sing newly created socket for further read and write
operations and original server socket will keep on listening for new
connections.
Regards,
Nivedita
--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Hi Michael,
Please ignore the previous mail. By mistankely it got sent.
I have provided my comments below.
Thanks in advance.
Regards,
Nivedita
On Wed, Feb 14, 2018 at 10:22 AM, Nivedita wrote:
> Hi Michael,
>
> Thanks for the reply.
>
> I have mentioned the answers bel
Hi Michael,
Please find the response inline.
Regards,
Nivedita
On Wed, Feb 14, 2018 at 10:55 PM, Michael Richardson
wrote:
>
> Nivedita wrote:
> > Hi Michael,
>
> > Thanks for the reply.
>
> > I have mentioned the answers below.
>
> >okay. I
Hi Michael,
Would you please let me know whether this new release of
openssl-1.1.1-pre3 supports DTLS over udp for SIP protocol using
dtlsv1_accept method.
Regards,
Nivedita
On Wed, Feb 21, 2018 at 11:54 AM, Nivedita wrote:
> Hi Michael,
>
> Please find the response inline and al
Hi Michael,
We are working on SIP , and i am looking for dtlsv1_accept method so that
when multiple clients want to connect to single server, dtls should open a
separate port for each client instance, when running over udp.
Regards,
Nivedita
On Wed, Mar 21, 2018 at 11:04 PM, Michael
the locking callback function before accessing the
internal session cache then the vulnerability should not
apply to above mentioned applications.
Please advice.
Any help on this is really appreciated.
Regards,
Nivedita
On Tue, Nov 16, 2010 at 7:15 AM, OpenSSL wrote:
> -BEGIN PGP SIG
> *From:* David Schwartz
> *To:* openssl-users@openssl.org
> *Cc:* Nivedita Melinkeri
> *Sent:* Wed, November 17, 2010 4:15:36 AM
> *Subject:* Re: Question regarding OpenSSL Security Advisory
>
> On 11/16/2010 11:06 PM, Nivedita Melinkeri wrote:
>
> > Hi,
rect me if you think this
> understanding is incottect.
>
> Regards,
>
Nivedita
> On Thu, Nov 18, 2010 at 7:26 AM, Pandit Panburana wrote:
>
>> Hi,
>>
>>I am not clear about the condition that vulnerability when using
>> internal session caching mechan
sue or know why this could happen with 0.9.8n.
Any help is greatly appreciated.
Regards,
Nivedita