Open SSL Users
[Prev Page][Next Page]
- i2d and d2i fucntions
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- i2d and d2i fucntions
- From: raji.kotamraju@xxxxxxxxx (Rajeswari K)
- Fwd: Problem with encoding a CRL's signing algorithm
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- Fwd: Problem with encoding a CRL's signing algorithm
- From: BenBE@xxxxxxxxx (Benny Baumann)
- pkcs12 how to have different key friendlyName?
- From: dev+openssl@xxxxxxxxxxx (Sean Leonard)
- pkcs12 is no encryption possible for certs?
- From: dev+openssl@xxxxxxxxxxx (Sean Leonard)
- i2d and d2i fucntions
- From: raji.kotamraju@xxxxxxxxx (Rajeswari K)
- pkcs12 is no encryption possible for certs?
- From: kudzu@xxxxxxxxxxxx (Michael Sierchio)
- pkcs12 is no encryption possible for certs?
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- pkcs12 is no encryption possible for certs?
- From: gregs@xxxxxxxxx (Gregory Sloop)
- pkcs12 how to have different key friendlyName?
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- pkcs12 is no encryption possible for certs?
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- i2d and d2i fucntions
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- pkcs12 is no encryption possible for certs?
- From: kudzu@xxxxxxxxxxxx (Michael Sierchio)
- i2d and d2i fucntions
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- pkcs12 is no encryption possible for certs?
- From: dev+openssl@xxxxxxxxxxx (Sean Leonard)
- pkcs12 how to have different key friendlyName?
- From: dev+openssl@xxxxxxxxxxx (Sean Leonard)
- 1.0.1 upgrade issue
- From: jayf0ster@xxxxxxxxxxxxxx (Jay Foster)
- [openssl-users] [openssl-dev] Proposed cipher changes for post-1.0.2
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- 1.0.1 upgrade issue
- From: mikec1404@xxxxxxxxx (Mike Collins)
- i2d and d2i fucntions
- From: raji.kotamraju@xxxxxxxxx (Rajeswari K)
- i2d and d2i fucntions
- From: raji.kotamraju@xxxxxxxxx (Rajeswari K)
- i2d and d2i fucntions
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- OpenSSL 1.0.1l: X509_NAME_add_entry_by_txt broken?
- From: joerg.eyring@xxxxxxxx (Jörg Eyring)
- Code Reformat blog post
- From: matt@xxxxxxxxxxx (Matt Caswell)
- i2d and d2i fucntions
- From: raji.kotamraju@xxxxxxxxx (Rajeswari K)
- OpenSSL 1.0.1l: X509_NAME_add_entry_by_txt broken?
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- Changelog inconsistency between 1.0.1l and 1.0.2
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- [openssl-dev] Proposed cipher changes for post-1.0.2
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- [openssl-users] [openssl-dev] Proposed cipher changes for post-1.0.2
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- [openssl-dev] Proposed cipher changes for post-1.0.2
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- [openssl-dev] Proposed cipher changes for post-1.0.2
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- [openssl-dev] Proposed cipher changes for post-1.0.2
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- [openssl-dev] Proposed cipher changes for post-1.0.2
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- [openssl-dev] Proposed cipher changes for post-1.0.2
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- [openssl-dev] Proposed cipher changes for post-1.0.2
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- OpenSSL 1.0.1l: X509_NAME_add_entry_by_txt broken?
- From: joerg.eyring@xxxxxxxx (Jörg Eyring)
- OpenSSL 1.0.1l: X509_NAME_add_entry_by_txt broken?
- From: joerg.eyring@xxxxxxxx (Jörg Eyring)
- [openssl-dev] Proposed cipher changes for post-1.0.2
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- [openssl-dev] Proposed cipher changes for post-1.0.2
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- [openssl-dev] Proposed cipher changes for post-1.0.2
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- [openssl-dev] Proposed cipher changes for post-1.0.2
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- [openssl-dev] Proposed cipher changes for post-1.0.2
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- [openssl-dev] Proposed cipher changes for post-1.0.2
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- The evolution of the 'master' branch
- From: matt@xxxxxxxxxxx (Matt Caswell)
- The evolution of the 'master' branch
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- [openssl-dev] Proposed cipher changes for post-1.0.2
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- The evolution of the 'master' branch
- From: thomas.francis.jr@xxxxxxxxx (Tom Francis)
- Proposed cipher changes for post-1.0.2
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- AES-GCM failing from Command Line Interface
- From: matt@xxxxxxxxxxx (Matt Caswell)
- AES-GCM failing from Command Line Interface
- From: secaficionado@xxxxxxxxx (Sec_Aficionado)
- DTLS Handshake issue (openssl-1.0.1e-dtls-ecc-ext.patch) leads to process crash
- From: sanchit1.arora@xxxxxxxxx (sanchit arora)
- AES-GCM failing from Command Line Interface
- From: matt@xxxxxxxxxxx (Matt Caswell)
- AES-GCM failing from Command Line Interface
- From: secaficionado@xxxxxxxxx (Sec_Aficionado)
- How to construct certificate chain
- From: oyljerry@xxxxxxxxx (Jerry OELoo)
- AES-GCM failing from Command Line Interface
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- The evolution of the 'master' branch
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- AES-GCM failing from Command Line Interface
- From: secaficionado@xxxxxxxxx (Sec_Aficionado)
- How to load local certificate folder on windows
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- DTLS Handshake issue (openssl-1.0.1e-dtls-ecc-ext.patch) leads to process crash
- From: matt@xxxxxxxxxxx (Matt Caswell)
- DTLS Handshake issue (openssl-1.0.1e-dtls-ecc-ext.patch) leads to process crash
- From: sanchit1.arora@xxxxxxxxx (sanchit arora)
- Means to update read bio only
- From: shinrich@xxxxxxxx (Susan Hinrichs)
- ui_openssl.c is assuming that current console is ECHO(termios) enabled
- From: khang.social@xxxxxxxxx (Khang Nguyen)
- [openssl-dev] The evolution of the 'master' branch
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- [openssl-dev] The evolution of the 'master' branch
- From: matt@xxxxxxxxxxx (Matt Caswell)
- error:02001002:system library:fopen:No such file or directory:.\crypto\bio\bss_file.c
- From: getur.srikanth@xxxxxxxxx (Itsmesri)
- [openssl-dev] The evolution of the 'master' branch
- From: richmoore44@xxxxxxxxx (Richard Moore)
- [openssl-dev] The evolution of the 'master' branch
- From: matt@xxxxxxxxxxx (Matt Caswell)
- SHA256 docs
- From: viktor@xxxxxxxxx (Szépe Viktor)
- [openssl-dev] The evolution of the 'master' branch
- From: richmoore44@xxxxxxxxx (Richard Moore)
- [openssl-dev] The evolution of the 'master' branch
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- [openssl-dev] The evolution of the 'master' branch
- From: giuseppe.dangelo@xxxxxxxx (Giuseppe D'Angelo)
- [openssl-dev] The evolution of the 'master' branch
- From: matt@xxxxxxxxxxx (Matt Caswell)
- [openssl-dev] The evolution of the 'master' branch
- From: richmoore44@xxxxxxxxx (Richard Moore)
- Means to update read bio only
- From: matt@xxxxxxxxxxx (Matt Caswell)
- The evolution of the 'master' branch
- From: aixtools@xxxxxxxxx (Michael Felt)
- Means to update read bio only
- From: matt@xxxxxxxxxxx (Matt Caswell)
- openssl genrsa question
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- The evolution of the 'master' branch
- From: matt@xxxxxxxxxxx (Matt Caswell)
- How to load local certificate folder on windows
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- openssl genrsa question
- From: rex@xxxxxxxxxxxxx (Rex Bloom)
- How to load local certificate folder on windows
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- The evolution of the 'master' branch
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- The evolution of the 'master' branch
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- Means to update read bio only
- From: shinrich@xxxxxxxx (Susan Hinrichs)
- custom name attributes not sent with certificate
- From: florencej@xxxxxxxxxxxxxxxx (Florence, Jacques)
- using openssl to create PKCS#7/CMS on windows
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- custom name attributes not sent with certificate
- From: florencej@xxxxxxxxxxxxxxxx (Florence, Jacques)
- custom name attributes not sent with certificate
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- Is it possible to add eContent to a signedData which has no signers
- From: Neil.Martin@xxxxxxx (Martin, Neil)
- i2d_X509_SIG() in FIPS mode
- From: gayathri.annur@xxxxxxxxx (Gayathri Manoj)
- custom name attributes not sent with certificate
- From: florencej@xxxxxxxxxxxxxxxx (Florence, Jacques)
- Parameters for using ECDHE and ECDSA
- From: florencej@xxxxxxxxxxxxxxxx (Florence, Jacques)
- Parameters for using ECDHE and ECDSA
- From: matt@xxxxxxxxxxx (Matt Caswell)
- Parameters for using ECDHE and ECDSA
- From: florencej@xxxxxxxxxxxxxxxx (Florence, Jacques)
- i2d_X509_SIG() in FIPS mode
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- using openssl to create PKCS#7/CMS on windows
- From: srirrao@xxxxxxxxx (Srinivas Rao)
- i2d_X509_SIG() in FIPS mode
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- i2d_X509_SIG() in FIPS mode
- From: gayathri.annur@xxxxxxxxx (Gayathri Manoj)
- How to load local certificate folder on windows
- From: oyljerry@xxxxxxxxx (Jerry OELoo)
- The evolution of the 'master' branch
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- make depend error in openssl-1.0.2/crypto
- From: pbellino@xxxxxxx (Philip Bellino)
- The evolution of the 'master' branch
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- Certificate verification fails with latest commits (ECDSA)
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- i2d_X509_SIG() in FIPS mode
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- i2d_X509_SIG() in FIPS mode
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- Handle Leaks - shmem-win32.c shmem.c - OpenSSL 1.0.1l
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- ECDHE-ECDSA certificate returning with no shared cipher error
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- Openssl verify command and c_rehash
- From: dpb795795@xxxxxxxxx (Deepak)
- What is the best practise for shutdown SSL connections?
- From: rasjv@xxxxxxxxxx (Serj Rakitov)
- i2d_ d2i_ b2i_ i2b_ functions and EVP_PKEY
- From: rasjv@xxxxxxxxxx (Serj Rakitov)
- The evolution of the 'master' branch
- From: rsalz@xxxxxxxxxxx (Rich Salz)
- Windows Embedded Compact 7 OpenSSL
- From: tsutton@xxxxxxxxxx (Sutton, Timothy)
- OpenSSL FIPS Object Module 1.* is vulnerable to CVE-2014-3570?
- From: susumu.sai.2006@xxxxxxxxx (Susumu Sai)
- Certificate verification fails with latest commits (ECDSA)
- From: jan.weil@xxxxxx (jan.weil@xxxxxx)
- i2d_ d2i_ b2i_ i2b_ functions and EVP_PKEY
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- Certificate verification fails with latest commits (ECDSA)
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- Support of HMAC-Based ciphersuites (RFC6367) in openssl 1.0.1l
- From: Andre.Wendel@xxxxxx (Andre.Wendel@xxxxxx)
- i2d_ d2i_ b2i_ i2b_ functions and EVP_PKEY
- From: rasjv@xxxxxxxxxx (Serj)
- "openssl dgst" computes wrong HMAC?
- From: dfnsonfsduifb@xxxxxx (Johannes Bauer)
- i2d_ d2i_ b2i_ i2b_ functions and EVP_PKEY
- From: rasjv@xxxxxxxxxx (Serj)
- "openssl dgst" computes wrong HMAC?
- From: bbrumley@xxxxxxxxx (Billy Brumley)
- Certificate verification fails with latest commits (ECDSA)
- From: jan.weil@xxxxxx (jan.weil@xxxxxx)
- "openssl dgst" computes wrong HMAC?
- From: dfnsonfsduifb@xxxxxx (Johannes Bauer)
- "openssl dgst" computes wrong HMAC?
- From: dfnsonfsduifb@xxxxxx (Johannes Bauer)
- Openssl 1.0.2 evp_test core dumps on Sparc T4, solaris 11
- From: goran.hammarback@xxxxxxxx (Göran Hammarbäck)
- i2d_X509_SIG() in FIPS mode
- From: gayathri.annur@xxxxxxxxx (Gayathri Manoj)
- ECDHE-ECDSA certificate returning with no shared cipher error
- From: raji.kotamraju@xxxxxxxxx (Rajeswari K)
- ECDHE-ECDSA certificate returning with no shared cipher error
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- i2d_X509_SIG() in FIPS mode
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- i2d_X509_SIG() in FIPS mode
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- What is the best practise for shutdown SSL connections?
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- i2d_X509_SIG() in FIPS mode
- From: gayathri.annur@xxxxxxxxx (Gayathri Manoj)
- Specify algorithm for openssl smime decrypt
- From: curious_freddy@xxxxxxxxxx (Fred)
- i2d_X509_SIG() in FIPS mode
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- i2d_X509_SIG() in FIPS mode
- From: gayathri.annur@xxxxxxxxx (Gayathri Manoj)
- ECDSA private key load error
- From: raji.kotamraju@xxxxxxxxx (Rajeswari K)
- What is the best practise for shutdown SSL connections?
- From: rasjv@xxxxxxxxxx (Serj)
- ECDHE-ECDSA certificate returning with no shared cipher error
- From: raji.kotamraju@xxxxxxxxx (Rajeswari K)
- What is the best practise for shutdown SSL connections?
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- What is the best practise for shutdown SSL connections?
- From: rasjv@xxxxxxxxxx (Serj)
- What is the best practise for shutdown SSL connections?
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- SSL/TLS sessions of client
- From: rasjv@xxxxxxxxxx (Serj)
- What is the best practise for shutdown SSL connections?
- From: rasjv@xxxxxxxxxx (Serj)
- What is the best practise for shutdown SSL connections?
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- What is the best practise for shutdown SSL connections?
- From: rasjv@xxxxxxxxxx (Serj)
- OpenSSL 'verify' command and c_ rehash script on Cygwin
- From: dpb795795@xxxxxxxxx (Deepak)
- Strange behaviour with Chrome (client OS = WinXP x64) ...
- From: Walter.H@xxxxxxxxxxxxxxxxx (Walter H.)
- OpenSSL 'verify' command and c_ rehash script on Cygwin
- From: dpb795795@xxxxxxxxx (Deepak)
- Is CVE-2014-3570 fixed in FIPS Object Module 1.* (1.1.2, 1.2, 1.2.2 ...)
- From: susumu.sai.2006@xxxxxxxxx (Susumu Sai)
- Is openssl a vector of exploit for Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname ?
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- Is openssl a vector of exploit for Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname ?
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- Is openssl a vector of exploit for Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname ?
- From: pl@xxxxxxxxxxxxxxxxxxx (pl)
- Intermediate certificates
- From: rasjv@xxxxxxxxxx (Serj)
- Wrong usage of PKCS7_add_signature()??
- From: srirrao@xxxxxxxxx (Srinivas Rao)
- i2d_X509_SIG() in FIPS mode
- From: gayathri.annur@xxxxxxxxx (Gayathri Manoj)
- IPv6 and OpenSSL at the BIO level -- should it work?
- From: dave.mclellan@xxxxxxx (mclellan, dave)
- Intermediate certificates
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- IPv6 and OpenSSL at the BIO level -- should it work?
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- Intermediate certificates
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- openssl s_server stops on some client connections
- From: lists@xxxxxxxxxxxxxxx (Lists@vpnadmin)
- Cannot clear error OpenSSL Error Stack
- From: antonios.tsakiridis@xxxxxxxxx (Tsakiridis, Antonios)
- PKCS7_add_signature dumps core (windows)
- From: srirrao@xxxxxxxxx (Srinivas Rao)
- IPv6 and OpenSSL at the BIO level -- should it work?
- From: dave.mclellan@xxxxxxx (mclellan, dave)
- Intermediate certificates
- From: oyljerry@xxxxxxxxx (Jerry OELoo)
- Using FIPS mode and modifying apps
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- Using FIPS mode and modifying apps
- From: thomas.francis.jr@xxxxxxxxx (Tom Francis)
- Using FIPS mode and modifying apps
- From: marquess@xxxxxxxxxxx (Steve Marquess)
- Using FIPS mode and modifying apps
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- Using FIPS mode and modifying apps
- From: jonetsu@xxxxxxxxxxxx (jonetsu@xxxxxxxxxxxx)
- Using FIPS mode and modifying apps
- From: jonetsu@xxxxxxxxxxxx (jonetsu@xxxxxxxxxxxx)
- Intermediate certificates
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- Intermediate certificates
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- Intermediate certificates
- From: kurt@xxxxxxxxx (Kurt Roeckx)
- Hostname validation
- From: rasjv@xxxxxxxxxx (Serj)
- Hostname validation
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- Intermediate certificates
- From: rasjv@xxxxxxxxxx (Serj)
- Hostname validation
- From: rasjv@xxxxxxxxxx (Serj)
- Intermediate certificates
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- Hostname validation
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- TSLEXT_TYPE_opaque_prf_input
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- Intermediate certificates
- From: rasjv@xxxxxxxxxx (Serj)
- Using FIPS mode and modifying apps
- From: marquess@xxxxxxxxxxx (Steve Marquess)
- Hostname validation
- From: rasjv@xxxxxxxxxx (Serj)
- Hostname validation
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- Using FIPS mode and modifying apps
- From: jonetsu@xxxxxxxxxxxx (jonetsu)
- Using FIPS mode and modifying apps
- From: marquess@xxxxxxxxxxx (Steve Marquess)
- Hostname validation
- From: rasjv@xxxxxxxxxx (Serj)
- Using FIPS mode and modifying apps
- From: thomas.francis.jr@xxxxxxxxx (Tom Francis)
- Using FIPS mode and modifying apps
- From: jonetsu@xxxxxxxxxxxx (jonetsu@xxxxxxxxxxxx)
- Hostname validation
- From: pl@xxxxxxxxxxxxxxxxxxx (pl)
- Hostname validation
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- Hostname validation
- From: pl@xxxxxxxxxxxxxxxxxxx (pl)
- Hostname validation
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- Hostname validation
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- Hostname validation
- From: rasjv@xxxxxxxxxx (Serj)
- Hostname validation
- From: rasjv@xxxxxxxxxx (Serj)
- Handle Leaks - shmem-win32.c shmem.c - OpenSSL 1.0.1l
- From: Avery.A.Tarasov@xxxxxxxxxxxxxxxxxxxx (Avery A. Tarasov)
- Handle Leaks - shmem-win32.c shmem.c - OpenSSL 1.0.1l
- From: michel.sales@xxxxxxxxx (Michel SALES)
- Hostname validation
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- Hostname validation
- From: rasjv@xxxxxxxxxx (Serj)
- Handle Leaks - shmem-win32.c shmem.c - OpenSSL 1.0.1l
- From: Avery.A.Tarasov@xxxxxxxxxxxxxxxxxxxx (Avery A. Tarasov)
- Hostname validation
- From: rasjv@xxxxxxxxxx (Serj)
- Handle Leaks - shmem-win32.c shmem.c - OpenSSL 1.0.1l
- From: michel.sales@xxxxxxxxx (Michel SALES)
- Handle Leaks - shmem-win32.c shmem.c - OpenSSL 1.0.1l
- From: kurt@xxxxxxxxx (Kurt Roeckx)
- Handle Leaks - shmem-win32.c shmem.c - OpenSSL 1.0.1l
- From: Avery.A.Tarasov@xxxxxxxxxxxxxxxxxxxx (Avery A. Tarasov)
- Handle Leaks - shmem-win32.c shmem.c - OpenSSL 1.0.1l
- From: michel.sales@xxxxxxxxx (Michel SALES)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: richmoore44@xxxxxxxxx (Richard Moore)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: richmoore44@xxxxxxxxx (Richard Moore)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: richmoore44@xxxxxxxxx (Richard Moore)
- Is CRYPTO_set_locking_callback necessary in multi-threaded OpenSSL program that already uses mutexes to make sure threads can't run at the same time?
- From: Avery.A.Tarasov@xxxxxxxxxxxxxxxxxxxx (Avery A. Tarasov)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: dave.mclellan@xxxxxxx (mclellan, dave)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: Kai.Koehne@xxxxxxxxxxxxxxxx (Koehne Kai)
- Handle Leaks - shmem-win32.c shmem.c - OpenSSL 1.0.1l
- From: Avery.A.Tarasov@xxxxxxxxxxxxxxxxxxxx (Avery A. Tarasov)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: dave.mclellan@xxxxxxx (mclellan, dave)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- HMAC-MD5 OpenSSL 1.0.1e and FIPS 2.0.7
- From: JLaundree@xxxxxxxx (John Laundree)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: dave.mclellan@xxxxxxx (mclellan, dave)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- missing default /usr/local/ssl/openssl.cnf causes failure on AIX, warning on all others
- From: dave.mclellan@xxxxxxx (mclellan, dave)
- HMAC-MD5 OpenSSL 1.0.1e and FIPS 2.0.7
- From: ldgibbons@xxxxxxxxx (Gibbons, Lee D (Doug))
- Proper cleanup functions being called?
- From: michel.sales@xxxxxxxxx (Michel SALES)
- EVP_aes_256_gcm -- receiving of tag
- From: chris.hall.list@xxxxxxxxxxxxxx ('Chris Hall')
- HMAC-MD5 OpenSSL 1.0.1e and FIPS 2.0.7
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- Proper cleanup functions being called?
- From: Avery.A.Tarasov@xxxxxxxxxxxxxxxxxxxx (Avery A. Tarasov)
- FIPS JCE cryptographic modules usage with Openssl-1.0.1j and openssl-fips-2.0.7
- From: thomas.francis.jr@xxxxxxxxx (Tom Francis)
- EVP_aes_256_gcm -- receiving of tag
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- HMAC-MD5 OpenSSL 1.0.1e and FIPS 2.0.7
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- HMAC-MD5 OpenSSL 1.0.1e and FIPS 2.0.7
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- HMAC-MD5 OpenSSL 1.0.1e and FIPS 2.0.7
- From: JLaundree@xxxxxxxx (John Laundree)
- FIPS JCE cryptographic modules usage with Openssl-1.0.1j and openssl-fips-2.0.7
- From: pbellino@xxxxxxx (Philip Bellino)
- Read cer file failed
- From: oyljerry@xxxxxxxxx (Jerry OELoo)
- Read cer file failed
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- HMAC-MD5 OpenSSL 1.0.1e and FIPS 2.0.7
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- OpenSSL FIPS (0.9.8) coexisting with non-FIPS (1.0.1)
- From: thomas.francis.jr@xxxxxxxxx (Tom Francis)
- HMAC-MD5 OpenSSL 1.0.1e and FIPS 2.0.7
- From: JLaundree@xxxxxxxx (John Laundree)
- OpenSSL FIPS (0.9.8) coexisting with non-FIPS (1.0.1)
- From: ndadoun@xxxxxxxxxxxx (Nou Dadoun)
- EVP_aes_256_gcm -- receiving of tag
- From: chris.hall.list@xxxxxxxxxxxxxx ('Chris Hall')
- OpenSSL FIPS (0.9.8) coexisting with non-FIPS (1.0.1)
- From: marquess@xxxxxxxxxxx (Steve Marquess)
- Read cer file failed
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- ntp-kegen fails in OpenSSL 1.0.1e-FIPs
- From: gayathri.annur@xxxxxxxxx (Gayathri Manoj)
- Read cer file failed
- From: oyljerry@xxxxxxxxx (Jerry OELoo)
- OpenSSL FIPS (0.9.8) coexisting with non-FIPS (1.0.1)
- From: ndadoun@xxxxxxxxxxxx (Nou Dadoun)
- Long startup time and poor entropy on Windows due to inefficient heap walking In RAND_poll()
- From: NCarboni@xxxxxxxxxxxxxxxxxxxxxx (Noel Carboni)
- Long startup time and poor entropy on Windows due to inefficient heap walking In RAND_poll()
- From: skneizys@xxxxxxxxxxxx (Steven Kneizys)
- Long startup time and poor entropy on Windows due to inefficient heap walking In RAND_poll()
- From: NCarboni@xxxxxxxxxxxxxxxxxxxxxx (Noel Carboni)
- Long startup time and poor entropy on Windows due to inefficient heap walking In RAND_poll()
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- Long startup time and poor entropy on Windows due to inefficient heap walking In RAND_poll()
- From: NCarboni@xxxxxxxxxxxxxxxxxxxxxx (Noel Carboni)
- Possible bug in DSA_verify() since CVE-2014-8275 patch (present in 1.0.1k and 1.0.1l)
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- Possible bug in DSA_verify() since CVE-2014-8275 patch (present in 1.0.1k and 1.0.1l)
- From: arnaud.mouiche@xxxxxxxxxxx (arnaud.mouiche@xxxxxxxxxxx)
- Long startup time and poor entropy on Windows due to inefficient heap walking In RAND_poll()
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- SSL_F_SSL3_GET_MESSAGE and SSL_R_UNEXPECTED_MESSAGE
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Long startup time and poor entropy on Windows due to inefficient heap walking In RAND_poll()
- From: NCarboni@xxxxxxxxxxxxxxxxxxxxxx (Noel Carboni)
- SSL_F_SSL3_GET_MESSAGE and SSL_R_UNEXPECTED_MESSAGE
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- SSL_F_SSL3_GET_MESSAGE and SSL_R_UNEXPECTED_MESSAGE
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Is CRYPTO_set_locking_callback still needed if mutexes in threads are already being used to prevent race conditions?
- From: Avery.A.Tarasov@xxxxxxxxxxxxxxxxxxxx (Avery A. Tarasov)
- SSL_F_SSL3_GET_MESSAGE and SSL_R_UNEXPECTED_MESSAGE
- From: matt@xxxxxxxxxxx (Matt Caswell)
- SSL_F_SSL3_GET_MESSAGE and SSL_R_UNEXPECTED_MESSAGE
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- SSL_F_SSL3_GET_MESSAGE and SSL_R_UNEXPECTED_MESSAGE
- From: matt@xxxxxxxxxxx (Matt Caswell)
- SSL_F_SSL3_GET_MESSAGE and SSL_R_UNEXPECTED_MESSAGE
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- SSL_F_SSL3_GET_MESSAGE and SSL_R_UNEXPECTED_MESSAGE
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Check private key/certificate match
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- OpenSSL LogoType extension ASN1 encoding
- From: valentin.bud@xxxxxxxxx (Valentin Bud)
- Case-sensitive cipher names are a bad idea
- From: shathawa@xxxxxxx (Steven J. Hathaway)
- Which openssl to use for `void SSL_set_cert_cb`
- From: dlmeetei@xxxxxxxxx (Devchandra L Meetei)
- Check private key/certificate match
- From: beldmit@xxxxxxxxx (Dmitry Belyavsky)
- Possible bug in DSA_verify() since CVE-2014-8275 patch (present in 1.0.1k and 1.0.1l)
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- OpenSSL FIPS (0.9.8) coexisting with non-FIPS (1.0.1)
- From: marquess@xxxxxxxxxxx (Steve Marquess)
- OpenSSL FIPS (0.9.8) coexisting with non-FIPS (1.0.1)
- From: ndadoun@xxxxxxxxxxxx (Nou Dadoun)
- Possible bug in DSA_verify() since CVE-2014-8275 patch (present in 1.0.1k and 1.0.1l)
- From: arnaud.mouiche@xxxxxxxxxxx (arnaud.mouiche@xxxxxxxxxxx)
- Possible bug in DSA_verify() since CVE-2014-8275 patch (present in 1.0.1k and 1.0.1l)
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- Using FIPS mode and modifying apps
- From: marquess@xxxxxxxxxxx (Steve Marquess)
- Possible bug in DSA_verify() since CVE-2014-8275 patch (present in 1.0.1k and 1.0.1l)
- From: arnaud.mouiche@xxxxxxxxxxx (arnaud.mouiche@xxxxxxxxxxx)
- Client certificate
- From: ted@xxxxxxxxx (Bernhard Fröhlich)
- Client certificate
- From: vladimir.zatsepin@xxxxxxxxx (Vladimir Zatsepin)
- [PATCH] apps: when -purpose is passed, set matching trust param
- From: awilliam@xxxxxxxxxx (Adam Williamson)
- Behaviour of OpenSSL when CApath or CAfile contains a 'trusted certificate' with all uses rejected
- From: awilliam@xxxxxxxxxx (Adam Williamson)
- EVP_DigestVerifyFinal return code?
- From: thomas.francis.jr@xxxxxxxxx (Tom Francis)
- SSL3_GET_CLIENT_HELLO:required cipher missing
- From: erafaloff@xxxxxxxxx (Eric R.)
- SSL3_GET_CLIENT_HELLO:required cipher missing
- From: erafaloff@xxxxxxxxx (Eric R.)
- Behaviour of OpenSSL when CApath or CAfile contains a 'trusted certificate' with all uses rejected
- From: awilliam@xxxxxxxxxx (Adam Williamson)
- SSL3_GET_CLIENT_HELLO:required cipher missing
- From: matt@xxxxxxxxxxx (Matt Caswell)
- Using FIPS mode and modifying apps
- From: meissner@xxxxxxx (Marcus Meissner)
- Using FIPS mode and modifying apps
- From: jonetsu@xxxxxxxxxxxx (jonetsu@xxxxxxxxxxxx)
- EVP_DigestVerifyFinal return code?
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Assembler Optimizations in 'crypto' on Windows
- From: dpb795795@xxxxxxxxx (Deepak)
- SSL3_GET_CLIENT_HELLO:required cipher missing
- From: erafaloff@xxxxxxxxx (Eric R.)
- EVP_DigestSignInit failed, error 0x0000000d?
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Generating large DH parameters
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- Assembler Optimizations in 'crypto' on Windows
- From: skneizys@xxxxxxxxxxxx (Steven Kneizys)
- Platinum Sponsorship by Oracle
- From: marquess@xxxxxxxxxxxxxxxxxxxxx (Steve Marquess)
- Forthcoming OpenSSL releases and reformat
- From: matt@xxxxxxxxxxx (Matt Caswell)
- OpenSSL coding style published
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- Generating large DH parameters
- From: bird_112@xxxxxxxxxxx (jack seth)
- Assembler Optimizations in 'crypto' on Windows
- From: dpb795795@xxxxxxxxx (Deepak)
- Generating large DH parameters
- From: matt@xxxxxxxxxxx (Matt Caswell)
- Generating large DH parameters
- From: bird_112@xxxxxxxxxxx (jack seth)
- OpenSSL coding style published
- From: 84.le0n@xxxxxxxxx (84.le0n)
- Using FIPS mode and modifying apps
- From: jonetsu@xxxxxxxxxxxx (jonetsu@xxxxxxxxxxxx)
- Error in untarring FIPS 2.0.9 file
- From: cjsvance@xxxxxxxxx (Christopher Vance)
- OpenSSL coding style published
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- Looking for ASKDFVS (NIST 800-135) support
- From: JLaundree@xxxxxxxx (John Laundree)
- Please release updated tarballs
- From: matt@xxxxxxxxxxx (Matt Caswell)
- Error in untarring FIPS 2.0.9 file
- From: matt@xxxxxxxxxxx (Matt Caswell)
- Issues whiles doing direct upgrade from 0.9.8l to 1.0.1j
- From: gayathri.annur@xxxxxxxxx (Gayathri Manoj)
- Please release updated tarballs
- From: matt@xxxxxxxxxxx (Matt Caswell)
- Issues whiles doing direct upgrade from 0.9.8l to 1.0.1j
- From: matt@xxxxxxxxxxx (Matt Caswell)
- Issues whiles doing direct upgrade from 0.9.8l to 1.0.1j
- From: gayathri.annur@xxxxxxxxx (Gayathri Manoj)
- Error in untarring FIPS 2.0.9 file
- From: jonetsu@xxxxxxxxxxxx (jonetsu@xxxxxxxxxxxx)
- Retrieve OpenSSL version from C library
- From: elns@xxxxxxxxx (Erik Leunissen)
- Retrieve OpenSSL version from C library
- From: elns@xxxxxxxxx (Erik Leunissen)
- [openssl-announce] Pas de courriel
- From: lgrosenthal@xxxxxxxxxxxxxxx (Lewis Rosenthal)
- Please release updated tarballs
- From: shinelight@xxxxxxxxxxxxxxxxxxx (Thomas J. Hruska)
- [openssl-announce] Pas de courriel
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- GCM
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- GCM
- From: matt@xxxxxxxxxxx (Matt Caswell)
- GCM
- From: amiralex32@xxxxxxxxx (Amir Reda)
- How to leave the list
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- How to leave the list
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- How to leave the list
- From: cjl@xxxxxxxxxxx (Chris L)
- How to leave the list
- From: engineermike@xxxxxxxxxxxxxx (engineermike)
- [openssl-announce] OpenSSL version 1.0.1k released
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- How to construct certificate chain when missing intermediate CA
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- What does EC_KEY_get0_public_key deliver?
- From: matt@xxxxxxxxxxx (Matt Caswell)
- What does EC_KEY_get0_public_key deliver?
- From: weber@xxxxxxxxxxx (Christian Weber)
- [openssl-announce] OpenSSL version 1.0.1k released
- From: dongsheng.song@xxxxxxxxx (Dongsheng Song)
- How to construct certificate chain when missing intermediate CA
- From: oyljerry@xxxxxxxxx (Jerry OELoo)
- What does EC_KEY_get0_public_key deliver?
- From: matt@xxxxxxxxxxx (Matt Caswell)
- What does EC_KEY_get0_public_key deliver?
- From: weber@xxxxxxxxxxx (Christian Weber)
- [Bulk] Build failure in 1.0.1k on Windows
- From: gvanem@xxxxxxxx (Gisle Vanem)
- OpenSSL version 1.0.1k released
- From: scott_n@xxxxxxxxx (Scott Neugroschl)
- openssl-1.0.1k - undeclared identifier
- From: matt@xxxxxxxxxxx (Matt Caswell)
- What does EC_KEY_get0_public_key deliver?
- From: matt@xxxxxxxxxxx (Matt Caswell)
- OpenSSL version 1.0.1k released
- From: layer@xxxxxxxxx (Kevin Layer)
- OpenSSL version 1.0.1k released
- From: layer@xxxxxxxxx (Kevin Layer)
- Build failure in 1.0.1k on Windows
- From: graeme.perrow@xxxxxxx (Perrow, Graeme)
- What does EC_KEY_get0_public_key deliver?
- From: weber@xxxxxxxxxxx (Christian Weber)
- OpenSSL Security Advisory
- From: openssl@xxxxxxxxxxx (OpenSSL)
- OpenSSL version 1.0.1k released
- From: openssl@xxxxxxxxxxx (OpenSSL)
- OpenSSL version 1.0.0p released
- From: openssl@xxxxxxxxxxx (OpenSSL)
- OpenSSL version 0.9.8zd released
- From: openssl@xxxxxxxxxxx (OpenSSL)
- OpenSSL Release Strategy and Blog
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- OpenSSL Release Strategy and Blog
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- openssl, opencrypto integration
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- Need help encrypting my ca.key
- From: bird_112@xxxxxxxxxxx (jack seth)
- Need help encrypting my ca.key
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- Need help encrypting my ca.key
- From: bird_112@xxxxxxxxxxx (jack seth)
- OpenSSL source reformat
- From: matt@xxxxxxxxxxx (Matt Caswell)
- openssl, opencrypto integration
- From: thevoog@xxxxxxx (Chris Eltervoog)
- OpenSSL source reformat
- From: marquess@xxxxxxxxxxx (Steve Marquess)
- OpenSSL source reformat
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- [openssl-dev] OpenSSL source reformat
- From: BenBE@xxxxxxxxx (Benny Baumann)
- Web site problem
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- Specify algorithm for openssl smime decrypt
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- A quick note about recent development builds of Node.js that others might find useful
- From: Richard.Dwan@xxxxxxxx (Richard Dwan)
- Specify algorithm for openssl smime decrypt
- From: curious_freddy@xxxxxxxxxx (Fred)
- Need help encrypting my ca.key
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Need help encrypting my ca.key
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- Need help encrypting my ca.key
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Need help encrypting my ca.key
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- Need help encrypting my ca.key
- From: bird_112@xxxxxxxxxxx (jack seth)
- Need help encrypting my ca.key
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- Need help encrypting my ca.key
- From: bird_112@xxxxxxxxxxx (jack seth)
- POST Integrity test/fingerprint failure on 32-bit MIPS/R3000 with openssl-fips-2.0.5
- From: rohit.kaushal@xxxxxxxxx (Rohit Kaushal)
- OpenSSL and iCloud
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Web site problem
- From: erik@xxxxxxxx (Erik Forsberg)
- OpenSSL and iCloud
- From: openssl@xxxxxxxxxxx (openssl@xxxxxxxxxxx)
- OpenSSL and iCloud
- From: openssl@xxxxxxxxxxx (openssl@xxxxxxxxxxx)
- OpenSSL and iCloud
- From: wiml@xxxxxxxxxxxxx (Wim Lewis)
- OpenSSL and iCloud
- From: openssl@xxxxxxxxxxx (openssl@xxxxxxxxxxx)
- Forthcoming OpenSSL releases
- From: openssl@xxxxxxxxxxx (OpenSSL)
- [openssl-announce] Another record-breaking donation from Smartisan Technology
- From: elaine.anacortes@xxxxxxxxx (elaine ossipov)
- OpenSSL source reformat
- From: matt@xxxxxxxxxxx (Matt Caswell)
- X509_CINF_dup fails with "invalid object encoding" error
- From: vvprasad.chalumuri@xxxxxxxxx (VVPrasad Chalumuri)
- OpenSSL FIPS module breaks the century mark
- From: marquess@xxxxxxxxxxx (Steve Marquess)
- Problems verifying OCSP signatures
- From: richmoore44@xxxxxxxxx (Richard Moore)
- Problems verifying OCSP signatures
- From: Walter.H@xxxxxxxxxxxxxxxxx (Walter H.)
- Problems verifying OCSP signatures
- From: richmoore44@xxxxxxxxx (Richard Moore)
- READ error during tape restore via OpenSSL on AIX
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- READ error during tape restore via OpenSSL on AIX
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- READ error during tape restore via OpenSSL on AIX
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- READ error during tape restore via OpenSSL on AIX
- From: Peter.Klee@xxxxxxxxxx (Klee, Peter (King of Prussia))
- OpenSSL AES encryption using AES_* functions and EVP_* functions
- From: nayak_purushotham@xxxxxxxxx (Purushotham Nayak)
- OpenSSL AES encryption using AES_* functions and EVP_* functions
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- OpenSSL AES encryption using AES_* functions and EVP_* functions
- From: nayak_purushotham@xxxxxxxxx (Purushotham Nayak)
- Remove Anchor
- From: petros.fraser@xxxxxxxxx (Peter Fraser)
- Why construct so wierd certificate chain for one web site
- From: matt@xxxxxxxxxxx (Matt Caswell)
- can I parse PKCS8 file and decrypt it later?
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- Creating a Certificate with CA=TRUE
- From: benjamin10@xxxxxx (Benjamin)
- Differences in openssl 0.9.8 and 1.0.1x for private pem key file
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- Another record-breaking donation from Smartisan Technology
- From: stenn@xxxxxxx (Harlan Stenn)
- can I parse PKCS8 file and decrypt it later?
- From: bgiles@xxxxxxxxxxxxxx (Bear Giles)
- Does CVE-2014-3569 apply without the no-ssl3 build option
- From: zjedev@xxxxxxxxx (Zeke Evans)
- Another record-breaking donation from Smartisan Technology
- From: marquess@xxxxxxxxxxxxxxxxxxxxx (Steve Marquess)
- Does CVE-2014-3569 apply without the no-ssl3 build option
- From: kurt@xxxxxxxxx (Kurt Roeckx)
- gemalto smart card login
- From: malatesh10@xxxxxxxxx (Malatesh Ankasapur)
- Differences in openssl 0.9.8 and 1.0.1x for private pem key file
- From: jaya.nageswar@xxxxxxxxx (Jaya Nageswar)
- Does CVE-2014-3569 apply without the no-ssl3 build option
- From: zjedev@xxxxxxxxx (Zeke Evans)
- Why construct so wierd certificate chain for one web site
- From: oyljerry@xxxxxxxxx (Jerry OELoo)
- Why construct so wierd certificate chain for one web site
- From: matt@xxxxxxxxxxx (Matt Caswell)
- Why construct so wierd certificate chain for one web site
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Why construct so wierd certificate chain for one web site
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Why construct so wierd certificate chain for one web site
- From: oyljerry@xxxxxxxxx (Jerry OELoo)
- OpenSSL Release Strategy and Blog
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- OpenSSL Release Strategy and Blog
- From: matt@xxxxxxxxxxx (Matt Caswell)
- Problems verifying OCSP signatures
- From: richmoore44@xxxxxxxxx (Richard Moore)
- OpenSSL Release Strategy and Blog
- From: kurt@xxxxxxxxx (Kurt Roeckx)
- OpenSSL Release Strategy and Blog
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- OpenSSL Release Strategy and Blog
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- OpenSSL Release Strategy and Blog
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- OpenSSL Release Strategy and Blog
- From: kgoldman@xxxxxxxxxx (Ken Goldman)
- OpenSSL Release Strategy and Blog
- From: kgoldman@xxxxxxxxxx (Ken Goldman)
- OpenSSL Release Strategy and Blog
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- OpenSSL Release Strategy and Blog
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- OpenSSL Release Strategy and Blog
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- OpenSSL Release Strategy and Blog
- From: richmoore44@xxxxxxxxx (Richard Moore)
- OpenSSL Release Strategy and Blog
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- OpenSSL Release Strategy and Blog
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- OpenSSL Release Strategy and Blog
- From: kgoldman@xxxxxxxxxx (Ken Goldman)
- OpenSSL Release Strategy and Blog
- From: matt@xxxxxxxxxxx (Matt Caswell)
- OpenSSL 1.0.0 End Of Life Announcement
- From: openssl@xxxxxxxxxxx (OpenSSL)
- OpenSSL mail outage tomorrow 1200-1400UTC
- From: matt@xxxxxxxxxxx (Matt Caswell)
- OpenSSL mail outage tomorrow 1200-1400UTC
- From: philipp_subx@xxxxxxxxxxxxxxxxxxxxx (Philip Prindeville)
- OpenSSL mail outage tomorrow 1200-1400UTC
- From: marquess@xxxxxxxxxxxxxxxxxxxxx (Steve Marquess)
- How to display root certificate in command line
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- Differences in openssl 0.9.8 and 1.0.1x for private pem key file
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- How to display root certificate in command line
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- pkcs11 engine client side authentication
- From: 133mmx@xxxxxxxxx (Orc Erc)
- Differences in openssl 0.9.8 and 1.0.1x for private pem key file
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- How to display root certificate in command line
- From: oyljerry@xxxxxxxxx (Jerry OELoo)
- Differences in openssl 0.9.8 and 1.0.1x for private pem key file
- From: jaya.nageswar@xxxxxxxxx (Jaya Nageswar)
- Is there a public OpenSSL github with prebuilt binaries?
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- Is there a public OpenSSL github with prebuilt binaries?
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- Is there a public OpenSSL github with prebuilt binaries?
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Creating a Certificate with CA=TRUE
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Creating a Certificate with CA=TRUE
- From: benjamin10@xxxxxx (Benjamin Draxlbauer)
- Creating a Certificate with CA=TRUE
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- OpenSSL performance issue
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- OpenSSL performance issue
- From: steve@xxxxxxxxxxx (Dr. Stephen Henson)
- OpenSSL performance issue
- From: matt@xxxxxxxxxxx (Matt Caswell)
- OpenSSL performance issue
- From: reichert@xxxxxxxxxxx (Brian Reichert)
- Creating a Certificate with CA=TRUE
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- Creating a Certificate with CA=TRUE
- From: benjamin10@xxxxxx (Benjamin)
- OpenSSL performance issue
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- OpenSSL performance issue
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- OpenSSL performance issue
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- OpenSSL performance issue
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- OpenSSL performance issue
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- OpenSSL performance issue
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- OpenSSL performance issue
- From: prabhat.puroshottam@xxxxxxxxxxx (Prabhat Puroshottam)
- OpenSSL performance issue
- From: prabhat.puroshottam@xxxxxxxxxxx (Prabhat Puroshottam)
- OpenSSL performance issue
- From: prabhat.puroshottam@xxxxxxxxxxx (Prabhat Puroshottam)
- OpenSSL performance issue
- From: prabhat.puroshottam@xxxxxxxxxxx (Prabhat Puroshottam)
- OpenSSL performance issue
- From: prabhat.puroshottam@xxxxxxxxxxx (Prabhat Puroshottam)
- OpenSSL performance issue
- From: prabhat.puroshottam@xxxxxxxxxxx (Prabhat Puroshottam)
- OpenSSL performance issue
- From: kurt@xxxxxxxxx (Kurt Roeckx)
- OpenSSL performance issue
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- OpenSSL performance issue
- From: prabhat.puroshottam@xxxxxxxxxxx (Prabhat Puroshottam)
- Why can not get certificate chain if certificate expire
- From: richmoore44@xxxxxxxxx (Richard Moore)
- Why can not get certificate chain if certificate expire
- From: oyljerry@xxxxxxxxx (Jerry OELoo)
- Why can not get certificate chain if certificate expire
- From: richmoore44@xxxxxxxxx (Richard Moore)
- Why can not get certificate chain if certificate expire
- From: oyljerry@xxxxxxxxx (Jerry OELoo)
- Greetings from a new openssl user and the inevitable request for help
- From: Richard.Dwan@xxxxxxxx (Richard Dwan)
- Call for HP Proliant wizard
- From: marquess@xxxxxxxxxxx (Steve Marquess)
- CVE-2014- and OpenSSL?
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- How to get current using openssl version
- From: chris.bare@xxxxxxxxx (Chris Bare)
- How to get current using openssl version
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- How to get current using openssl version
- From: oyljerry@xxxxxxxxx (Jerry OELoo)
- Help with using a dynamic engine with SSL_CTX
- From: bwats9999@xxxxxxxxx (Brian Watson)
- CVE-2014- and OpenSSL?
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- CVE-2011-1473 fixed version
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- Help with using a dynamic engine with SSL_CTX
- From: thulasi.goriparthi@xxxxxxxxx (Thulasi Goriparthi)
- Error: A call to SSPI failed ...
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- CVE-2014- and OpenSSL?
- From: jb-openssl@xxxxxxxxxx (Jakob Bohm)
- eng_cryptodev question
- From: thevoog@xxxxxxx (Chris Eltervoog)
- Any way to create a large encrypted finish message?
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- Any way to create a large encrypted finish message?
- From: npentako@xxxxxxxxxxx (Vyas Pentakota)
- CVE-2011-1473 fixed version
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Using s_client under z/OS installation
- From: victor.savino@xxxxxxxxxxxx (Savino, Victor)
- Using s_client under z/OS installation
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- Using s_client under z/OS installation
- From: victor.savino@xxxxxxxxxxxx (Savino, Victor)
- Hashing public keys in EVP_PKEY's
- From: openssl-users@xxxxxxxxxxxx (Viktor Dukhovni)
- Hashing public keys in EVP_PKEY's
- From: jan.m.danielsson@xxxxxxxxx (Jan Danielsson)
- Error: A call to SSPI failed ...
- From: richmoore44@xxxxxxxxx (Richard Moore)
- CVE-2011-1473 fixed version
- From: matt@xxxxxxxxxxx (Matt Caswell)
- CVE-2011-1473 fixed version
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Any way to create a large encrypted finish message?
- From: thulasi.goriparthi@xxxxxxxxx (Thulasi Goriparthi)
- CVE-2011-1473 fixed version
- From: gayathri.annur@xxxxxxxxx (Gayathri Manoj)
- Any way to create a large encrypted finish message?
- From: thulasi.goriparthi@xxxxxxxxx (Thulasi Goriparthi)
- CVE-2011-1473 fixed version
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- CVE-2011-1473 fixed version
- From: gayathri.annur@xxxxxxxxx (Gayathri Manoj)
- Error: A call to SSPI failed ...
- From: KThirumal@xxxxxxxxxxxxx (Thirumal, Karthikeyan)
- What is release date for openssl 1.0.2
- From: matt@xxxxxxxxxxx (Matt Caswell)
- What is release date for openssl 1.0.2
- From: oyljerry@xxxxxxxxx (Jerry OELoo)
- Any way to create a large encrypted finish message?
- From: npentako@xxxxxxxxxxx (Vyas Pentakota)
- [openssl-dev] More POODLE issues
- From: kurt@xxxxxxxxx (Kurt Roeckx)
- [openssl-dev] More POODLE issues
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- More POODLE issues
- From: doctor@xxxxxxxxxxxxxxxxx (The Doctor)
- Help with using a dynamic engine with SSL_CTX
- From: bwats9999@xxxxxxxxx (Brian Watson)
- Help with using a dynamic engine with SSL_CTX
- From: bwats9999@xxxxxxxxx (Brian Watson)
- Help with using a dynamic engine with SSL_CTX
- From: beldmit@xxxxxxxxx (Dmitry Belyavsky)
- CVE-2014- and OpenSSL?
- From: arthur_tsang@xxxxxxxxxxx (Arthur Tsang)
- CVE-2014- and OpenSSL?
- From: matt@xxxxxxxxxxx (Matt Caswell)
- CVE-2014- and OpenSSL?
- From: amarendra.godbole@xxxxxxxxx (Amarendra Godbole)
- CVE-2014- and OpenSSL?
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- CVE-2014- and OpenSSL?
- From: noloader@xxxxxxxxx (Jeffrey Walton)
- Please unsubscribe me from these emails.
- From: tina.s.olson@xxxxxxxx (Olson, Tina S)
- CVE-2014- and OpenSSL?
- From: arthur_tsang@xxxxxxxxxxx (Arthur Tsang)
- Help with using a dynamic engine with SSL_CTX
- From: bwats9999@xxxxxxxxx (Brian Watson)
- Freeze to mailing list memberships
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- CVE-2014- and OpenSSL?
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- Help with using a dynamic engine with SSL_CTX
- From: beldmit@xxxxxxxxx (Dmitry Belyavsky)
- Freeze to mailing list memberships
- From: alvherre@xxxxxxxxxxxxxx (Alvaro Herrera)
- CVE-2014- and OpenSSL?
- From: rituparna.mitra@xxxxxx (Mitra, Rituparna (STSD))
- Help with using a dynamic engine with SSL_CTX
- From: bwats9999@xxxxxxxxx (Brian Watson)
- CVE-2014- and OpenSSL?
- From: rsalz@xxxxxxxxxx (Salz, Rich)
- CVE-2014- and OpenSSL?
- From: amarendra.godbole@xxxxxxxxx (Amarendra Godbole)
- Strange SSL_read behavior: 1/N-1
- From: Michael.Wojcik@xxxxxxxxxxxxxx (Michael Wojcik)
- Building a DLL that includes the FIPS static libraries
- From: graeme.perrow@xxxxxxx (Perrow, Graeme)
- Strange SSL_read behavior: 1/N-1
- From: dthompson@xxxxxxxxxxx (Dave Thompson)
- Strange SSL_read behavior
- From: hoomanfazaeli@xxxxxxxxx (Hooman Fazaeli)
- Freeze to mailing list memberships
- From: kurt@xxxxxxxxx (Kurt Roeckx)
- Freeze to mailing list memberships
- From: Walter.H@xxxxxxxxxxxxxxxxx (Walter H.)
- Freeze to mailing list memberships
- From: kurt@xxxxxxxxx (Kurt Roeckx)
- help clear up my misconception about s_client and protcols vs ciphersuites
- From: reichert@xxxxxxxxxxx (Brian Reichert)
- Freeze to mailing list memberships
- From: philipp_subx@xxxxxxxxxxxxxxxxxxxxx (Philip Prindeville)
- Freeze to mailing list memberships
- From: kurt@xxxxxxxxx (Kurt Roeckx)
- Freeze to mailing list memberships
- From: Walter.H@xxxxxxxxxxxxxxxxx (Walter H.)
- Freeze to mailing list memberships
- From: kurt@xxxxxxxxx (Kurt Roeckx)
- OpenSSL with 64bit Instruction-Set and libraries for Windows? (solved)
- From: weber@xxxxxxxxxxx (Christian Weber)
- Freeze to mailing list memberships
- From: 0.openssl@xxxxxx (TJ)
- OpenSSL with 64bit Instruction-Set and libraries for Windows?
- From: jeremy.farrell@xxxxxxxxxx (Jeremy Farrell)
- generate TLS OCSP responses for a time in the past using -attime not possible?
- From: matt@xxxxxxxxxxx (Matt Caswell)
- generate TLS OCSP responses for a time in the past using -attime not possible?
- From: Walter.H@xxxxxxxxxxxxxxxxx (Walter H.)
- generate TLS OCSP responses for a time in the past using -attime not possible?
- From: hablutzel1@xxxxxxxxx (Jaime Hablutzel Egoavil)
- generate TLS OCSP responses for a time in the past using -attime not possible?
- From: Thorsten.Albers@xxxxxxxxxx (Albers, Thorsten)
[Index of Archives]
[Linux Kernel Development]
[Security]
[Linux ARM Kernel]
[Linux MIPS]
[Linux S390]
[Bugtraq]
[Share Photos]>
[Fedora ARM]