Hi,
As i know machine allowed 10 messages in 5 seconds as configured in the
/proc/sys/kernel/printk_ratelimit and
/proc/sys/kernel/printk_ratelimit_burst files.
But my question is why this logging crosses 10 messages in 5 seconds and in
which case it will happen.
And why normally kernel will have
internal file structure of iOS app is well defined with API to access the
directories without any hacks (I assume you weren't looking to access a
directory outside of your app)
https://developer.apple.com/library/content/documentation/FileManagement/Conceptual/FileSystemProgrammingGuide/FileSystem
Is it possible to setup a CONF-less OpenSSL? If so, how?
The use case is mobile apps, like Android, iOS and Windows Phone.
There is no OPENSSLDIR per se; and the app's install directory will be
a moving target like a UUID.
I know hacks can be applied for iOS, like forgoing a macro and
returning N
I have a simulation of a hardware device that has the following
characteristics:
- does hashing functions
- resource constrained
- multi-user
Therefore, a typical pattern is that one application starts a digest
calculation, then the hash state must get swapped out for another user.
In 1.0, I
On 16/11/16 23:22, Dan S wrote:
> I thought there is anything that would stop you from compiling with
> everything and make choices at run time, (TLSv1_2_method,
> TLSv1_1_method, TLSv1_method, SSLv23_method etc... just set the right
> flags and cyphers)
Do not use the TLS*method() functions for
I thought there is anything that would stop you from compiling with
everything and make choices at run time, (TLSv1_2_method, TLSv1_1_method,
TLSv1_method, SSLv23_method etc... just set the right flags and cyphers)
On Wed, Nov 16, 2016 at 2:58 PM, craig_we...@trendmicro.com <
craig_we...@trendmicr
On 16/11/16 22:58, craig_we...@trendmicro.com wrote:
> I am an OpenSSL neophyte, so please bear with me if the answer is
> obvious in the documentation.
>
>
>
> Our product is going to provide runtime options to the user to enable
> and disable TLS 1.0, 1.1 and 1.2 in a discrete manner. For e
On Wed, Nov 16, 2016 at 10:58:17PM +, craig_we...@trendmicro.com wrote:
> Our product is going to provide runtime options to the user to enable and
> disable TLS 1.0, 1.1 and 1.2 in a discrete manner.
This is a bad interface. Do not implement this feature. Instead
support only a contiguous
I am an OpenSSL neophyte, so please bear with me if the answer is obvious in
the documentation.
Our product is going to provide runtime options to the user to enable and
disable TLS 1.0, 1.1 and 1.2 in a discrete manner. For example: today enable
1.0 and 1.2, disable 1.1; tomorrow enable 1.1 an
Hello,
My OpenSSL server has to authenticate that a valid OpenSSL client is asking for
connection.
Is this feature part of OpenSSL ?
Can you please send a sample code doing this in the server side ?
The motivation: If a client was stolen I can block it from asking for
connection.
T
10 matches
Mail list logo