error: SSL accept error(SSL): error:1408A0C1:SSL
routines:SSL3_GET_CLIENT_HELLO:no shared cipher
Works great without FIPS but get "no shared cipher" error when FIPS enabled
libraries are linked in. Suspect the problem is with the X509 certificate
that I'm using. Certificates details are included
On Mon, Aug 27, 2007, Prabhu S wrote:
> Hi,
>
> The client application spawns one thread for each connection with the
> server. Each thread is having its own SSL_CTX* object.
> When 100 connections are to be made, once the SSL library in initialised -
> SSL_library_init().And 100 threads are crea
On Mon, Aug 27, 2007, xor exor wrote:
> Hi i have 3 certs
>
> 1.root self signed CA
> 2.intermediate CA-signed with root CA
> 3.client cert -signed with intermediate CA
>
> So i want with them to create a cert chain and sign a pkcs7 document.(By
> including them into the pkcs 7 document a detach
Hi,
The client application spawns one thread for each connection with the
server. Each thread is having its own SSL_CTX* object.
When 100 connections are to be made, once the SSL library in initialised -
SSL_library_init().And 100 threads are created and each connect with server
with their own SSL
On Sat, Aug 25, 2007 at 12:47:57AM -0700, David Schwartz wrote:
> > Yes? If so, the above paragraph or something similar should be
> > documented somewhere important (e.g. the manpages).
>
> That's one way to put what I'm saying. I agree it needs to be repeated more
> often, that's one of the rea
Hi i have 3 certs
1.root self signed CA
2.intermediate CA-signed with root CA
3.client cert -signed with intermediate CA
So i want with them to create a cert chain and sign a pkcs7 document.(By
including them into the pkcs 7 document a detached one)
And after that to verify the pkcs 7 document by
Thanks a lot Marek.
--
Durga Prasad
- Original Message
From: Marek Marcola <[EMAIL PROTECTED]>
To: openssl-users@openssl.org
Sent: Saturday, August 25, 2007 1:44:48 AM
Subject: Re: amount of data written in EVP_EncryptUpdate
Hello,
> Documentation says that, for EVP_EncryptUpdate, buffe