Hi,
Could someone shed some light on this above mentioned RSA bad signature
issue.
Thanks,
Senthil.
On Thu, Feb 23, 2017 at 12:31 AM, Senthil Raja Velu
wrote:
> Hi,
> I have recently updated my openssl server version from 1.0.1m to 1.0.2j.
> After updating the handshake fails with t
Hi,
I have recently updated my openssl server version from 1.0.1m to 1.0.2j.
After updating the handshake fails with the client. The client still use
openssl version 1.0.1e-fips.
Note: With older openssl server version (1.0.1m) the handshake works with
the same set of certificates.
Here is the co
Thanks again!
-Senthil.
On Thu, Jan 26, 2017 at 9:27 PM, Matt Caswell wrote:
>
>
> On 26/01/17 15:53, Senthil Raja Velu wrote:
> > Hi Matt,
> > One other quick question, Is there a openssl utility code to just check
> > PRNG is initialized or NOT_SEEDED.
>
at 8:54 PM, Senthil Raja Velu wrote:
> Hi Matt,
> Thanks for such a detailed reply. I will work on the pointers provided.
> And will plan to move openssl implementation to 1.0.2 series as suggested.
> I will check the random method used if that is the cause of this issue.
>
wrote:
>
>
> On 26/01/17 04:38, Senthil Raja Velu wrote:
> > Hi,
> > I have a setup where the handshake between openssl server and client
> > fails at times but not always. And when it does, the client keeps
> > retrying and all of trials fail. Only way to rec
Hi,
I have a setup where the handshake between openssl server and client fails
at times but not always. And when it does, the client keeps retrying and
all of trials fail. Only way to recover is to restart the server.
Currently on the server side the openssl version that I have installed is
1.0.1