Hi Dmitry,
Dmitry Belyavsky wrote:
Greetings!
During the 1.x version the current scheme of
algorithms providing through engines was implemented.
Debugging our (Cryptocom LTD) engines, I’ve found some troubles in the
way it works, please tell me
where I’m mistaken.
Openssl is configured with s
On Sep 21, 2011, at 9:40 PM, Huaqing Wang wrote:
> Hi,
>
> I don't know if any other person met this issue.
> I use openssl1.0.0e, and working on dtls, in client side, if I set
> SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_QUERY_MTU);
> SSL_set_mtu(ss_ssl, 1500);
> I met a segmentation fault on the
Hi,
I don't know if any other person met this issue.
I use openssl1.0.0e, and working on dtls, in client side, if I
set SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_QUERY_MTU);
SSL_set_mtu(ss_ssl, 1500);
I met a segmentation fault on the client side, using gdb I saw the error
happens in:
memcpy()
dtls
I sent the email below to r...@openssl.org to file a bug as documented on
http://www.openssl.org/support/rt.html
However I have not seen a request created in the request tracker yet or the
original email on this mailing list.
I'm forwarding it to this list in case OpenSSL developers have any comm
Am 20.09.2011 22:31, schrieb Hanno Böck:
Am Tue, 20 Sep 2011 20:37:35 +0200
schrieb Richard Könning:
Please read http://www.openssl.org/~bodo/tls-cbc.txt, problem #2. You
then see that the problem is already addressed in OpenSSL 0.9.6d,
over seven years ago. See also
http://citeseerx.ist.psu.ed
Richard Könning wrote:
> Am 20.09.2011 13:19, schrieb Hanno Böck:
>> It seems some rumors are spreading about an attack presented later this
>> week against sslv3/tlsv1.0:
>> http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/
>>
>> Whatever this attack looks like in detail, all news