Hi All,
I’m a bit confused. We’re trying to get some number of the relative efficiency
of different cypher algorithms using the openssl tool.
When I type:
openssl ciphers -tls1_3 -stdname -V
I see this as one of the results:
0x13,0x02 - TLS_AES_256_GCM_SHA384 - TLS_AES_256_GCM_SHA3
On 31/07/2018 01:10, Jordan Brown wrote:
On 7/30/2018 12:27 PM, Viktor Dukhovni wrote:
The only time such "leaks" come into play is process exit and library
unload.
Process exit is not the only time that libraries get unloaded. I
don't happen to remember any details, but I know we've had pro
Hi all,
I need to reconstruct public and private keys for data signing operation
from p, q, dmp1, dmq1 and iqmp. When I fill values in as per below then
OpenSSL complains about missing d.
RSA* pkey = RSA_new();
pkey->n = NULL;
pkey->e = NULL;
pkey->d = NULL;
pkey->p= BN_b
Hi,
I have trouble understanding the details of TLS shutdown. I get the basics
but,
Is it possible to receive data after calling SSL_shutdown? Reading the
specs and docs leaves this rather blurry.
That is, after sending a close_notify, can I receive data before getting my
client_notify response?
On 30.07.2018 20:12, Michael Wojcik wrote:
>> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of
>> Jordan Brown
>> Sent: Monday, July 30, 2018 10:46
[…]
> FWIW, SUS Issue 5 defines RLIMIT_AS as applying to both malloc and mmap, but
> RLIMIT_DATA as
> applying only to ma
On 30/07/2018 20:07, Viktor Dukhovni wrote:
On Jul 30, 2018, at 12:46 PM, Jordan Brown wrote:
If you can't malloc the space, you probably can't mmap it either. I have never
heard of a malloc implementation that has artificial limits; if it's failing
it's because it can't find that much con
On 30/07/18 19:08, Marty G wrote:
> On 07/30/2018 01:27 PM, Salz, Rich via openssl-users wrote:
>
>> > I never thought I'd see the day that someone would have to defend
>> not leaking memory in pivotal security code like openssl however
>>
>>
>>
>> To be accurate, it was a couple of people say