On 2020-08-13 20:20, Benjamin Kaduk wrote:
On Thu, Aug 13, 2020 at 08:19:10PM +0200, Detlef Vollmann wrote:
Hello,
with the following commands:
openssl s_server -accept 18010 -cert srv.crt -key test.key \
-CAfile testca.crt -debug -cipher 'NULL-SHA256' -dtls1_2
openssl s_client -connect local
On Thu, Aug 13, 2020 at 08:19:10PM +0200, Detlef Vollmann wrote:
> Hello,
>
> with the following commands:
>
> openssl s_server -accept 18010 -cert srv.crt -key test.key \
> -CAfile testca.crt -debug -cipher 'NULL-SHA256' -dtls1_2
>
> openssl s_client -connect localhost:18010 -cert clnt.crt \
>
On Thu, Apr 16, 2009 at 02:21:10PM +0300, Ouaknine, Keren wrote:
> Hello,
>
> Mazal-tov for getting Beta out. I am interested in the implementation of the
> null-ciphers (when the encryption is mandatory, and clear-text used). This is
> part of RFC 4785, which I didn't see in the log changes of
In article <[EMAIL PROTECTED]> you wrote:
> Here is an RTFM question, most likely, so first of all,
> where is the FM?
>
> I am attempting to use SSL as a basic transport for a variety of
> purposes, some of which is transporting already encrypted data.
> At such times, I want to renegotiate ba