If you are using OpenSSL then you must pass in the native sockets to the OpenSSL BIOs.
The BIOs as they are called are the abstracted version of the I/O descriptor used to
access the socket by the SSL library.
You are not going to get out of coding for the platform specific connection/listen,
- Original Message -
From: "Kenneth R. Robinette" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, January 26, 2004 2:46 PM
Subject: Re: Playing nice between OpenSSL and Microsoft libraries with 3DES
pass phrases?
> Do yourself a favor and just have one of the OpenSSL crypto ex
Do yourself a favor and just have one of the OpenSSL crypto experts
do the function on a consulting basis. Will save you a lot of time,
and misery! And it will be crypto correct.
Ken
> > There are a few other complications which you may not be aware of.
>
> But I am terrified that they exis
> There are a few other complications which you may not be aware of.
But I am terrified that they exist. I'm a generic multiplatform network
applications type, not a crypto geek.
> Under CryptoAPI you can't directly set the actual key. There are various
> tricks involving things like exponent of
On Mon, Jan 26, 2004, Andrew H. Derbyshire wrote:
> I have a requirement to implement cross-platform 3DES encryption (driven by
> a text pass phrase) between Microsoft and various UNIX platforms.Both
> platforms use the vendor supplied libraries: In the case of UNIX that's
> OpenSSL, and in th
Markus Lorch wrote:
Marton,
I think your card is simply slow. I've done similar test (RSA only)
using an IBM 2058 eServer Cryptographic Accelerator (ICA), which has
5 ultracyper crypto processors on it.
The machine is a dual xeon 2.4 box running Linux 2.4.20
I used openssl 0.9.7b with IBM's ibmc
I have a requirement to implement cross-platform 3DES encryption (driven by
a text pass phrase) between Microsoft and various UNIX platforms.Both
platforms use the vendor supplied libraries: In the case of UNIX that's
OpenSSL, and in the case of Microsoft it's the Windows routines declared by
.
Just for curiosity, why openssl checks revocation status of the
certificate before checking whether it has expired or not? E.g. if one
certificate in a certificate chain has expired then X509_verify_cert
should fail (which it actually does), but before failing it checks the
revocation status. I
What if my cert happened to expire 1 month later? Would that mean if someone
did compromise my cert and sent signed e-mails before it expired (but
*after* I added to the CRL), then after it expires, that signed e-mail
would appear VALID - as it wouldn't be in the CRL anymore?
No, it will be in the
I am developing a software which will make use of the AEP Sureware KeyPer. I
don't have one for testing pusrposes, but I know that the AEP Sureware
KeyPer has a PKCS#11 interface, so what I am doing now is developing my
software using the PKCS#11 engine, testing it with a smartcard. I've seen
that
10 matches
Mail list logo