Re: Odd handshake deadlock..

2005-04-28 Thread Pablo J Royo
I think you can try s_client program, in apps directory. Using it, you can write "ssl on" after SSL negotiation and see what happens. If it works, you can use it to build your program. It has all you need. __ OpenSSL Project

Odd handshake deadlock..

2005-04-28 Thread Ray Russell Reese III
More than likely, the problem stems from my novice understanding as to how BIOs work, however I have a very puzzling problem. I'm currently writing a client/server application, client written in C for speed (will be invoked several times a second), and server is written in Java. I want the client t

Re: CPU horsepower needed to run openssl

2005-04-28 Thread ray v
I don't know if this will help but here are some stats from our humble little server. Hardware: 2 3gig xeon cpu's 2 gig ram 70 gig hardware raid 1 Linux AS 3 We can generate 1 certificate(1024 bits key length) at .02 seconds per certificate. It would probably be faster if we didn't create the p

Re: FW: openssl verify conflicts with SSL_connect

2005-04-28 Thread Dr. Stephen Henson
On Thu, Apr 28, 2005, John Hoel wrote: > I have been doing that all along. That's what is so exasperating - following > insructions doesn't seem to help. (arghh! head banging). That's the 2nd > function argument. 3rd argument is NULL (not using CAdir). > > The file passed to SSL_CTX_use_certifi

RE: FW: openssl verify conflicts with SSL_connect

2005-04-28 Thread John Hoel
I have been doing that all along. That's what is so exasperating - following insructions doesn't seem to help. (arghh! head banging). That's the 2nd function argument. 3rd argument is NULL (not using CAdir). The file passed to SSL_CTX_use_certificate_chain_file() is client.pem. BTW - I tried t

Re: FW: openssl verify conflicts with SSL_connect

2005-04-28 Thread Dr. Stephen Henson
On Thu, Apr 28, 2005, John Hoel wrote: > To include it in the trusted store, I think I will need to hash it and the > 'root.pem' file as well. I haven't been able to find anything describing how > this is done. Can you refer me to something? > You just keep root.pem as it is and pass it in the C

RE: SSLVerifyClient

2005-04-28 Thread Sven Löschner
Okay, my certs are looking okay now (if i want to believe "openssl verify"). But still no chance to get in. Now it says after "GET /demo/index.html HTTP/1.0": SSL_connect:SSL renegotiate ciphers SSL_connect:SSLv3 write client hello A SSL_connect:SSLv3 read server hello A depth=1 /C=DE/ST=test/L=

RE: FW: openssl verify conflicts with SSL_connect

2005-04-28 Thread John Hoel
To include it in the trusted store, I think I will need to hash it and the 'root.pem' file as well. I haven't been able to find anything describing how this is done. Can you refer me to something? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Dr. Stephen

Re: SSLVerifyClient

2005-04-28 Thread Dr. Stephen Henson
On Thu, Apr 28, 2005, Sven Löschner wrote: > Okay, first I changed the ns-entries with keyusage, then i put them in both. > None of these works: > > Server: > > X509v3 extensions: > X509v3 Basic Constraints: > CA:FALSE > Netscape Cert Type: > SSL

RE: SSLVerifyClient

2005-04-28 Thread Sven Löschner
Okay, first I changed the ns-entries with keyusage, then i put them in both. None of these works: Server: X509v3 extensions: X509v3 Basic Constraints: CA:FALSE Netscape Cert Type: SSL Server X509v3 Key Usage: Certificate Sig

RE: SSLVerifyClient

2005-04-28 Thread David C. Partridge
Also I'm surprised to see V3 cert with no KeyUsage section ... It would also would be more normal to use Extended Key Usage to say it is good for SSL Server etc. rather than use the old NetScape Cert Type ... Dave -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Beh

RE: SSLVerifyClient

2005-04-28 Thread David C. Partridge
X509v3 extensions: X509v3 Basic Constraints: CA:FALSE Netscape Cert Type: SSL Client, S/MIME Netscape Comment: OpenSSL Generated Certificate is why it is failing. The server certificate needs: X509v3 extensions:

RE: SSLVerifyClient

2005-04-28 Thread Sven Löschner
> If you can post the output of: > > openssl x509 -in cert.pem -text -noout Okay, this comes out with the server.pem (I shortend the Algorithm-Tables with "...": Certificate: Data: Version: 3 (0x2) Serial Number: 4 (0x4) Signature Algorithm: md5WithRSAEncryption

Re: SSLVerifyClient

2005-04-28 Thread Dr. Stephen Henson
On Thu, Apr 28, 2005, Sven Löschner wrote: > > could you verify this with > > openssl verify -CAfile cacert.pem -purpose sslserver server.pem and while > you at it: > > openssl verify -CAfile cacert.pem -purpose sslclient user.pem > > > I guess i should look at my Server-Cert, because with "open

RE: SSLVerifyClient

2005-04-28 Thread Sven Löschner
> could you verify this with > openssl verify -CAfile cacert.pem -purpose sslserver server.pem and while you at it: > openssl verify -CAfile cacert.pem -purpose sslclient user.pem I guess i should look at my Server-Cert, because with "openssl verify -CAfile cacert.pem -purpose sslserver server.pe

Re: SSLVerifyClient

2005-04-28 Thread Goetz Babin-Ebell
Sven Löschner wrote: What result do you get by an openssl s_client -connect test.net:443 \ -CAfile cacert.pem -verify 5 \ -cert user.pem -key user.key \ -reconnect -showcerts -state -bugs ? with a input GET /demo/index.html HTTP/1.0 I get: SSL_connect:SSL renegotiate

Re: Smime and aes decryption corruption

2005-04-28 Thread Dr. Stephen Henson
On Thu, Apr 28, 2005, Alex Heatley wrote: > Dr. Stephen Henson wrote: > > >Yes I can reproduce your problem. I've applied a fix to OpenSSL and it will > >appear in the next stable snapshot and 0.9.7h onwards. > > > >Thanks for the report. > > Many thanks. We are quite keen to get the patch, what

Re: How to link statically openssl in a dylib

2005-04-28 Thread Qadeer Baig
Hi Rush, Your solution has been very helpful. > (2) does the correct thing. It statically links against your version of > libssl.a. It also acts just like it found the library because of a -lssl > on the linker command line. (Only the functions that are required are > pulled into your executable,

EVP_PKEY_get1_RSA

2005-04-28 Thread Tan Eng Ten
Hi, I need to set app data to an RSA object encapsulated in an EVP_PKEY, so I did the following: void set_app_data(EVP_PKEY *pkey) { ... rsa = EVP_PKEY_get1_RSA(pkey); RSA_set_app_data(rsa, app_data); RSA_free(rsa); ... } We shouldn't access pkey->pkey.rs

RE: SSLVerifyClient

2005-04-28 Thread Sven Löschner
> What result do you get by an > openssl s_client -connect test.net:443 \ > -CAfile cacert.pem -verify 5 \ > -cert user.pem -key user.key \ > -reconnect -showcerts -state -bugs > > ? > > with a input > GET /demo/index.html HTTP/1.0 I get: SSL_connect:SSL rene