Re: RSA key sizes

2005-08-16 Thread Victor Duchovni
On Wed, Aug 17, 2005 at 02:21:30PM +0800, Tan Eng Ten wrote: > This is a general crypto question and I hope someone could help me > out. > > Often we use RSA of 512, 1024, 2048, 4096, etc. bit lengths. Are > other sizes such as 520/1045 bit "valid"? Mathematically, it sh

RSA key sizes

2005-08-16 Thread Tan Eng Ten
Hi all, This is a general crypto question and I hope someone could help me out. Often we use RSA of 512, 1024, 2048, 4096, etc. bit lengths. Are other sizes such as 520/1045 bit "valid"? Mathematically, it should work, but are there reasons why odd sizes are not to be used? _

please help me on OCSP

2005-08-16 Thread varma d
Hi,  Today i was very much excited to see this mailing list on openSSL. I searched several messages and its great to see that people here are helping others.I need your help.  I read tutorials on OCSP from http://openvalidation.org about using OCSP in openssl,I have couple of questions. 1) I used t

Engine implementation problem

2005-08-16 Thread Jean Everson Martina
Hi all, We are coding an engine to work with a crypto device we are developing. Our crypto hardware work on a two level basis. We have the crypto hardware direct connected to a soekris (net4801), running a custom OpenBSD and a key management application. We already have a front end to conne

RE: certificate embedded into the executable

2005-08-16 Thread David Schwartz
> David Schwartz wrote: > >>Dr. Stephen Henson wrote: > > > >>A determined and knowledgable attacker can subvert anything that's > >>not in hardware. > > > > I think this is a very strange thing to say. If he has access to the > > hardware, he can subvert it too. If he doesn't have access to

Re: certificate embedded into the executable

2005-08-16 Thread Bear Giles
David Schwartz wrote: >>Dr. Stephen Henson wrote: > >>A determined and knowledgable attacker can subvert anything that's >>not in hardware. > > I think this is a very strange thing to say. If he has access to the > hardware, he can subvert it too. If he doesn't have access to the hardware, >

Re: OpenSSL on VxWorks

2005-08-16 Thread kyran
One more try... anyone? :-) K - Original Message - From: [EMAIL PROTECTED] To: openssl-users@openssl.org Subject: Re: OpenSSL on VxWorks Date: Sat, 13 Aug 2005 13:01:55 -0500 > > From what I've read about it, this error seems to > indicate that the server certificate could not be > ve

Re: certificate embedded into the executable

2005-08-16 Thread Bear Giles
David Schwartz wrote: > %.h: %.pem > xxd -i $< > $@ That's compile time so it's not quite as flexible as the link time command. Why does this matter? You might have a situation where the source code is managed by one group without access to the PKI objects, and the PKI objects are managed

Re: certificate embedded into the executable

2005-08-16 Thread Dr. Stephen Henson
On Tue, Aug 16, 2005, David Schwartz wrote: > > > Dr. Stephen Henson wrote: > > > A determined and knowledgable attacker can subvert anything that's > > not in hardware. > > I think this is a very strange thing to say. If he has access to the > hardware, he can subvert it too. If he doesn

RE: certificate embedded into the executable

2005-08-16 Thread David Schwartz
> Dr. Stephen Henson wrote: > A determined and knowledgable attacker can subvert anything that's > not in hardware. I think this is a very strange thing to say. If he has access to the hardware, he can subvert it too. If he doesn't have access to the hardware, how can he subvert the soft

RE: certificate embedded into the executable

2005-08-16 Thread David Schwartz
> cert.o: cert.pem > ld -o $@ (flags) $< Or even: %.h: %.pem xxd -i $< > $@ DS __ OpenSSL Project http://www.openssl.org User Support Mailing List

Re: certificate embedded into the executable

2005-08-16 Thread Bear Giles
Dr. Stephen Henson wrote: > Depends on whether you want it embedded in the executable after it has been > linked or at compile time, i.e. embedded in a C source file. I think this is slightly off, but at link time (using the gnu tool chain) you can use: ld -b binary -r -o root.o root.pem then

Re: Can OpenSSL be built as static libs?

2005-08-16 Thread Qadeer Baig
Yes, Read INSTALL.XX file available with the source. On 8/14/05, Edward Chan <[EMAIL PROTECTED]> wrote: > > > I was wondering if OpenSSL can be built as static libs as I don't want > people to be able to simply replace the dll's with their own. > > Thanks, > Ed __

RSA key generation

2005-08-16 Thread nicolas mivielle
oï guys, Is it possible to choose how to generate RSA key ?? I think that the default mode uses the Chinese remainder theorem but I'm really not sure about that... can you confirm ?? Thanx, Nicolas Mivielle ferias de Dax forever _

Re: certificate embedded into the executable

2005-08-16 Thread Dr. Stephen Henson
On Tue, Aug 16, 2005, James Whitwell wrote: > Hi, > > Can anyone tell me if it's possible to embed a client certificate inside > my executable, and what calls I should use to tell OpenSSL to use it? I > think I'll also need to do it for the CA, since we use self-signed > certificates, and I w

Re: COMP_zlibd don't return a valid method

2005-08-16 Thread Ignacio Butler
hi, well, i'm using Linux, with a 2.4.xx kernel and the 0.9.8 version of the ssl library, to compile it i do: gcc -o master master.c -lssl -lcrypto -lpthread (same as you do it) i've compiled the library configurating using "./config zlib" the library is compiled with this parameter... thanks p

Re: COMP_zlibd don't return a valid method

2005-08-16 Thread prakash babu
Hello Ignacio,      I tried the program you attached and it seems to work fine .   #include #include int main(){COMP_METHOD *comp_method;comp_method = COMP_zlib();if(comp_method != NULL)    {    printf("compression name: %s\n", (comp_method->name !=NULL? comp_met

Re: Odd PRNG behavior between 0.9.7g and 0.9.8

2005-08-16 Thread prakash babu
Hello Robert,   I think the problem is with your Pseudo Random Number Generator and not OpenSSL 0.9.8 i. Check if you system has the /dev/random or /dev/urandom ii. If  /dev/random and /dev/urandom are not present then make sure  prngd is running  iii. If your answer is yes to question i or ii then

Re: question about error message: unable to write 'random state'

2005-08-16 Thread prakash babu
Hello Dave,   Try setting your environment variable HOME since the seed file will be written to the file $HOME/.rnd  or set the variable RANDFILE in the openssl.cnf file to an existing location. Thanks, Prakash    Dave Peterson <[EMAIL PROTECTED]> wrote: I hope this isn't a repeat of a