Re: reagrding extended hello on sess resumption

2006-02-06 Thread jimmy
Peter Sylvester wrote: Hm. A correct client would not set a different one. There is no requirement to check anything on session resume. Yes. in fact 3546 did specify this. i missed it :-) The only extension that is currently supported is the servername extension. In order to use this effecti

Sample Code ssl: Java Server, C client

2006-02-06 Thread Ambarish Mitra
Hi, I need a sample (and basic) SSL client server application code, where the server is implemented as a Java program, and the client is implemented as a C or C++ program using openssl libraries. The Java program can use a keystore in JKS format, while the C program can use the certs generated by

Re: Hard coding keys and certs

2006-02-06 Thread Alberto Alonso
Thanks, this is exactly what I was looking for. And thanks also to Peter for pointing out the already built options openssl x509 -C which produce the perfect C stub code. Alberto On Mon, 2006-02-06 at 10:04 +, Katie Lucas wrote: > On Fri, Feb 03, 2006 at 02:54:38PM -0600, Alberto Alonso wrot

Re: servername extension and apache 2.2.0

2006-02-06 Thread William A. Rowe, Jr.
If you want to submit and have considered by the httpd project, perhaps you ment to submit it there? Nice work b.t.w. Bill Peter Sylvester wrote: Hello, I just have put together the small patch for apache 2.2.0 which allows to use the sernername extension logic in the development snapshot i

RE: reagrding extended hello on sess resumption

2006-02-06 Thread Ambarish Mitra
This is the SSL protocol itself. http://wp.netscape.com/eng/ssl3/traces/trc-clnt-us.html#ClientHello1 -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of jimmy Sent: Monday, February 06, 2006 10:47 PM To: openssl-users@openssl.org Subject: reagrding extended

RE: 192 bit signatures

2006-02-06 Thread David Schwartz
> I'm looking to generate a short digital signature, perhaps 192 > bits or so, using an asymmetrical algorithm. DSA seems to > have 320 bit signatures regardless of the key size used. Is > this really the case, or am I missing something? Ignoring for > the moment the wisdom of using signatures

Re: OpenSSL to generate a Private Key and Public Certificate on a PC

2006-02-06 Thread Kyle Hamilton
You don't actually need the perl. Find 'openssl.exe' and run that. -Kyle H On 2/6/06, ssl_virgin (sent by Nabble.com) <[EMAIL PROTECTED]> wrote: > Many thanks for the replies! > > Based on these, I've made some progress: > 1) downloaded the pre-compiled binary from > http://www.slproweb.com/pro

[no subject]

2006-02-06 Thread Bob Mearns
I'm looking to generate a short digital signature, perhaps 192 bits or so, using an asymmetrical algorithm. DSA seems to have 320 bit signatures regardless of the key size used. Is this really the case, or am I missing something? Ignoring for the moment the wisdom of using signatures this short

Re: OpenSSL to generate a Private Key and Public Certificate on a PC

2006-02-06 Thread ssl_virgin (sent by Nabble.com)
Many thanks for the replies! Based on these, I've made some progress: 1) downloaded the pre-compiled binary from http://www.slproweb.com/products/Win32OpenSSL.html. 2) installed it. 3) according to the “help” file, I need to have Perl installed on the PC, so I did that. 4) navigated to the 'Crypt

Encrypted Alert in sniffer trace

2006-02-06 Thread OpenSSLGRT
Hi –   I have a simple TLS client with OpenSSL. It works fine but one oddity… When all is completed I call SSL_shutdown(ssl). At that point I see in the sniffer trace an Encryption Alert   I read response from server -- SSL_read(ssl, buff2, sizeof(buff2) - 1); https > 1154 [FIN, ACK]

Re: reagrding extended hello on sess resumption

2006-02-06 Thread Peter Sylvester
Hm. A correct client would not set a different one. There is no requirement to check anything on session resume. The only extension that is currently supported is the servername extension. In order to use this effectively, you need an applictaion call back. If you don't have a callback, the exte

servername extension and apache 2.2.0

2006-02-06 Thread Peter Sylvester
Hello, I just have put together the small patch for apache 2.2.0 which allows to use the sernername extension logic in the development snapshot in order to select a different ssl context, and also to renegotiate if the vhost indicated by Host: has a different SSL_ctx (e.g. certificate). The

reagrding extended hello on sess resumption

2006-02-06 Thread jimmy
Hi, Currently openssl-0.9.9 accepts a client hello (session resumption), with or without the extended hello part. Why is this so? Is it (or is it not) necessary to check if the extensions are the same as previously negotiated? i.e., shouldn't the extensions be validated w.r.t. previously neg

apologise for misdirected email regarding minisip and openser

2006-02-06 Thread Pjothi
Dear all, I apologise for the mis directed email regarding a minisip registration with openser. It was mistakenly sent to openssl users mailing list and my sincere apologies for it. regards, Pjothi __ OpenSSL Project

Re: minisip-OpenSER registration problem

2006-02-06 Thread Kyle Hamilton
You're not defining any ciphers to use, given the commented-out tls_ciphers_list line. Try setting it to: tls_ciphers_list = "MEDIUM:HIGH" Check the OpenSSL documentation for more information on what values this string can take. -Kyle H On 2/6/06, Pjothi <[EMAIL PROTECTED]> wrote: > > > Dear a

Is shared and static crypto libraries FIPS compliant

2006-02-06 Thread prakash babu
Hello All,   Is both the static and shared crypto libraries FIPS compliant.   0.9.7e=The static crypto library is fips compliant.The integrity of libcrypto.a is checked using its HMAC-SHA1 fingerprint libcrypto.a.sha1   There is no checking for shared library libcrypto.so   0.9.7j-dev==

RE: Memory leak in OpenSSL application

2006-02-06 Thread Mark
> I've been doing some research into this and so far the main > cause seems > to be that we were not calling SSL_free after each connection > closed. > From what I have gathered, the correct way to cleanup after a > connection is to call the following functions in this order: > > SSL_sh

Re: Hard coding keys and certs

2006-02-06 Thread Peter Sylvester
like openssl x509 -C So you can, at compile time, build a small app which will read a key/certificate/etc and use an i2d_* routine to DER encode it, dropping that into a file. The file you run through a quick filter to turn into a suitable include file making the binary data a character array

Re: Hard coding keys and certs

2006-02-06 Thread Katie Lucas
On Fri, Feb 03, 2006 at 02:54:38PM -0600, Alberto Alonso wrote: > I would like to be able to hard code the key/cert in the > application instead of having files. > > Is there something similar to: SSL_CTX_use_PrivateKey_file > and SSL_CTX_use_PrivateKey_file but that I can use pointers > memory?