I understand that the trusted store must include Intermediate CA 1 or
remove Intermediate CA 2 and just have the Root CA in it. I was trying
things out to understand how client authentication works.
Regards,
Sudarshan
On Tue, Aug 22, 2017 at 10:37 AM, Sudarshan Raghavan <
sudarshan.t.ra
This is the CA - Leaf hierarchy I am testing with
Root CA > Intermediate CA 1 > Intermediate CA 2 > Leaf
Trusted certificates configured: Root CA and Intermediate CA 2
Client authenticates itself with this chain: Leaf > Intermediate CA 2 >
Intermediate CA 1
I am using openssl 1.1.0f. This clien
experiment
to understand a client authentication failure in a similar scenario. I can
now look at the code to figure out what is going on.
Regards,
Sudarshan
On Sun, Aug 13, 2017 at 9:49 AM, Viktor Dukhovni wrote:
>
> > On Aug 13, 2017, at 11:39 AM, Sudarshan Raghavan <
> sudarshan.t.ragh
Hello OpenSSL users,
I have this certificate chain, root ca -> intermediate ca 1 -> intermediate
ca 2 -> leaf certificate. With this chain, I attempted combinations of
openssl verify commands to understand how it works with certificate chains.
1. openssl verify -CAfile . This
verifies ok as expe
Hi,
I have been trying to transfer SSL connections (that are in accept state
with handshake completed and some data already sent/received prior to the
transfer) from one process to another so that it would allow me to
seamlessly receive and send over the SSL connection (from an SSL Client)
once it
I understand that this function deals with big numbers and this could
possibly explain the extra CPU usage on a 32 bit system. Is moving to
a 64 bit system the only option?
Regards,
Sudarshan
On Mon, Jun 4, 2012 at 2:57 PM, Sudarshan Raghavan
wrote:
> While running a CPS test of 330 connecti
ot;
wrote:
> Hi all!
>
> * Jeffrey Walton Sent: Friday, May 25, 2012 4:39 PM
> > On Fri, May 25, 2012 at 7:25 AM, Sudarshan Raghavan
> > wrote:
> > > Ok, I can fix the custom free to take care of this.
> > > But, why is th
he fix or is there something more to this?
Regards,
Sudarshan
On Fri, May 25, 2012 at 5:00 PM, Sudarshan Raghavan
wrote:
> I enabled debug symbols in openssl and this is what I am seeing
>
>
> #3 0x0828bd74 in CUSTOM_FREE (oldMem=0x0) at ssl_mem.c:34
> #4 0xb758e160 in CRYPTO_fr
s3_lib.c:2995
#7 0xb7712486 in tls1_free (s=0xb3e4f300) at t1_lib.c:165
#8 0xb77265f2 in SSL_free (s=0xb3e4f300) at ssl_lib.c:586
tls_srp.c :102 is this
OPENSSL_free(s->srp_ctx.login);
Regards,
Sudarshan
On Thu, May 24, 2012 at 7:23 PM, Dr. Stephen Henson wrote:
> On Thu, May 24, 2012, Sud
:00 AM, Richard Levitte wrote:
> In message
> on Thu,
> 24 May 2012 17:46:49 +0530, Sudarshan Raghavan
> said:
>
> sudarshan.t.raghavan> Hi,
> sudarshan.t.raghavan>
> sudarshan.t.raghavan> I am using CRYPTO_set_mem_functions to use our own
> custom memory
&
Hi,
I am using CRYPTO_set_mem_functions to use our own custom memory
routines in a non blocking proxy implementation. This was working fine
in 0.9.8 and 1.0.0 but with 1.0.1c I can see that the custom free
routine is being invoked with a NULL argument after calling SSL_free
and this results in the
11 matches
Mail list logo