Hello Rajeshwar ,
let cacert.pem be your CA certificatelet ksbcert.pem and ksbkey.pem be your certificate and private/public key pair
To verify you certificate #openssl verify -CAfile cacert.pem ksbcert.pem
To verify the consistency of your private key#openssl rsa -in ksbkey.pem -check
-- P
In message <[EMAIL PROTECTED]> on Tue, 30 Aug 2005 08:07:03 +0530, Toney Samuel
<[EMAIL PROTECTED]> said:
toney.samuel> i have downloaded openssl-0.9.8.tar.gz. I untared it then
configured
toney.samuel> it with these switches
toney.samuel> ./config --prefix=/usr/local shared zlib-dynamic
toney.s
It's the same as your original problem: different end-of-line markers
Try this instead:
echo -n "1122" | openssl dgst -md5
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Roberto Arias Alegria
Sent: Tuesday, 30 August 2005 2:01 PM
To: openssl-user
> Anyway, I don't know why I got different hashes
The newline that echo adds. Try
echo -n 1122 | openssl dgst -md5
--
Rich Salz Chief Security Architect
DataPower Technology http://www.datapower.com
XS40 XML Security Gateway http://www.datapower.com/products/xs40
On Mon, Aug 29, 2005 at 11:00:33PM -0500, Roberto Arias Alegria wrote:
> Thanks people,
>
> Yeah I think the end of line was the key. After reading your posts I
> realised that I needed this:
> echo "mytext" | openssl dgst -md5
>
> Anyway, I don't know why I got different hashes:
>
> Using open
On Aug 30, 2005, at 12:00 AM, Roberto Arias Alegria wrote:
Yeah I think the end of line was the key. After reading your posts I
realised that I needed this:
echo "mytext" | openssl dgst -md5
Anyway, I don't know why I got different hashes:
Using openssl:
echo "1122" | openssl dgst -md5
01ebe
Thanks people,
Yeah I think the end of line was the key. After reading your posts I
realised that I needed this:
echo "mytext" | openssl dgst -md5
Anyway, I don't know why I got different hashes:
Using openssl:
echo "1122" | openssl dgst -md5
01ebeaafc334e503f4acc94a18df9fa5
and using MySQL:
Rajeshwar Singh Jenwar wrote:
How to verify a signed certificate by a CA(.pem) & coresponding private
key(.pem) ?
It is just to verify that someone has played with private key or not.
You validate a certificate by performing the signature check, just
like in the city. You examine it to see
i have downloaded openssl-0.9.8.tar.gz. I untared it then configuredit with these switches./config --prefix=/usr/local shared zlib-dynamicthen did make and make installi had apache httpd-2.0.53.tar.gz
also untared it then used theseswitches to configure./configure --enable-deflate --enable-usert
On Mon, Aug 29, 2005 at 06:42:07PM -0500, Roberto Arias Alegria wrote:
> Hello new around here,
>
> I'm just new to OpenSSL and I'd like to calculate a MD5 digest, I used
> the command
>
> openssl dgst -md5 file.txt
>
> and I got a digest of the file, but I want a digest of what is
> *inside* t
Your question doesn't make much sense. A "digest of the file" is exactly
the same as "a digest of what is *inside* the file". If you mean that you
want a digest of a particular portion of the contents of the file then
you'll need to extract that yourself.
-Original Message-
From: [EMAIL
you can use the md5sum command...
$md5sum file.txt
On 8/29/05, Roberto Arias Alegria <[EMAIL PROTECTED]> wrote:
> Hello new around here,
>
> I'm just new to OpenSSL and I'd like to calculate a MD5 digest, I used
> the command
>
> openssl dgst -md5 file.txt
>
> and I got a digest of the file, b
Hello new around here,
I'm just new to OpenSSL and I'd like to calculate a MD5 digest, I used
the command
openssl dgst -md5 file.txt
and I got a digest of the file, but I want a digest of what is
*inside* the file, a text string, not the file itself, it is possible
to do this?
//roberto8080
__
> I am currently working on a project making use of SSL
> connections via OpenSSL. We need a stable thread-safe
> SSL setup. I currently know 3 things about OpenSSL
> thread-safety:
>
> 1. Cannot share SSL connection amongst threads
> 2. Provide locking_function()
> 3. Provide id_function()
Steven Reddie wrote:
Which version are you using? 0.9.8 does what I'd expect:
$ openssl ciphers AES+DES
Error in cipher list
3312:error:144020B9:SSL routines:SSL_CTX_set_cipher_list:no cipher
match:ssl_lib.c:1167:
yep, this has been fixed in OpenSSL_0_9_7-stable and a
Greetings:
The DES_ede3_cbc_encrypt() routine does not appear to properly pad
data to fill out the last block.
Consider, if the last block contains 4 bytes for the unencrypted
text "test", DES_ede3_cbc_encrypt() is only padding the remaining
characters with NULL characters:
74:65:73:74:0
I've also experienced the corrupted-file-in-the-hidden-proxy problem before
(by hidden meaning that the ISP forces the use of the proxy). You could
also try downloading from a different mirror, or use ftp.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of R
I used wget to downloaded it, and yes gunzip -t tells me that I have a
corrupted download.
However, I did downloaded the previous version and its ok!.
Perhaps the fact that I am behind a proxy could be the problem?..
I am going to try it using a machine directly conected to the outside..
Thank
Write wrappers around the malloc/free functions to use shared memory,
to share objects among threads.
Hunh?
The whole point of threads is that they share the same address space, so
you don't need shared memory. You might/do need locking, depending on
what you're doing.
/r$
--
Rich
i have downloaded openssl-0.9.8.tar.gz. I untared it then configured
it with these switches
./config --prefix=/usr/local shared zlib-dynamic
then did make and make install
i had apache httpd-2.0.53.tar.gz also untared it then used these
switches to configure
./configure --enable-deflate --enable
Hi,
How to verify a signed certificate by a CA(.pem) & coresponding private key(.pem) ?
It is just to verify that someone has played with private key or not.
Thx.
Rajeshwar Singh
Rodolfo Estrada writes:
[EMAIL PROTECTED] tmp]# md5sum openssl-0.9.8.tar.gz
d41d8cd98f00b204e9800998ecf8427e openssl-0.9.8.tar.gz
md5 from website 9da21071596a124acde6080552deac16
Am I doing something wrong here? IF not, we are in trouble...
I'm very sure the checksum on the web site i
The copy I downloaded a while back is correct. The copy I downloaded just
now is also correct. Seems you have a corrupt download. Does "gunzip -t
openssl-0.9.8.tar.gz" report a corruption?
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Rodolfo Estrada
[EMAIL PROTECTED] tmp]# md5sum openssl-0.9.8.tar.gz
d41d8cd98f00b204e9800998ecf8427e openssl-0.9.8.tar.gz
md5 from website 9da21071596a124acde6080552deac16
Am I doing something wrong here? IF not, we are in trouble...
Regards,
Rodolfo Estrada
[EMAIL PROTECTED]
_
I am investigating about ssl, I need to know that after decoding a record, what is verified first? "MAC" or "length of application data"?
please reply me, I'm very very thank you.
Start your day with Yahoo! - make it your home page
Hello!
On Mon, 29 Aug 2005, Steven Reddie wrote:
> Which version are you using? 0.9.8 does what I'd expect:
>
> $ openssl ciphers AES+DES
> Error in cipher list
> 3312:error:144020B9:SSL routines:SSL_CTX_set_cipher_list:no cipher
> match:ssl_lib.c:1167:
Thank you. The result w
Which version are you using? 0.9.8 does what I'd expect:
$ openssl ciphers AES+DES
Error in cipher list
3312:error:144020B9:SSL routines:SSL_CTX_set_cipher_list:no cipher
match:ssl_lib.c:1167:
Steven
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROT
Hello!
man openssl ciphers:
=
Lists of cipher suites can be combined in a single cipher string using
the + character. This is used as a logical and operation. For example
SHA1+DES represents all cipher suites containing the SHA1 and the DES
algorithms.
=
What about call for opens
Hi,
I would say openssl is not thread-safe per se, but you can deal with it.
Write wrappers around the malloc/free functions to use shared memory,
to share objects among threads. Write thread-safe functions around the
ssl functions you need to access from multiple threads ...
For example code, op
Hi all,
Could someone telle where i can find the following file: ca.txt
I'm reading opthe HOWTO and i see the following comment (cetificates.txt):
This is NOT the recommended way to create a"
CA certificate, see ca.txt."
regards,
Fred
Angel Martinez Gonzalez wrote:
> Hello:
>
> I have a certificate in char * format, and I want to get his public key.
>
> Are there an OpenSSL function to do this?.
Define char * format.
If you have a char * pointing to a certificate in PEM format,
you can do a BIO_new_mem_buf() and create a BIO
Hello:
I have a certificate in char * format, and I want to get his public key.
Are there an OpenSSL function to do this?.
Thanks.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Li
32 matches
Mail list logo