Hi Matt,
Thanks for your update. Will try to implement one scheme using the
same.
I have one doubt regarding the points which we have discussed
earlier.
I am now facing an issue of getting an invalid waitctx address
while trying to get it using ASYNC_get_wait_ctx(). I hav
Hi Matt,
On Tue, 15 Jan 2019 at 20:02, Matt Caswell wrote:
> This is perhaps best explained by this comment in the client side code for
> processing a new ticket from the server:
>
> /*
> * There are two ways to detect a resumed ticket session. One is to set
> * an appropriate sessi
Hi Rich and thanks for your response. Please see below.
On 15.01.19 21:12, Salz, Rich via openssl-users wrote:
>> like a way to extract the signature date from a CMS structure. With all the
>> opaque structs that have been introduced in the last few releases, it's not
>> clear to me how to do
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of
> Charles Mills
> Sent: Tuesday, January 15, 2019 13:50
>
> > From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of
> > Eliot Lear
> > Sent: Tuesday, January 15, 2019 7:29 AM
>
> > Subject: [openssl-
> like a way to extract the signature date from a CMS structure. With all the
> opaque structs that have been introduced in the last few releases, it's not
> clear to me how to do that. Any examples or guidance (other than don't do
> that)?
Can you list which fields you need and open an issu
Leaping into something where I really don't know what I am talking about, does
not code signing do that routinely? I can install software signed with a
certificate that has expired, provided it had not expired when the code was
signed.
Does that help, or it is just useless chatter about somethi
I realize things haven't been made easy to do this on purpose, and that
there's even a comment in one of the man pages to that effect, but here
goes...
I have an application that requires long-lived signatures, perhaps long
past the point where the signer's cert has expired. I'd like a way to
ext
On 15/01/2019 13:08, Jeremy Harris wrote:
> Hi,
>
> RFC 8316 section 4.3 gives a need for cipher names per the
> IANA registry https://www.iana.org/assignments/tls-parameters
>
> Those have underbars not hyphens, lead with a "TLS_" and
> have an embedded "WITH_", in contrast with the strings
>
Hi,
RFC 8316 section 4.3 gives a need for cipher names per the
IANA registry https://www.iana.org/assignments/tls-parameters
Those have underbars not hyphens, lead with a "TLS_" and
have an embedded "WITH_", in contrast with the strings
returned by SSL_get_current_cipher().
Is there a supported
On 15/01/2019 11:29, M K Saravanan wrote:
> Hi,
>
> When I use openssl s_client to connect to a server which uses session
> ticket to resume a session (session ID is turned off), openssl is
> still printing a session ID where none is sent by the server (packet
> capture shows session ID length
Hi,
When I use openssl s_client to connect to a server which uses session
ticket to resume a session (session ID is turned off), openssl is
still printing a session ID where none is sent by the server (packet
capture shows session ID length = zero in the Server Hello).
==
New, TLSv1.2, Ci
hi
You found solution for this issue.I am also facing the same.
--
Sent from: http://openssl.6102.n7.nabble.com/OpenSSL-User-f3.html
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
12 matches
Mail list logo