Hello all,
I'm trying to figure out how to generate the MAC for application data in TLS
v1.
The rfc (2246) says at ยง F.2 "protecting application data"
"Outgoing data is protected with a MAC before transmission. To prevent
message replay or modification attacks, the MAC is computed from the
Hi,
I have been using X509 related functions in my code and for the
definitions of functions like X509_free( ), I am using the macro
IMPLEMENT_ASN1_FUNCTIONS(X509). In that macro expansion,
ASN1_ITEM_rptr(X509) is used which expands to X509_it( ). I couldn't get
the definition of this function
Exactly right!
"openssl s_client -CAfile demoCA/cacert -connect server.net:443"
This returns no errors.
However, I still get the following when I try to connect from Mozilla.
"The connection was refused when trying to contact 192.168.1.103"
Stupid me! I was using "http://";! It works perfectly wi
On Tue, Sep 14, 2004, Steve Ankeny wrote:
> Here's the commands I used to create my own CA and my own certificate
> and key
>
> "CA.pl -newca"
> "CA.pl -newreq"
> "CA.pl -signreq"
>
> Everything went well (no errors), and I wound up with newcert.pem and
> newreq.pem (as well as cacert.pem
Here's the commands I used to create my own CA and my own certificate
and key
"CA.pl -newca"
"CA.pl -newreq"
"CA.pl -signreq"
Everything went well (no errors), and I wound up with newcert.pem and
newreq.pem (as well as cacert.pem as expected).
I renamed newcert.pem and newreq.pem to help i