age (Matt Caswell)
> 2. Using SM2 ECIES in 1.1.1 (Akira Takahashi)
> 3. Re: Using SM2 ECIES in 1.1.1 (Matt Caswell)
> 4. openssl cms encrypt recipientInfo [questions for openssl
> developers]. ( ?)
>
>
> ----------------------
>
> Mes
ECIES in 1.1.1 (Matt Caswell)
>4. openssl cms encrypt recipientInfo [questions for openssl
> developers]. ( ?)
>
>
> --
>
> Message: 1
> Date: Wed, 24 Oct 2018 13:57:04 +0100
> From: Matt Caswell
> To: openssl-users@openssl.org
> Subject: Re: [openssl-users] Reg issue in ale
x27;s possible I tweaked some other things
> and didn't call them out in the comments.
>
> I suppose I should check what the CAPI engine source looks like in
> 1.1.1, merge my changes in if feasible, and submit a PR. One of
> these days...
>
> Really
code:
> If CryptGetUserKey returns NTE_NO_KEY, xor keyspec with 3 to flip the key
> type and try CryptGetUesrKey again.
>
> I think that's it, though it's possible I tweaked some other things and
> didn't call them out in the comments.
>
> I suppose I shoul
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf
> Of Viktor Dukhovni
> Sent: Tuesday, October 23, 2018 10:02
>
> On Tue, Oct 23, 2018 at 01:29:27PM +0100, Matt Caswell wrote:
>
> > > So, I think client have set TLS_FALLBACK_SCSV in cipher suite list in
> > > client hello.
On Tue, Oct 23, 2018 at 01:29:27PM +0100, Matt Caswell wrote:
> > So, I think client have set TLS_FALLBACK_SCSV in cipher suite list in
> > client hello.
>
> This suggests there is a bug in the client application. This can only
> happen if the client application calls SSL_CTX_set_mode() or
> SSL_
> > Linux release 7.3.1611 (Core)
> >
> >
> > Any tools which i can run to find out vulnerabilities in the above
> > openssl and OS version? Please guide and i look forward to hearing
> > from you. Thanks in Advance.
> You need to re
gt; > from you. Thanks in Advance.
> You need to replace AAA and BBB with actual strings corresponding to
> each of the unwanted cipher suites.
>
> The advisor that tells you to disable "CBC ciphers" is mostly wrong.
> There is nothing inherently bad about correctly using
On 22/10/2018 14:56, ramakrushna mishra wrote:
> Hi,
>
> I am facing an issue after openssl upgrade to 1.1.1.
> I have a odbc client with maximum version support up to TLSv1.2 and my
> database is running with TLSv1.2,TLsv1.3.
>
> The handhake is failing and I am getting following contents o
Hi,
I am facing an issue after openssl upgrade to 1.1.1.
I have a odbc client with maximum version support up to TLSv1.2 and my
database is running with TLSv1.2,TLsv1.3.
The handhake is failing and I am getting following contents on my BIO dump.
"15 03 03 00 02 02 56" .
If i have understood corr
10 matches
Mail list logo