Is there a better demo program I can use as the basis for my code? I'd be happy
to redo my stuff based on anything that I can download and run without having
to dig through the OpenSSL/test sets to try to find hints (which I've done, but
there didn't seem to be a simple AES128/cbc test that I c
Thanks for the response, Andy, it's good to know that the demo program does
actually work for someone. Sorry for the delay, I'm kinda busy with other
things right now. Also, I realised the link was truncated, but it looks as
though you found the demo anyway.
https://github.com/saju/misc/blob/ma
On 8 December 2014 at 19:20, Steffen Nurpmeso via RT wrote:
> and finally i propose three new values for the "Protocol" slot of
> SSL_CONF_CTX_cmd(): OLDEST, NEWEST and VULNERABLE.
>
In Qt we've added an enum value for TLS versions that is SecureProtocols so
that we could remove versions as requ
On 8 December 2014 at 19:20, Steffen Nurpmeso via RT wrote:
> and finally i propose three new values for the "Protocol" slot of
> SSL_CONF_CTX_cmd(): OLDEST, NEWEST and VULNERABLE.
>
In Qt we've added an enum value for TLS versions that is SecureProtocols so
that we could remove versions as requ
> OCB support has been merged in. Closing my own ticket.
Following is not directly related to the case per se [which is why rt
doesn't get this message]. It's just that it makes nice example on why
one sometimes wants to implement encryption mode in assembly. If you
compare performance on AES-NI-c
On Mon, Dec 08, 2014 at 08:20:44PM +0100, Steffen Nurpmeso via RT wrote:
> Hello,
>
> and finally i propose three new values for the "Protocol" slot of
> SSL_CONF_CTX_cmd(): OLDEST, NEWEST and VULNERABLE.
I actually find the option unfortunate and I think it should have
been one that sets the min
On Mon, Dec 08, 2014 at 07:58:31PM +0100, Steffen Nurpmeso via RT wrote:
> set ssl-protocol="ALL,-SSLv2"
>
> This results in the obvious problem that when they (get)
> upgrade(d) their OpenSSL library they will see a completely
> intransparent error message that no normal user will understand:
I think magic names -- shorthands -- are a very bad idea. They are
point-in-time statements whose meaning evolves, if not erodes, over time.
___
openssl-dev mailing list
openssl-dev@openssl.org
https://mta.opensslfoundation.net/mailman/listinfo/openss
I think magic names -- shorthands -- are a very bad idea. They are
point-in-time statements whose meaning evolves, if not erodes, over time.
___
openssl-dev mailing list
openssl-dev@openssl.org
https://mta.opensslfoundation.net/mailman/listinfo/openssl
Hello,
and finally i propose three new values for the "Protocol" slot of
SSL_CONF_CTX_cmd(): OLDEST, NEWEST and VULNERABLE.
I included OLDEST for completeness sake, NEWEST is in effect what
i've always forced for my thing whenever possible, and encouraged
users to use themselve, but of course it
rand_win.c(361) RAND_add(buf, sizeof(buf), 0);This is inconsistent with line
375 which passes sizeof(buf) for the bytes of entropy.
This means that the entropy from the OS pool is discounted; in normal
circumstances this is insignificant because the rest of this function collects
plenty of entro
Commit [45f55f6] (Remove SSLv2 support, 2014-11-30) completely
removed SSLv2 support and the commit message states "The only
support for SSLv2 left is receiving a SSLv2 compatible client
hello".
If people start using SSL_CONF_CTX as they are supposed to with
v1.0.2, then it can be expected that us
Oh yes: and on top of that former patch there really where also
dangling SSL_CTX_cmd() use cases in .pod files, which are thus and
finally changed to SSL_CONF_CTX_cmd via the attached patch, too.
Thank you.
--steffen
diff --git a/doc/ssl/SSL_CONF_CTX_cmd.pod b/doc/ssl/SSL_CONF_CTX_cmd.pod
index c
Does:
- Fixes a typo in s_client.pod (2x "in the").
- Changes .pod to reflect reality: it is SSL_CONF_CTX_finish(),
not SSL_CONF_finish().
- While here it seems best to change the remaining SSL_CONF_cmd(),
SSL_CONF_cmd_argv() and SSL_CONF_cmd_value_type() to have
a SSL_CONF_CTX_ prefix, to
Hi,
The exact error which i faced in Event log are given below.
Faulting application name: aeagent.exe, version:0.0.0.0, time
stamp:0x53e1f20f
Faulting module name: SSLEAY32.dll, version:0.0.0.0, time stamp: 0x405a2628
Exception code: 0xc005
Fault offset: 0x00010c8b
Faulting process id : 0x1b
OCB support has been merged in. Closing my own ticket.
Matt
___
openssl-dev mailing list
openssl-dev@openssl.org
https://mta.opensslfoundation.net/mailman/listinfo/openssl-dev
16 matches
Mail list logo