Re: [openssl-users] Openssl asynchronous operation in real network

2019-01-15 Thread Ananthu Unnikrishnan
Hi Matt, Thanks for your update. Will try to implement one scheme using the same. I have one doubt regarding the points which we have discussed earlier. I am now facing an issue of getting an invalid waitctx address while trying to get it using ASYNC_get_wait_ctx(). I hav

Re: [openssl-users] Why openssl is printing session ID where there is none sent by server, when using session ticket?

2019-01-15 Thread M K Saravanan
Hi Matt, On Tue, 15 Jan 2019 at 20:02, Matt Caswell wrote: > This is perhaps best explained by this comment in the client side code for > processing a new ticket from the server: > > /* > * There are two ways to detect a resumed ticket session. One is to set > * an appropriate sessi

Re: [openssl-users] in the department of "ain't no perfect"

2019-01-15 Thread Eliot Lear
Hi Rich and thanks for your response.  Please see below. On 15.01.19 21:12, Salz, Rich via openssl-users wrote: >> like a way to extract the signature date from a CMS structure. With all the >> opaque structs that have been introduced in the last few releases, it's not >> clear to me how to do

Re: [openssl-users] in the department of "ain't no perfect"

2019-01-15 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of > Charles Mills > Sent: Tuesday, January 15, 2019 13:50 > > > From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of > > Eliot Lear > > Sent: Tuesday, January 15, 2019 7:29 AM > > > Subject: [openssl-

Re: [openssl-users] in the department of "ain't no perfect"

2019-01-15 Thread Salz, Rich via openssl-users
> like a way to extract the signature date from a CMS structure. With all the > opaque structs that have been introduced in the last few releases, it's not > clear to me how to do that. Any examples or guidance (other than don't do > that)? Can you list which fields you need and open an issu

Re: [openssl-users] in the department of "ain't no perfect"

2019-01-15 Thread Charles Mills
Leaping into something where I really don't know what I am talking about, does not code signing do that routinely? I can install software signed with a certificate that has expired, provided it had not expired when the code was signed. Does that help, or it is just useless chatter about somethi

[openssl-users] in the department of "ain't no perfect"

2019-01-15 Thread Eliot Lear
I realize things haven't been made easy to do this on purpose, and that there's even a comment in one of the man pages to that effect, but here goes... I have an application that requires long-lived signatures, perhaps long past the point where the signer's cert has expired.  I'd like a way to ext

Re: [openssl-users] cipher names

2019-01-15 Thread Matt Caswell
On 15/01/2019 13:08, Jeremy Harris wrote: > Hi, > > RFC 8316 section 4.3 gives a need for cipher names per the > IANA registry https://www.iana.org/assignments/tls-parameters > > Those have underbars not hyphens, lead with a "TLS_" and > have an embedded "WITH_", in contrast with the strings >

[openssl-users] cipher names

2019-01-15 Thread Jeremy Harris
Hi, RFC 8316 section 4.3 gives a need for cipher names per the IANA registry https://www.iana.org/assignments/tls-parameters Those have underbars not hyphens, lead with a "TLS_" and have an embedded "WITH_", in contrast with the strings returned by SSL_get_current_cipher(). Is there a supported

Re: [openssl-users] Why openssl is printing session ID where there is none sent by server, when using session ticket?

2019-01-15 Thread Matt Caswell
On 15/01/2019 11:29, M K Saravanan wrote: > Hi, > > When I use openssl s_client to connect to a server which uses session > ticket to resume a session (session ID is turned off), openssl is > still printing a session ID where none is sent by the server (packet > capture shows session ID length

[openssl-users] Why openssl is printing session ID where there is none sent by server, when using session ticket?

2019-01-15 Thread M K Saravanan
Hi, When I use openssl s_client to connect to a server which uses session ticket to resume a session (session ID is turned off), openssl is still printing a session ID where none is sent by the server (packet capture shows session ID length = zero in the Server Hello). == New, TLSv1.2, Ci

Re: [openssl-users] OpenSSL handshake failure with RSA bad signature error

2019-01-15 Thread vin
hi You found solution for this issue.I am also facing the same. -- Sent from: http://openssl.6102.n7.nabble.com/OpenSSL-User-f3.html -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users