The only thing that the server can know is whether the client has
terminated the connection with a fatal alert. If the client validates
presented cert chains, then its continuation with the connection means
that it passed validation. If the client does not, or ignores any
given error, then it doe
Hi
On the eve of the first sitting of the Australian Parliament for the
calendar year 2018, FooCrypt, A Tale of Cynical Cyclical Encryption :
FooCrypt,0.0.1,Core,10.11.0,Darwin
https://www.fookey.net/store/p881/FooCrypt_0.0.1_Core_10.11.0_Darwin has
been published in accordance with the crimi
Is there a way for a server to know if the client verified the cert chain
successfully or not?
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
FIPS is not supported in 1.1.0. We will be starting a FIPS project soon,
targeted for the next release after 1.1.1
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Hi all,
I found that x25519 elliptic curve is only supported on openssl 1.1.0+
versions. However, I need to know if these versions support FIPs too.
Do you know if openssl 1.1.0 and/or newer versions support FIPs?
Regards,
Jorge Bustamante
--
This email is intended solely for the person or