[openssl-users] net_ratelimit: 3480 callbacks suppressed

2016-11-16 Thread sivagopiraju
Hi, As i know machine allowed 10 messages in 5 seconds as configured in the /proc/sys/kernel/printk_ratelimit and /proc/sys/kernel/printk_ratelimit_burst files. But my question is why this logging crosses 10 messages in 5 seconds and in which case it will happen. And why normally kernel will have

Re: [openssl-users] CONF-less OpenSSL configuration?

2016-11-16 Thread Dan S
internal file structure of iOS app is well defined with API to access the directories without any hacks (I assume you weren't looking to access a directory outside of your app) https://developer.apple.com/library/content/documentation/FileManagement/Conceptual/FileSystemProgrammingGuide/FileSystem

[openssl-users] CONF-less OpenSSL configuration?

2016-11-16 Thread Jeffrey Walton
Is it possible to setup a CONF-less OpenSSL? If so, how? The use case is mobile apps, like Android, iOS and Windows Phone. There is no OPENSSLDIR per se; and the app's install directory will be a moving target like a UUID. I know hacks can be applied for iOS, like forgoing a macro and returning N

[openssl-users] Openssl 1.1 port - hash state serializing

2016-11-16 Thread Ken Goldman
I have a simulation of a hardware device that has the following characteristics: - does hashing functions - resource constrained - multi-user Therefore, a typical pattern is that one application starts a digest calculation, then the hash state must get swapped out for another user. In 1.0, I

Re: [openssl-users] Disable/Enable TLS versions for all connections at runtime

2016-11-16 Thread Matt Caswell
On 16/11/16 23:22, Dan S wrote: > I thought there is anything that would stop you from compiling with > everything and make choices at run time, (TLSv1_2_method, > TLSv1_1_method, TLSv1_method, SSLv23_method etc... just set the right > flags and cyphers) Do not use the TLS*method() functions for

Re: [openssl-users] Disable/Enable TLS versions for all connections at runtime

2016-11-16 Thread Dan S
I thought there is anything that would stop you from compiling with everything and make choices at run time, (TLSv1_2_method, TLSv1_1_method, TLSv1_method, SSLv23_method etc... just set the right flags and cyphers) On Wed, Nov 16, 2016 at 2:58 PM, craig_we...@trendmicro.com < craig_we...@trendmicr

Re: [openssl-users] Disable/Enable TLS versions for all connections at runtime

2016-11-16 Thread Matt Caswell
On 16/11/16 22:58, craig_we...@trendmicro.com wrote: > I am an OpenSSL neophyte, so please bear with me if the answer is > obvious in the documentation. > > > > Our product is going to provide runtime options to the user to enable > and disable TLS 1.0, 1.1 and 1.2 in a discrete manner. For e

Re: [openssl-users] Disable/Enable TLS versions for all connections at runtime

2016-11-16 Thread Viktor Dukhovni
On Wed, Nov 16, 2016 at 10:58:17PM +, craig_we...@trendmicro.com wrote: > Our product is going to provide runtime options to the user to enable and > disable TLS 1.0, 1.1 and 1.2 in a discrete manner. This is a bad interface. Do not implement this feature. Instead support only a contiguous

[openssl-users] Disable/Enable TLS versions for all connections at runtime

2016-11-16 Thread craig_we...@trendmicro.com
I am an OpenSSL neophyte, so please bear with me if the answer is obvious in the documentation. Our product is going to provide runtime options to the user to enable and disable TLS 1.0, 1.1 and 1.2 in a discrete manner. For example: today enable 1.0 and 1.2, disable 1.1; tomorrow enable 1.1 an

[openssl-users] How to authenticate an OpenSSL client in the server ?

2016-11-16 Thread Vered Zvi
Hello, My OpenSSL server has to authenticate that a valid OpenSSL client is asking for connection. Is this feature part of OpenSSL ? Can you please send a sample code doing this in the server side ? The motivation: If a client was stolen I can block it from asking for connection. T