TLS application data MAC

2004-09-14 Thread Avinash Agarwal
Hello all, I'm trying to figure out how to generate the MAC for application data in TLS v1. The rfc (2246) says at ยง F.2 "protecting application data" "Outgoing data is protected with a MAC before transmission. To prevent message replay or modification attacks, the MAC is computed from the

Regd ASN1_ITEM_rptr( )

2004-09-14 Thread Sravan
Hi, I have been using X509 related functions in my code and for the definitions of functions like X509_free( ), I am using the macro IMPLEMENT_ASN1_FUNCTIONS(X509). In that macro expansion, ASN1_ITEM_rptr(X509) is used which expands to X509_it( ). I couldn't get the definition of this function

Re: Newbie questions update ....

2004-09-14 Thread Steve Ankeny
Exactly right! "openssl s_client -CAfile demoCA/cacert -connect server.net:443" This returns no errors. However, I still get the following when I try to connect from Mozilla. "The connection was refused when trying to contact 192.168.1.103" Stupid me! I was using "http://";! It works perfectly wi

Re: Newbie questions update ....

2004-09-14 Thread Dr. Stephen Henson
On Tue, Sep 14, 2004, Steve Ankeny wrote: > Here's the commands I used to create my own CA and my own certificate > and key > > "CA.pl -newca" > "CA.pl -newreq" > "CA.pl -signreq" > > Everything went well (no errors), and I wound up with newcert.pem and > newreq.pem (as well as cacert.pem

Re: Newbie questions update ....

2004-09-14 Thread Steve Ankeny
Here's the commands I used to create my own CA and my own certificate and key "CA.pl -newca" "CA.pl -newreq" "CA.pl -signreq" Everything went well (no errors), and I wound up with newcert.pem and newreq.pem (as well as cacert.pem as expected). I renamed newcert.pem and newreq.pem to help i