On 1/17/19 8:25 PM, Michael Wojcik wrote:
From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of
Dennis Clarke
Sent: Thursday, January 17, 2019 18:23
"crypto/objects/o_names.c", line 114: error: undefined symbol: strcasecmp
"crypto/objects/o_names.c", line 114: warning: impr
On 16/01/2019 21:25, Viktor Dukhovni wrote:
On Jan 15, 2019, at 10:29 AM, Eliot Lear wrote:
I have an application that requires long-lived signatures, perhaps long
past the point where the signer's cert has expired. I'd like a way to
extract the signature date from a CMS structure. With all t
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of
> Dennis Clarke
> Sent: Thursday, January 17, 2019 18:23
>
> "crypto/objects/o_names.c", line 114: error: undefined symbol: strcasecmp
> "crypto/objects/o_names.c", line 114: warning: improper pointer/integer
> combinatio
On 1/14/2019 4:09 AM, Matt Caswell wrote:
> This works more "by accident". There is no ciphersuite alias called
> "TLSv1.3", so using it as above results in no ciphersuites matched.
> Since the TLSv1.3 ciphersuites are on by default anyway that's all
> that you get back.
>From what you say, and b
Fairly sure I did not run into all these issues with 1.1.1 on the exact
same systems but regardless here we are. I *know* that I tested every
one of the 'pre' testing versions and have 1.1.1 running fine just about
everywhere. So here goes the long story with ye strict C99 compiler :
$ env |
On Thursday, 17 January 2019 18:03:55 CET Eliot Lear wrote:
> On 17.01.19 17:29, Hubert Kario wrote:
> > alternatively, you can save all the certificates and revocation data, bind
> > it to the original signature using a timestamp from a TSA and store that
> > (that's necessary if you want to be ab
> On Jan 7, 2019, at 11:52, Chris Fernando via openssl-users
> wrote:
>
>>
>> On Jan 7, 2019, at 09:20, Chris Fernando via openssl-users
>> wrote:
>>
>> I perused the list archives for all of 2018 and did not see anything current
>> relating to this problem, so if this is a question that ha
On Thu, Jan 17, 2019 at 05:39:39PM +, Steven Winfield wrote:
> TL;DR: After a failed handshake, caused by our peer’s certificate failing
> verification, what is the correct way to get hold of the peer’s certificate?
You can't get it after, but you can get it *during* the handshake, by
impleme
Hi all,
First time posting here so please be gentle ;-)
TL;DR: After a failed handshake, caused by our peer’s certificate failing
verification, what is the correct way to get hold of the peer’s certificate?
A little more detail:
I’d like my server applications to be able to log some details abo
On 17.01.19 17:29, Hubert Kario wrote:
>
> alternatively, you can save all the certificates and revocation data, bind it
> to the original signature using a timestamp from a TSA and store that (that's
> necessary if you want to be able to prove to some 3rd party that you received
> a correctly
Look at the tricks openssl has to do in order to properly zeroized memory and
avoid having the compiler optimize it away.
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
On Wednesday, 16 January 2019 21:25:32 CET Viktor Dukhovni wrote:
> > On Jan 15, 2019, at 10:29 AM, Eliot Lear wrote:
> >
> > I have an application that requires long-lived signatures, perhaps long
> > past the point where the signer's cert has expired. I'd like a way to
> > extract the signatur
On 17/01/2019 14:21, Petrescu Constantin Cezar wrote:
> Dear sirs/madams,
>
> My name is Costin Cezar Petrescu and I am a student at Royal Holloway. I am
> intending to conduct some research regarding compilation errors, tricks to fix
> compiler mistakes and their affects over cryptographic libr
Dear sirs/madams,
My name is Costin Cezar Petrescu and I am a student at Royal Holloway. I am
intending to conduct some research regarding compilation errors, tricks to
fix compiler mistakes and their affects over cryptographic libraries.
If it is possible, I would like to find more about OpenSSL
14 matches
Mail list logo