Hi All.
I am using bleeding-edge openssl code, and wish to compile it for
https://www.digikey.com/product-detail/en/microchip-technology/ATSAM4E8CA-AUR/ATSAM4E8CA-AURCT-ND/4140758
What is the best/recommended way to accomplish this?
Will be grateful for a reply.
Thanks and Regards,
Ajay
--
o
Hi,
I am trying to use AES CTR encryption to encrypt/decrypt data using EVP
API. The earlier API, AES_ctr128_encrypt does explicitly use a counter. How
is the counter handled in the EVP implmentation.
I followed this documentation here, https://wiki.openssl.
org/index.php/EVP_Symmetric_Encryption
I'm running FreeBSD 10.3-RELEASE with # openssl version
OpenSSL 1.0.1s-freebsd 1 Mar 2016
This is the FreeBSD base version of openssl, not the ports version. I have
ssh access to the server and can sudo to root.
Please note: In the error messages below, I have removed some of the
pathing so
Hi All,
Once upon a time in the 0.98 timeframe, when I first configured OpenSSL as a
test OCSP server, using the format -port worked. This format however
stopped working when version 1.0 was released. After living inside Google
like Jeff Bridges in Tron, it came to light that the format
Dear Openssl Gurus,
I am facing the following problem, I am required to create an SSL client that
talks (TLSv1.2, TLSv1.1 and TLSv1.0) against 3 different types of servers, one
talks TLSv1.2 only (server_12) , one TLSv1.1 only (server_11) and one TLSv1.0
only (server_10)
The way I am configur
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf
> Of Graham Leggett
> Sent: Thursday, November 09, 2017 08:30
> To: openssl-users@openssl.org
> Subject: Re: [openssl-users] Ubuntu Xenial + Postgresql v9.5 == SSL
> routines:ssl23_write:ssl handshake failure:s23_lib.c:177:
➢ Please share if any patch available for CAVS algorithm test support
for RSA 186-4.
There is not. Unless someone in the community has one they are willing to
share.
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
On 09 Nov 2017, at 2:57 PM, Michael Wojcik
wrote:
>> This is openssl v1.0.1f (ubuntu xenial) talking to openssl v1.0.1f (ubuntu
>> xenial), although
>> trying openssl as shipped by MacOS Sierra on the client side gives the same
>> result.
>
> At least prior to 1.1.0, to use ECC in OpenSSL the
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of
> Graham Leggett
> Sent: Thursday, November 09, 2017 06:18
> To: openssl-users@openssl.org
> Subject: Re: [openssl-users] Ubuntu Xenial + Postgresql v9.5 == SSL
> routines:ssl23_write:ssl handshake failure:s23_lib.c:177
On 09 Nov 2017, at 4:17 AM, Michael Wojcik
wrote:
>> New, (NONE), Cipher is (NONE)
>> SSL-Session:
>>Protocol : TLSv1.2
>>Cipher:
>
> Yeah. TLSv1.2, no cipher. My guess is the server is allowing the 1.2 protocol
> level but not supporting any of the 1.2 suites.
Does this def
This is very important information. Thank you very much, Matt.
I will update the code of my product and test if it resolves my issue. If it
does, I will post my feedback here. Hence other users can aviod the same
issue.
My product is complex and I have other things to do, so it may take a few
da
11 matches
Mail list logo