Apr 16, 2014
TLSSLed | Penetration Testing Tools The current tests include checking if the target supports the SSLv2 protocol, the NULL cipher, weak ciphers based on their key length (40 or 56 bits), the availability of strong ciphers (like AES), if the digital certificate is MD5 signed, and the current SSL/TLS renegotiation capabilities. openssl version: OpenSSL 1.0.1e 11 Feb 2013 Version of OpenSSL being used - Unix Aug 17, 2012 [Resolved] Unable to configure openssl, libcrypto not
Nov 14, 2016
[Bug 603] configure: error: OpenSSL version header not found [Bug 603] configure: error: OpenSSL version header not found bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org Thu Jun 26 04:18:35 EST 2003. Previous message: [Bug 601] configure script doesen't setup preprocessor flags properly Next message: [Bug 604] ld: fatal: Symbol referencing errors. No output written to ssh-add How do I know if I'm using OpenSSL? Apr 16, 2014
A OpenSSL 1.0.2 is not and will fall back to secp384r1. A OpenSSL 1.1.1 server is also smart enough to detect the right curve from the server certificate and will use the secp512r1. A OpenSSL 1.0.2 server will fallback to sec384r1. So with a openssl 1.0.2/1.1.1 client vs 1.0.2 server you end up with secp384r1.
Mar 22, 2015 How to check TLS version on a Linux box - Spiceworks