After establishing a secure connection between my SSL server and SSL client
with OpenSSL library installed on separate Linux hosts, the SSL server send the
packet FIN than the user data. The use of ssldump command indicates the
presence of the following traces:
TCP: dc01dshared1p(2524) ->
Bonjour. Et milles mercis.
That was helpful.
One more question: if I want to reproduce RSA_sign() (and RSA_verify()) using
evp_key_sign() and evp_key_verify() then I'll need add code to do the ASN.1
marshaling, right? There's no convenience function to do that (seems like an
oversight if
On 05/05/2022 13:02, Srinivas, Saketh (c) wrote:
Hi,
for X509_STORE_CTX object we have a function X509_STORE_CTX_set_cert to
set the cert pointer (x509* cert)
is there any get function for this variable.
X509_STORE_CTX_get_current_cert**is not for cert. Because, there is
another
Hi,
for X509_STORE_CTX object we have a function X509_STORE_CTX_set_cert to set the
cert pointer (x509* cert)
is there any get function for this variable.
X509_STORE_CTX_get_current_cert is not for cert. Because, there is another
variable current_cert.
thanks,
Saketh.
Notice: This e-mail
Fix is here:
https://github.com/openssl/openssl/pull/18247
On Thu, 2022-05-05 at 07:54 +0200, Tomas Mraz wrote:
> Yes, this is unfortunately a bug in 3.0.3 release. Calling
> OPENSSL_init_crypto should not be necessary.
>
> Tomas Mraz
>
> On Wed, 2022-05-04 at 21:58 +0200, Klaus Keppler wrote: