nal Message-
> From: owner-openssl-...@openssl.org [mailto:owner-openssl-
> d...@openssl.org] On Behalf Of Matthew J. Harmon via RT
> Sent: Sunday, June 29, 2014 2:19 PM
> Cc: openssl-dev@openssl.org
> Subject: Re: [openssl.org #3107] Resolved: Bug Report with Patch 1.0.1c/e
>
openssl-1.0.1h$ grep -R "responsder" *
apps/ocsp.c:BIO_printf(bio_err, "Error querying OCSP responsder\n");
:-(
On 28 Jun 2014, at 8:07 AM, Stephen Henson via RT wrote:
> According to our records, your request has been resolved. If you have any
> further questions or concerns, please
Hello!
Issue: Typo in apps/ocsp.c line 1412
Issue detail: "Error querying OCSP responsder" (stray "S" in responder)
Issue found in: This typo was originally detected in 1.0.1c (also line 1412)
but I checked the latest source to verify the bug still exists in 1.0.1e (line
1412)
Patch submitted? Y
>Synopsis: /dev/crypto broken on FreeBSD
>Class: sw-bug
>OS Release: FreeBSD 6.2-RELEASE-p8 i386
>OpenSSL Release: All OpenSSL releases based on
crypto/engine/eng_cryptodev.c v.1.5 and newer (tested on 0.9.8e)
>Description:
The problem check-in #11541
http://cvs
[[EMAIL PROTECTED] - Fri Feb 7 16:32:51 2003]:
> Hello.
>
> I want to report a bug in the openssl 0.9.7 ocsp server. The
> self-test report and a proposed patch is included below.
>
This is a known issue. It was fixed a while ago in 0.9.7-stable and will
appear in 0.9.7a
___
Hello.
I want to report a bug in the openssl 0.9.7 ocsp server. The
self-test report and a proposed patch is included below.
When I start openssl ocsp in server mode in a CA directory
# Server
$ openssl ocsp -index index.txt -CA CA.crt -rsigner CA.crt \
-rkey CA.key -ndays 1 -port 4
On Wed, Dec 29, 1999 at 10:37:24AM -0500, Jeffrey Altman wrote:
>> Probably ADH ciphers should be automatically excluded if
>> SSL_VERIFY_PEER is set. SSL_VERIFY_PEER usually means that the
>> application *wants* the handshake to fail unless the peer can be
>> authenticated; they should never se
> Probably ADH ciphers should be automatically excluded if
> SSL_VERIFY_PEER is set. SSL_VERIFY_PEER usually means that the
> application *wants* the handshake to fail unless the peer can be
> authenticated; they should never set SSL_VERIFY_PEER if they
> want anonymous ciphers.
Not true. SSL_
Peter 'Luna' Runestig <[EMAIL PROTECTED]>:
> Problem:
>
> If the negotiated cipher is ADH (ie, the SSL_aNULL flag is set) and if
> the verify mode is SSL_VERIFY_PEER, the server will send a certificate
> request to the client. The receipt of this request by the client is
> considered a fatal pr
Hi,
Problem:
If the negotiated cipher is ADH (ie, the SSL_aNULL flag is set) and if
the verify mode is SSL_VERIFY_PEER, the server will send a certificate
request to the client. The receipt of this request by the client is
considered a fatal protocol error in TLS. Therefore, the request
should
10 matches
Mail list logo