Davy Durham wrote:
I'm really naive about encryption if you couldn't tell already.
Where are some online resources that explain in plain terms what SSL
uses (i.e. RSA, DSA, IDEA, RC4,.. ) I ready the informative 2
documents already:
http://www.openssl.org/docs/HOWTO/keys.txt and
http://www.o
I got it.
http://marc.theaimsgroup.com/?l=openssl-users
Thanks,
Anil
From: [EMAIL PROTECTED] on behalf of Anil Punjabi
Sent: Thu 5/20/2004 12:08 PM
To: [EMAIL PROTECTED]
Subject: Archives & web interface for SSL-User group
Hi all,
Is there a way I can acces
Hi all,
Is there a way I can access the old archived SSL-User messages?
Also, is there a web based interface to it, where all messages on one topic are
grouped together.
Any suggestions to achieve such results would be appreciated.
Thanks,
Anil
O'Reilly's "Network Security with OpenSSL"
http://www.oreilly.com/catalog/openssl/index.html
Scott
Anil Punjabi wrote:
Hi Scott,
Just curious - what book are you using?
Thanks,
Anil
*From:* [EMAIL PROTECTED] on behalf of
Hi,
How should I use the PKCS5 padding for TDESede_cbc_encrypt ()?
i.e: What is the function in openssl corresponding to
DESede/CBC/PKCS5Padding of java/Bouncy Castle
Thanks,
GuruGnanam Subramanian,
iNautix Technologies, Chennai, India
Tel: 91-44-2254 6000 Ext: 1099
__
Hi Scott,
Just curious - what book are you using?
Thanks,
Anil
From: [EMAIL PROTECTED] on behalf of Scott Morgan
Sent: Thu 5/20/2004 7:46 AM
To: [EMAIL PROTECTED]
Subject: BIO_do_connect fails
I'm new to sockets programming and OpenSSL so I'm expecting th
But, If I use first the PKCS7_sign() function and after that I use
PKCS7_encrypt(), then how do I obtain after the original data?. That is, I
use PKCS7_decrypt() to obtain the signed message in a bio (out), and after
that I'm doing the next:
PKCS7 *signed_content=PKCS7_new();
d2i_PKCS7
You can generate your own certificates with OpenSSL, but you
need to either get your root certificate into every piece of
"verifying software" (browser), or else get all your users to
manually accept each certificate, which greatly reduces
security (because, with no way to know any better, they wil
Openssl has a command line utility (openssl). Use it to build your
certificate.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of Ryan Schefke
Sent: Thursday, May 20, 2004 7:14 AM
To: [EMAIL PROTECTED]; 'Ryan Schefke'
Subject: Please Don't Shoot
Me for as
I'm new to sockets programming and OpenSSL so I'm expecting this to be a
mistake on my part.
Most the time I'm able to setup basic SSL comms without a problem,
pretty much following the code in the OpenSSL book. However I've been
running some tests with a lot of repeated open/closing of connect
Me for asking this question, I'm just not sure where to start but with the
experts here.
I'm moving my PHP and MySQL application to a hosting server. Currently, I'm
looking at 1and1.com's dedicated servers on a Linux machine for $49/month
(let me know if there are better choices). One problem
You usually need JSSE to secure your session - i.e. authenticate the message endpoints
and ecnrypt / decrypt the message. JSSE makes use of JCE under the cover. Hence if
you need more information of the cryptographic capabilities of your Java Runtime you
need
to look into the docs of your JCE prov
But, If I use first the PKCS7_sign() function and after that I use
PKCS7_encrypt(), then how do I obtain after the original data?. That is, I
use PKCS7_decrypt() to obtain the signed message in a bio (out), and after
that I'm doing the next:
PKCS7 *signed_content=PKCS7_new();
d2i_PKCS7_bio
13 matches
Mail list logo