Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-30 Thread Louis LeBlanc
Obviously I have misunderstood the manpage for RAND_bytes. What is says is: int RAND_bytes(unsigned char *buf, int num); int RAND_pseudo_bytes(unsigned char *buf, int num); DESCRIPTION RAND_bytes() puts num cryptographically strong pseudo-random bytes into buf. An error o

Re: certificate verify fails

2000-06-30 Thread Arun Venkataraman
In the future, please do not post such user problems to the developer mailing list. (Should this be a faq :) I am hazarding a guess here. It seems you me that you are trying to use the sample cert supplied with the demo. Note that this is just a dummy certificate and not signed by a "real" CA. Is

Re: Error in handshake: Get client hello B

2000-06-30 Thread Arun Venkataraman
We have a similar application where we reuse a pool of SSL connections. The only difference between our approach and yours is the following piece of code which we execute before reusing an already used SSL structure. SSL_set_session(ssl, NULL); Can you try this and see if the problem recurs? We

access of passphrases

2000-06-30 Thread Cico, Michael
Hi folks, I'm a rookie on OpenSSL and security stuff in general, and I think I can now officially classify myself as knowing just enough to be dangerous. Here's my situation. We're trying to do one-way authentication between a Servlet on one machine and a C++ CGI on the other. I have chosen

Re: MDC2 block size

2000-06-30 Thread Pete Chown
Burger, Kobus K wrote: > I have noticed a couple of discrepancies between mainframe support for MDC2 > and OpenSSL's support: > > * Mainframe supports MDC2 with various keys (The documentation notes that > the default key is the same as the one used by OpenSSL) - Openssl has a > single key hard

PRNG facilities function?

2000-06-30 Thread Nick Sayer
I am fixing my pine+ssl hack to seed the PRNG. My development platform is FreeBSD, so I never noticed a problem, since it has a /dev/random. I plan on doing something like a 'ls /' and sending that into the PRNG along with the time, pid, ppid, uid and any other metrics I can get my hands on, but

Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-30 Thread Richard Levitte - VMS Whacker
From: Louis LeBlanc <[EMAIL PROTECTED]> leblanc> Anyway, this is what I did: leblanc> unsigned char entropy[4096]; [...] leblanc> RAND_bytes(entropy, 4000); leblanc> RAND_seed(entropy, 3000); And what do you think this gives you? Have you actually thought of checking the returned status code?

Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-30 Thread Brian Hatch
> Anyway, this is what I did: > unsigned char entropy[4096]; > > /* Then I call the SSL_load_error_strings() and > OpenSSL_add_all_algorithms() > * routines, and create my context. Then, . . . > */ > > RAND_bytes(entropy, 4000); > RAND_seed(entropy, 3000); you've just seeded with bytes g

Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-30 Thread Brian Hatch
> My code miraculously worked without modification when building against > 0.9.4. > 0.9.5a and the snapshot broke the same code at the handshake, giving the > 'PRNG not seeded' message. ... > the cert creation and translation tests and > suggested that I set the RANDFILE environment variable

Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-30 Thread Ulf Moeller
On Fri, Jun 30, 2000, Louis LeBlanc wrote: > RAND_bytes(entropy, 4000); > RAND_seed(entropy, 3000); > /* just giving myself some room until the code is working */ > > And everything works. No, nothing works, as you would have noticed, had you checked the RAND_bytes() return value. You still

Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-30 Thread Louis LeBlanc
Thank you so much. Your message cleared up a problem I wrestled with for some time. Once you pointed me in the right direction, I found everything in the manpages, and it all fell into context (I have to admit to being a little thick from time to time :). Anyway, this is what I did: unsigned ch

Re: ATT: Robert Sandilands! (was Re: client authentication)

2000-06-30 Thread Robert Sandilands
I tested it under RedHat Linux 6.2 and Windows 9x. It worked for me :-} The RAND_??? functions is to make sure that there is a sufficients source of random numbers for generating the random session keys for SSL. The functions with "verify" in them is there to tell the server or client where the p

Re: ATT: Robert Sandilands! (was Re: client authentication)

2000-06-30 Thread Albert Serra
Does it work? Because what exact commands do you have to add if you want client authentication on serv.cpp and cli.cpp? I have tried it following the code I have found on sslcli.cpp and sslsrv.cpp and it doen't work. If somenone wants to help me, (I work on a Sun WS) , what is the mean of RAND_lo

Re: Does anyone know how to fix Multithreading??

2000-06-30 Thread Bodo Moeller
On Tue, Jun 27, 2000 at 02:54:04PM -0400, Bill Rebey wrote: > The product is a poor man's software VPN. A Server (the thing I'm writing) > accepts local, clear connections, consults a routing table that is part of > that Server's configuration, sets up an SSL connection with another Server > as

RE: memory leaks in openssl - urgent.......

2000-06-30 Thread DeJuan Jackson
ditto[on experiencing memory leaks, and using those free functions] Bounds Checker output not included - although my mem-leaks aren't nearly as bad as Raggi's, but hey I'm using Bio's. -Original Message-From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]Sent: Friday, June 30, 200

RE: memory leaks in openssl - urgent.......

2000-06-30 Thread raggi
Hi all I have also been receiving numerous copies of each message posted for the 24 hours... I just wanted to add my BoundsChecker printout to the pool, I am also trying to eliminate memory leaks from my app. If I find something out I will let you know. BTW Arora : i am calling the same function

viewing added oid

2000-06-30 Thread Arnaud De Timmerman
hi, How can I be sure that oid I'm trying to add to my certificate, are actually added ? What's the openssl command to use ? Will my added oids appear somewhere in these lines : ** subject=/C=FR/ST=Nord/O=Org/CN=mycn/Email=myemail issuer= /C=FR/ST=Nord/O=Orgi/CN=root

Re: memory leaks in openssl - urgent.......

2000-06-30 Thread John Hartnup
On Thu, Jun 29, 2000 at 11:13:43PM +0200, Richard Levitte - VMS Whacker wrote: > Hey! > > Repeating your message x times doesn't solve anything. On the > contrary, it may piss people off, and then I'll just say "happy > isolation!" to you. I got this message twice... but I'm going to assume it

Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-30 Thread Richard Levitte - VMS Whacker
From: Louis LeBlanc <[EMAIL PROTECTED]> leblanc> The project involved an https load generator - primarily used leblanc> for correctness testing of another project. I had the worst leblanc> time getting the initial handshake to work. The dreaded leblanc> 'PRNG not seeded' message kept plaguing m

MDC2 block size

2000-06-30 Thread Burger, Kobus K
Title: MDC2 block size Hi folks, (I am not subscribed to the list, so please reply directly) I am trying to use openssl on Solaris to checksum files coming from an IBM mainframe.  The only function that exists on both platforms is the MDC2 checksum. I have noticed a couple of discrepancie