> From: owner-openssl-users On Behalf Of Erwann Abalea
> Sent: Friday, October 11, 2013 08:49
> Le 11/10/2013 03:35, nehakochar a écrit :
> > Rajesh Malepati wrote
> >> On Wed, Jul 24, 2013 at 9:30 PM, kirpit wrote:
> >> The server doesn't seem to care to respond to clients supporting TL
Not so much. Factoring reached 768 several years ago, and the consensus
seems to be that RSA-1024,
and DSA and DH, is in danger within not too many years though not broken
now. And it often takes months
or years to get new crypto, or even new keys, fully deployed especially when
you can't have
This might be useful http://unmitigatedrisk.com/?p=194
Ryan Hurst
Sent from my phone, please forgive the brevity.
> On Oct 12, 2013, at 12:53 AM, Ted Byers wrote:
>
> I found a Linux FAQ dealing with this subject, but it is very dated
> (11.5 years old) and I do not know how much has changed
I found a Linux FAQ dealing with this subject, but it is very dated
(11.5 years old) and I do not know how much has changed since it was
last updated. While I am a programmer, I am looking only to use
openssl to make the certificates and keys I need, and not to create
new programs using openssl (u
Hi,
Could you please tell me how to do the set up of local ocsp responder as you
did it like http://ocsp_responder:3456.?
Its really urgent and time is less.
--
View this message in context:
http://openssl.6102.n7.nabble.com/OpenSSL-OCSP-tp15350p46874.html
Sent from the OpenSSL - User mailin
Bonjour,
Le 11/10/2013 03:35, nehakochar a écrit :
Rajesh Malepati wrote
On Wed, Jul 24, 2013 at 9:30 PM, kirpit <
kirpit@
> wrote:
The server doesn't seem to care to respond to clients supporting TLS 1.2
ok:
openssl s_client -tls1 -connect emea.webservices.travelport.com:443
no reply:
ope
FYI: it's hard to believe the error is on the OpenSSL side (the
software shows timing errors (the way i use it at least), and
these are always handled properly by the OpenSSL layer), but
i have nonetheless added a 'debug-darwin64-x86_64-cc' to
'Configure' and got some debug libraries (
206984 -r
Hi,
We are using openssl-1.0.0e. I am facing a memory leak of 98 bytes when I
use d2i_X509() function. This memory leak is seen even if d2i_X509() return
NULL. I couldn't find the source code for d2i_X509() and X509_free()
function. Can you please help me in this.
int secwrap_certCheckExtKeyU
nehakochar wrote
> Is this expected behavior with OpenSSL 1.0.1e? If it is, then this would
> need to be fixed as it is not compliant with the RFC.
Correction: I am not sure if it is 1.0.1e that is the problematic version.
But would like to know if this is expected behavior (although incorrect)
wi
Rajesh Malepati wrote
> On Wed, Jul 24, 2013 at 9:30 PM, kirpit <
> kirpit@
> > wrote:
>
> The server doesn't seem to care to respond to clients supporting TLS 1.2
>
> ok:
> openssl s_client -tls1 -connect emea.webservices.travelport.com:443
>
> no reply:
> openssl s_client -tls1_2 -connect e
10 matches
Mail list logo