David Schwartz wrote:
>> I have an application using openSSL version 0.9.7d.
>> I am able to create 20,000 TLS connections, but my heap size
>> is at 1.5GB. It looks like it is the SSL context. Is there anyway
>> to reduce the memory fotprint?
>
> I'm not 100% sure I understand your question. But
Hi,
I just saw the "RE: Changing the expiry date of a cert" thread but I think
my question is a little different.
My certs are not CA certs they are user certs where the only thing I
really need to preserve are subject, issuer, key & cert extensions. The
serial # doesn't matter.
The thing I w
Hi,
I have some old certificates where the private key is fine but the cert
has expired.
My environment is only a test env by the way so there are no security
issues here. I just want an easy way to refresh the certs whenever they
expire.
Is there some way with openssl that I can just refresh
That's TLSv1, not SSLv2.
: 01 03 01 00 63 00 00 00 10 00 00 39 00 00 38 00 c..9..8.
0010: 00 35 00 00 88 00 00 87 00 00 84 00 00 16 00 00 .5..
0020: 13 00 00 0a 07 00 c0 00 00 33 00 00 32 00 00 2f .3..2../
0030: 00 00 45 00 00 44 00 00 41 00 00 07 05 00 80 03 ..E..D
Marek Marcola wrote:
> I think that this is CIA webserver problem.
> You may test this with:
> $ openssl s_client -connect www.cia.gov:443 -state -debug -msg [[-ssl3]
> [-tls1]]
> and in any combination after some successful connection you will get failed
> connections.
> For example:
> $ opens
Hello,
> We use curl to retrieve webpages, and recently started receiving an
> intermittent (40-60% of the time) error when retrieving a page from the
> CIA. About two weeks ago, they switched to running https only, with the
> http URLs being forwarded to the https equivalents.
>
> The error we re
Hey all:
We use curl to retrieve webpages, and recently started receiving an
intermittent (40-60% of the time) error when retrieving a page from the
CIA. About two weeks ago, they switched to running https only, with the
http URLs being forwarded to the https equivalents.
The error we receive is:
> I have an application using openSSL version 0.9.7d.
> I am able to create 20,000 TLS connections, but my heap size
> is at 1.5GB. It looks like it is the SSL context. Is there anyway
> to reduce the memory fotprint?
I'm not 100% sure I understand your question. But if I understand it
correctly,
I have an application using openSSL version 0.9.7d. I am able to create
20,000 TLS connections, but my heap size is at 1.5GB. It looks like it
is the SSL context. Is there anyway to reduce the memory fotprint?
Please CC me directly on any responses
On Tue, Oct 23, 2007 at 05:55:37PM +0200, Erno Kovacs wrote:
> > The 0.9.8e version did not use the key length correctly.
> > http://cvs.openssl.org/chngview?cn=15978
> > The 0.9.8d and 0.9.8g code should be correct.
>
> 0.9.8g on windows (provided by Shining Light) is still incorrect.
> Shou
> The 0.9.8e version did not use the key length correctly.
> http://cvs.openssl.org/chngview?cn=15978
> The 0.9.8d and 0.9.8g code should be correct.
0.9.8g on windows (provided by Shining Light) is still incorrect.
Should i report this bug directly to them?
Erno
___
On Tue, Oct 23, 2007 at 04:50:08PM +0200, Erno Kovacs wrote:
> One of my applications broke just after i upgraded Openssl from 0.9.8d.
> After several hours of debugging I realized, something is fishy around
> the blowfish cipher: it just doesnt produces the same ciphertext as it
> did using the 0
Hi,
I have problem with AES_cbc_encrypt function. I use code you can see below
and unfortunately my function that compares arrays gives an error. The data
from in3 and tmp3 looks similar, but there is a difference on first 16
bytes. Any idea what is going on?
Thank you for your help!!
Best regar
One of my applications broke just after i upgraded Openssl from 0.9.8d.
After several hours of debugging I realized, something is fishy around
the blowfish cipher: it just doesnt produces the same ciphertext as it
did using the 0.9.8d.
You can find the really small and stupid source code which pro
14 matches
Mail list logo