On 29/12/2018 22:08, C.Wehrmeyer wrote:
How am I supposed to get more adept when the documentation is a literal
mess?
Let me reverse that: What is the *point* of getting more adept with the
API when I feel more and more disgusted by learning how it's working
internally?
Welcome to The J
On 12/29/2018 7:53 AM, Jakob Bohm via openssl-users wrote:
> Well, these two latter arrays look like a stray copy of the HMAC
> constants "ipad" and "opad", which (while looking like ASCII), are
> defined as exact hex constants even on a non-ASCII machine, such
> as PDP-11 or an IBM mainframe.
P
I do not want to complicate matters further, but there needs to be one
thing clear here: this library is mainly developed and maintained by
/volunteers/. They're putting in time and effort to improve the state of
the crypto ecosystem, and they seem to be doing a damn good job at it, as
even you, yo
On 29.12.18 21:32, Viktor Dukhovni wrote:
> I said it, neither because it can't be done, nor because it is
> incompatible with session caching, or has anything to do with
> ephemeral key agreement (which works just fine even with
> session resumption), but simply because it is easier for a
> begin
When we're starting to stoop to this level, I think it's time to step
away from the screen and take a few deep breaths... or maybe even go
away and take a nap, go for a walk, or something else. Then, perhaps
come back in a better mood.
Cheers,
Richard ( am off to sleep, it's getting late over he
In message <20181229.170846.804158981742723988.levi...@openssl.org> on Sat, 29
Dec 2018 17:08:46 +0100 (CET), Richard Levitte said:
> In message <38b97114-0c66-40ed-f631-58aa20940...@gmx.de> on Sat, 29 Dec 2018
> 14:19:47 +0100, "C.Wehrmeyer" said:
>
...
> > What's wrong with that, you ask? L
> I didn't bother looking up what freeing entails - it's obvious to
> anyone at this point that OpenSSL is a severe victim of feature creep,
> that its memory allocation scheme is a mess, and long story short: I
> will NOT free a perfectly fine object just because of incompetent
* But I only get early data for get method.
* When using post method, the server terminate connection. Is it related
with openssl? If so, how can I do to allow post method?
Early data can be replayed. It is only safe to use early data when the request
is idempotent, like GET. You might
You really have no idea how to code. You look like one of those junior
engineers that think they know it all.
I won't be replying again, so don't need to get your hopes up.
Na(o) sábado, 29 de dez de 2018, 17:19, C.Wehrmeyer
escreveu:
> On 29.12.18 16:53, Jakob Bohm via openssl-users wrote:
>
> On Dec 29, 2018, at 8:19 AM, C.Wehrmeyer wrote:
>
> OK, so I've been reading the mails before going to sleep and spent some time
> thinking and researching about this, and I've come to a conclusion: OpenSSL
> is a goddamn mess, SSL_clear() is pretty much superfluous, and as such
> shouldn't
On 29/12/2018 17:18, C.Wehrmeyer wrote:
On 29.12.18 17:21, J. J. Farrell wrote:> So instead of correct
portable code which derives obviously and
> straightforwardly from the specification, you'd write arrays of a
> different length from the original, the first 48 bytes of which would
> only be c
On 29.12.18 16:53, Jakob Bohm via openssl-users wrote:
> The session caching in the SSL and TLS protocols is to skip the
> expensive key exchange when reconnecting within a few seconds,
> as is extremely common with web browsers opening up to 8 parallel
> connections to each server.
My outburst w
On 29/12/2018 13:19, C.Wehrmeyer wrote:
...
Your corrections, improvements and enhancements would be very welcome as
pull requests at https://github.com/openssl/openssl - thank you for your
contributions.
And don't give me any "trust us, we're experienced programmers"
bullshit. I've *seen*
In message <38b97114-0c66-40ed-f631-58aa20940...@gmx.de> on Sat, 29 Dec 2018
14:19:47 +0100, "C.Wehrmeyer" said:
> I've written highly scalable libraries in the past before, and one
> thing you always want to do there is to trim fat.
Sure, but:
> Now add to that the fact that OpenSSL has been
On 29/12/2018 14:19, C.Wehrmeyer wrote:
I don't have access to the actual testing environments until Wednesday
next year, so I've had to create a private account.
> Which version of OpenSSL is this? (I don't remember if you said this
> already).
I'm not entirely sure, but I *think* it's 1.1.0.
I don't have access to the actual testing environments until Wednesday
next year, so I've had to create a private account.
> Which version of OpenSSL is this? (I don't remember if you said this
> already).
I'm not entirely sure, but I *think* it's 1.1.0.
===
On 29/12/2018 13:41, Ertan Küçükoglu wrote:
Hello,
Windows program does not know length of data. I would like to use some
kind of standard method and use exact method on Windows to decrypt.
I think my problem is really that I do not know what "padding" is used
by default. I have found below
Hello,
Windows program does not know length of data. I would like to use some kind
of standard method and use exact method on Windows to decrypt.
I think my problem is really that I do not know what "padding" is used by
default. I have found below function. However, there is no detailed
explanati
On 29/12/2018 07:42, carabiankyi wrote:
Thanks for your advice.
I get early data when I configure nginx ssl_early_data on.
But I only get early data for get method.
When using post method, the server terminate connection. Is it related
with openssl? If so, how can I do to allow post method?
19 matches
Mail list logo