell me
if there is
12 matches
Mail list logo