In message
on Tue, 6 Nov 2018 14:46:52 -0800, Terry Chong said:
> Hi, I am planning on using EVP_* APIs to encrypt/decrypt my data. One thing I
> am wondering
> about is whether I can do in-place encryption, meaning I don't have to pay
> the price of an extra
> memory buffer to store my ciphe
In message <1541454675952-0.p...@n7.nabble.com> on Mon, 5 Nov 2018 14:51:15
-0700 (MST), EcolaneAdam said:
> Hello,
>
> Several months ago I had configured ansible to deploy openssl upgrades to
> our Ubuntu 14.04 servers and did so with the following version via apt
> module:
> - libssl
Interesting. How about this for a start?
http://nickpapadonis.com/images-share/summerian-ancient-mesopotamia-ancient-lock.jpg
http://nickpapadonis.com/images-share/anunnaki1.jpg
http://nickpapadonis.com/images-share/summerian-Winged_Human-headed_Bulls.JPG
On Sun, Nov 4, 2018 at 7:21 PM open...@f
Hi, I am planning on using EVP_* APIs to encrypt/decrypt my data. One
thing I am wondering about is whether I can do in-place encryption, meaning
I don't have to pay the price of an extra memory buffer to store my cipher
text and a potential memcpy back to the source buffer.
I tried that with the
On 6. nóv. 2018, at 2:02 e.h., Paul wrote:
> I configured Openvpn server on ubuntu 16.04 and ubuntu was using a old
> version of openssl 1.0.2 and I was updating openssl to v1.1.1
> Now I've installed the openssl but now unable to mv file installed to ln -s
> /usr/local/ssl/bin/openssl /usr/bin
Hi,
According to the vulnerabilities website[1], OpenSSL 1.1.i and earlier
and 1.1.1 are affected by CVE-2018-0735.
Is it safe to assume that OpenSSL 1.0.2 is not affected by the CVE?
Thank you,
-- misaki
[1] https://www.openssl.org/news/vulnerabilities.html
CVE-2018-0735 (OpenSSL advisory)
I configured Openvpn server on ubuntu 16.04 and ubuntu was using a old
version of openssl 1.0.2 and I was updating openssl to v1.1.1
Now I've installed the openssl but now unable to mv file installed to ln -s
/usr/local/ssl/bin/openssl /usr/bin/openssl
failed to create symbolic link '/usr/bin/opens
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of
> pgndev
> Sent: Tuesday, November 06, 2018 15:45
> https://wiki.openssl.org/index.php/Compilation_and_Installation
> Usage: Configure [no- ...] [enable- ...] ...
And it's documented in the INSTALL file in the tarball
https://wiki.openssl.org/index.php/Compilation_and_Installation
Usage: Configure [no- ...] [enable- ...] ...
^^^
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Is there a simple way of excluding unwanted ciphers or cipher suites
during a build?
I would like to remove ARIA in particular, but may want to remove
additional ones in order to use a smaller footprint.
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl
10 matches
Mail list logo