> I get a PRNG_NOT_SEEDED error even after i call
> RAND_add() function. I am calling the function at the
> begining before SSL initialization.
...
> unsigned long Time=time(NULL);
>
> RAND_add(&Time,sizeof(Time),0);
You should call RAND_status which returns true/false to tell you
if you
hi,
I get a PRNG_NOT_SEEDED error even after i call
RAND_add() function. I am calling the function at the
begining before SSL initialization.
Here is my sample client running on embedded board
(ThreadX os).
void ssl_client (void)
{
int err;
int sd;
struct sockaddr_in sa;
SSL_CTX* ctx;
Tried to contact Jim Ramsay offline but ran into a very vicious spam
killer which seemed to be broken when I followed his directions for
bypassing it.
I am interested in hearing from people doing peer to peer communications
(like email) using certificates from a non-trivial certificate
heirarchy (
Probably. Go to tools->internet options->content->certificates->personal Click view then certificate path
Mark Liu <[EMAIL PROTECTED]>
Sent by: [EMAIL PROTECTED]
03/14/03 09:24 PM
Please respond to openssl-users
To: [EMAIL PROTECTED]
cc:
Subje
That helped a lot! Thanks, Greg!
Michelle
On Fri, 14 Mar 2003, Gregory Stark wrote:
>
> - Original Message -
> From: "Michelle Li" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Wednesday, March 12, 2003 9:38 AM
> Subject: RSA padding scheme, plz help!
>
>
> > On the card, the
Thank you all friends for your suggestions.
I'll try some of them and i'll be back for results ;-)
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTE
http://www.aleksey.com/xmlsec/bart.gif
Aleksey
Rich Salz wrote:
openssl/crypto/sha/ refers the functions: SHA1_Init(), SHA1_Update() &
SHA1_Final(), but there seems to be no reference of their definition
in the source.
"man grep"
I guarantee that the functions are there.
/r$
openssl/crypto/sha/ refers the functions: SHA1_Init(), SHA1_Update() &
SHA1_Final(), but there seems to be no reference of their definition in
the source.
"man grep"
I guarantee that the functions are there.
/r$
__
OpenSS
On Mon, Mar 17, 2003, Moerk, Michael wrote:
> I have created a self-signed certificate with OpenSSL. I would like to be
> able to import the certificate into Internet Explorer without user
> intervention (the client and server are the same box). Does anyone know how
> to import a certificate in
Sorry for the double hit last time.
openssl/crypto/sha/ refers the functions: SHA1_Init(), SHA1_Update() &
SHA1_Final(), but there seems to be no reference of their definition in the source.
Help appreciated..
Rich Salz <[EMAIL PROTECTED]> wrote:
Nikhil Chauhan wrote:> Does anyone know a freely
Ben:
I don't know if the utility works. (Sorta hoping for some confirmation on
that.) I suppose it does. I also don't know how complicated it is to
run. The user who volunteered to test it was happier downloading Mozilla
with which there is no problem. Now he's up and running I doubt I'll b
On Mon, Mar 17, 2003, Nils Larsch wrote:
> Kocsis Peter wrote:
> > HEllo!
> >
> > I am a newby, and I need some help. A want to check,
> > whether the certificate is signed by the provided key.
> > I generate both the key (firstly RSA) and the certificate.
> >
> > I generate an RSA-key, assign it
I have created a self-signed certificate with OpenSSL. I would like to be able to
import the certificate into Internet Explorer without user intervention (the client
and server are the same box). Does anyone know how to import a certificate in an
automated fashion, without the user having to p
This is a different vulnerability. The one you patched two weeks ago
was caused by a failure to decrypt messages when the MAC comparison
failed. This vulnerability is a timing attack against the RSA algorithms.
The Slashdot discussion is here:
http://slashdot.org/article.pl?sid=03/03/14/0012
I ran into a small snag using OpenSSL for email encrypting,
whether I use it from inside mutt or standalone.
I received a signed email from my test account (using a free
thawte email cert). I saved the corresponding cert in the place
necessary for mutt to use it for encryption. Mutt simply throw
Hi,
I'm using Openssl to perform Encryption / Decryption operations in PKCS#7
format.
I use the API set PKCS7_ ...
I have to set a particular IV for the interoperability with an external
product. What can I do?
Can I set an IV in PKCS_encode / decode or I have to use lower level api
like EVP_ciphe
Is this a new advisory. I've patched for a previous timing attack 2
weeks ago.
On Mon, 2003-03-17 at 03:47, Ben Laurie wrote:
> I expect a release to follow shortly.
>
> --
> http://www.apache-ssl.org/ben.html http://www.thebunker.net/
>
> "There is no limit to what a man can do or how fa
On Mon, Mar 17, 2003, luke wrote:
>
> i have try many times.
> i got the same error message.
> ==
> perl Configure VC-WIN32
> .\ms\do_nt.bat
> nmake -f .\ms\nt.mak
>
> ps .net vc++(vc++ v7)
>
> .
> ui_compat.c
> cl /Fotmp32\krb5_asn.obj
On Mon, Mar 17, 2003, Aonzo Emanuele wrote:
> Hi,
> I'm using Openssl to perform Encryption / Decryption operations in PKCS#7
> format.
> I use the API set PKCS7_ ...
> I have to set a particular IV for the interoperability with an external
> product. What can I do?
> Can I set an IV in PKCS_enco
On Mon, Mar 17, 2003, Krause, Helga wrote:
> Hello,
> does anybody know how to use the options "crl_check" and "crl_check_all"
> with the command
> "openssl smime" correctly?
Erm yes: I wrote that bit :-)
You have to add a CRL to either the file mentioned with the -CAfile option or
the director
i have try many times.
i got the same error message.
==
perl Configure VC-WIN32
.\ms\do_nt.bat
nmake -f .\ms\nt.mak
ps .net vc++(vc++ v7)
.
ui_compat.c
cl /Fotmp32\krb5_asn.obj -Iinc32 -Itmp32 /MD /W3 /WX /G5 /Ox /O2
/Ob2 /
Gs0 /GF /Gy
Hello,
I'm tryng to use openssl to encrypt and decrypt some messages.
I don't use sockets because I must incapsulate my packet.
I do well the TLS handshake, and now I want decrypt the message I capture with pcap
and encrypt the message I send with libnet.
I have try with SSL_read and SSL_write bu
Hi,
I'm using Openssl to perform Encryption / Decryption operations in PKCS#7
format.
I use the API set PKCS7_ ...
I have to set a particular IV for the interoperability with an external
product. What can I do?
Can I set an IV in PKCS_encode / decode or I have to use lower level api
like EVP_ciphe
Hello,
does anybody know how to use
the options "crl_check" and "crl_check_all" with the command
"openssl smime" correctly?
Is it only used within a
verification process?
Which certificates is it
taking for a comparison in a given crl?
Access to a crl saved in a
file resulted in an e
Hi Ben Laurie,
Do you mean that there would be a release (say 0.9.6j and 0.9.7b) with this
patch included.
Regards,
Umesh
Ben Laurie wrote:
>
> I expect a release to follow shortly.
>
> --
> http://www.apache-ssl.org/ben.html http://www.thebunker.net/
>
> "There is no limit to what a man
I expect a release to follow shortly.
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
OpenSSL v0.9.7a and 0.9.6i vulnerability
-
26 matches
Mail list logo