In message
on Tue, 3 Apr 2018 22:55:06 +, "Eichenberger, John"
said:
John.Eichenberger> Honeywell Internal
John.Eichenberger>
John.Eichenberger> I think I have an answer for why this commit needed to be
reverted:
John.Eichenberger>
John.Eichenberger> Author: Dr. Stephen Henson
John.Ei
Honeywell Internal
I think I have an answer for why this commit needed to be reverted:
Author:Dr. Stephen Henson
Author date: 2 years ago (12/20/2015 10:18:43 AM)
Commit date:2 years ago (12/20/2015 11:27:03 AM)
Commit hash:6656ba7152dfe4bba865e327dd362ea08544aa80
Chi
Vielen Dank
Gesendet von Mail für Windows 10
Von: Henderson, Karl via openssl-users
Gesendet: Dienstag, 3. April 2018 17:02
An: openssl-users@openssl.org
Betreff: [openssl-users] SSL_CTX_set_tlsext_ticket_key_cb - creating a validctx
and hmac ctx in callback.
I know
I know there may be a million reasons people can tell me not to do this, but
for some dome code, I need to have a client contact a server with an RFC5077
ticket (not one previously sent from the server) with a propriety payload in
the IV. I’d like to use the key_name in the ticket to get a key.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
OpenSSL version 1.1.1 pre release 4 (beta)
===
OpenSSL - The Open Source toolkit for SSL/TLS
https://www.openssl.org/
OpenSSL 1.1.1 is currently in beta. OpenSSL 1.1.1 pre release 4 has now