RE: Converting RSA to EVP_pkey

2007-07-26 Thread Marek Marcola
Hello, > is this the best way to do it ? EVP_pkey *pkey = EVP_PKEY_new(); > EVP_PKEY_assign_RSA(pkey, rsa); thanks ! I think this one of most "proper" way :-) Best regards, -- Marek Marcola <[EMAIL PROTECTED]> __ OpenSSL Projec

RE: Converting RSA to EVP_pkey

2007-07-26 Thread k b
is this the best way to do it ? EVP_pkey *pkey = EVP_PKEY_new(); EVP_PKEY_assign_RSA(pkey, rsa); thanks ! > From: [EMAIL PROTECTED] > To: openssl-users@openssl.org > Subject: RE: Converting RSA to EVP_pkey > Date: Thu, 26 Jul 2007 16:16:36 -0700

RE: Converting RSA to EVP_pkey

2007-07-26 Thread k b
Thanks Marek, so then how do i convert RSA to EVP_pkey ? > Subject: Re: Converting RSA to EVP_pkey> From: [EMAIL PROTECTED]> To: openssl-users@openssl.org> Date: Fri, 27 Jul 2007 01:09:59 +0200> > Hello,> > 2) I was looking and found this d2i_RSAPrivateKey. From what it looks> > like, this do

Re: Converting RSA to EVP_pkey

2007-07-26 Thread Marek Marcola
Hello, > 2) I was looking and found this d2i_RSAPrivateKey. From what it looks > like, this doesn't seem to be what i want. and i was wondering when > what does this convert to and from. This function convert from DER format to INTERNAL format (RSA). Best regards. -- Marek Marcola <[EMAIL PROTE

Converting RSA to EVP_pkey

2007-07-26 Thread k b
Hi,I have a RSA * to a private key and want to convert it to an EVP_pkey. 1) Is there a way to convert from RSA to EVP_pkey.would the following function the right candidate to do the job EVP_PKEY *PEM_read_bio_PrivateKey(BIO *bp, EVP_PKEY **x,pem

Re: Puzzling 50ms delay between SSL_write and poll response

2007-07-26 Thread Rick Jones
50 ms is a common standalone ACK timer, so if one had a second or Nth small send, it might have been waiting (via Nagle) for the remote's standalone ACK before being transmitted. Some folks like to simply switch-off nagle, I prefer to try to get folks to send logically associated data to the tr

Re: Puzzling 50ms delay between SSL_write and poll response

2007-07-26 Thread Darryl Miles
David Lobron wrote: 2007-07-26 20:18:04.375 [3317] GS: Got response from sendDataPending 2007-07-26 20:18:04.376 [3317] GS: Calling poll with timeout 6 2007-07-26 20:18:04.376 [3317] GS: Checking poll results 2007-07-26 20:18:04.376 [3317] GS: calling SSL_write on buffer of length 1281 2007

Re: Puzzling 50ms delay between SSL_write and poll response

2007-07-26 Thread David Lobron
Thank you for the quick reply, and apologies for my less-than-clear message: let me give more details. I am poll-ing with a timeout of 60 seconds, and SSL_write is returning a positive number of bytes read each time through (we always find data well before the timeout). The server logs for

TLS:error TLS1_SETUP_KEY_BLOCK

2007-07-26 Thread James Hartley
TLS: error:140D308A:SSL routines:TLS1_SETUP_KEY_BLOCK:cipher or hash unavailable ../../../../common/openssl/ssl/t1_enc.c:461 A little history I have compiled openssl version 0.9.8e on Sun v420 system running opensolaris (version 11). I used the gcc 3.4.3 compiler loaded in /usr/sfw/bin. I then c

Re: double free or corruption (!prev) in CRYPTO_free()?

2007-07-26 Thread Darryl Miles
Prabhu S wrote: Hi David, I enabled the debug flags in the OpenSSL makefiles and recompiled for the libraries. The stack trace is obtained is as follows: #0 0x4402 in __kernel_vsyscall () #1 0x001fc1f8 in raise () from /lib/libc.so.6 #2 0x001fd948 in abort () from /lib/libc.so.6 #3 0x

RE: Puzzling 50ms delay between SSL_write and poll response

2007-07-26 Thread David Schwartz
> I have a Linux server application that calls SSL_write in a loop, and > polls the underlying socket using the poll(2) system call. In the > loop, the first few calls to poll return immediately with data on the > socket, but I'm finding that the last call to poll always takes about > 50ms to bef

TLS: error:140D308A:SSL routines:TLS1_SETUP_KEY_BLOCK:cipher or hash unavailable ssl/t1_enc.c:461 on Solaris 11

2007-07-26 Thread James Hartley
TLS: error:140D308A:SSL routines:TLS1_SETUP_KEY_BLOCK:cipher or hash unavailable ../../../../common/openssl/ssl/t1_enc.c:461 A little history I have compiled openssl version 0.9.8e on Sun v420 system running opensolaris (version 11). I used the gcc 3.4.3 compiler loaded in /usr/sfw/bin. I then c

Constraints on the length of certificate subject DN

2007-07-26 Thread Arsen Hayrapetyan
Hello, Does OpenSSL put length constraints on the length of subject DN of X.509certificate? If not, what is the maximum length of the subject DN string? Thanks in advance, Arsen.

Puzzling 50ms delay between SSL_write and poll response

2007-07-26 Thread David Lobron
Hello All- I have a Linux server application that calls SSL_write in a loop, and polls the underlying socket using the poll(2) system call. In the loop, the first few calls to poll return immediately with data on the socket, but I'm finding that the last call to poll always takes about 5

Re: decoding ASN1 OCTET STRING

2007-07-26 Thread Chas .
Please look at the code I released a few weeks ago that will show you how to decode just such a thing. I sent it out on the openssl-users mailing list. Peace, Chuck Wegrzyn On 7/26/07, edkulus <[EMAIL PROTECTED]> wrote: Hi All, I have the following piece of code, that I use for reading the co

decoding ASN1 OCTET STRING

2007-07-26 Thread edkulus
Hi All, I have the following piece of code, that I use for reading the contents of X.509 extensions: X509 *cert = NULL; X509_EXTENSION *extension; ASN1_OCTET_STRING *extdata; char *extname; for (i = 0; i < X509_get_ext_count(cert); i++) { extension = X509_get_ext(cert, i); extdata = X509_

OpenSLL Timestamping

2007-07-26 Thread thomas.beckmann
Hi all! In the openssl documentation I found the command "ts" for timestamping actions. Trying this command with my openssl 0.9.8e I was told that this is an unknown command. Now I am wondering if the documentation may be some kind of too uptodate - what is normally not the case with docs - or if

Re: double free or corruption (!prev) in CRYPTO_free()?

2007-07-26 Thread Dr. Stephen Henson
On Thu, Jul 26, 2007, Prabhu S wrote: > Hi David, > > I enabled the debug flags in the OpenSSL makefiles and recompiled for the > libraries. > The stack trace is obtained is as follows: > > #0 0x4402 in __kernel_vsyscall () > #1 0x001fc1f8 in raise () from /lib/libc.so.6 > #2 0x001fd948 i

Re: double free or corruption (!prev) in CRYPTO_free()?

2007-07-26 Thread Prabhu S
Hi David, I enabled the debug flags in the OpenSSL makefiles and recompiled for the libraries. The stack trace is obtained is as follows: #0 0x4402 in __kernel_vsyscall () #1 0x001fc1f8 in raise () from /lib/libc.so.6 #2 0x001fd948 in abort () from /lib/libc.so.6 #3 0x0023152a in __libc_