Re: Memory usage

2007-10-23 Thread jimmy bahuleyan
David Schwartz wrote: >> I have an application using openSSL version 0.9.7d. >> I am able to create 20,000 TLS connections, but my heap size >> is at 1.5GB. It looks like it is the SSL context. Is there anyway >> to reduce the memory fotprint? > > I'm not 100% sure I understand your question. But

Re: refresh validity dates on a certificate

2007-10-23 Thread Simon McMahon
Hi, I just saw the "RE: Changing the expiry date of a cert" thread but I think my question is a little different. My certs are not CA certs they are user certs where the only thing I really need to preserve are subject, issuer, key & cert extensions. The serial # doesn't matter. The thing I w

refresh validity dates on a certificate

2007-10-23 Thread Simon McMahon
Hi, I have some old certificates where the private key is fine but the cert has expired. My environment is only a test env by the way so there are no security issues here. I just want an easy way to refresh the certs whenever they expire. Is there some way with openssl that I can just refresh

Re: SSL Error connecting to cia.gov

2007-10-23 Thread Alex Lam
That's TLSv1, not SSLv2. : 01 03 01 00 63 00 00 00 10 00 00 39 00 00 38 00 c..9..8. 0010: 00 35 00 00 88 00 00 87 00 00 84 00 00 16 00 00 .5.. 0020: 13 00 00 0a 07 00 c0 00 00 33 00 00 32 00 00 2f .3..2../ 0030: 00 00 45 00 00 44 00 00 41 00 00 07 05 00 80 03 ..E..D

Re: SSL Error connecting to cia.gov

2007-10-23 Thread Jake Goulding
Marek Marcola wrote: > I think that this is CIA webserver problem. > You may test this with: > $ openssl s_client -connect www.cia.gov:443 -state -debug -msg [[-ssl3] > [-tls1]] > and in any combination after some successful connection you will get failed > connections. > For example: > $ opens

Re: SSL Error connecting to cia.gov

2007-10-23 Thread Marek Marcola
Hello, > We use curl to retrieve webpages, and recently started receiving an > intermittent (40-60% of the time) error when retrieving a page from the > CIA. About two weeks ago, they switched to running https only, with the > http URLs being forwarded to the https equivalents. > > The error we re

SSL Error connecting to cia.gov

2007-10-23 Thread Jake Goulding
Hey all: We use curl to retrieve webpages, and recently started receiving an intermittent (40-60% of the time) error when retrieving a page from the CIA. About two weeks ago, they switched to running https only, with the http URLs being forwarded to the https equivalents. The error we receive is:

RE: Memory usage

2007-10-23 Thread David Schwartz
> I have an application using openSSL version 0.9.7d. > I am able to create 20,000 TLS connections, but my heap size > is at 1.5GB. It looks like it is the SSL context. Is there anyway > to reduce the memory fotprint? I'm not 100% sure I understand your question. But if I understand it correctly,

Memory usage

2007-10-23 Thread Bloch, Jack (SNL US)
I have an application using openSSL version 0.9.7d. I am able to create 20,000 TLS connections, but my heap size is at 1.5GB. It looks like it is the SSL context. Is there anyway to reduce the memory fotprint? Please CC me directly on any responses

Re: blowfish in ecb mode false ciphertext

2007-10-23 Thread Victor Duchovni
On Tue, Oct 23, 2007 at 05:55:37PM +0200, Erno Kovacs wrote: > > The 0.9.8e version did not use the key length correctly. > > http://cvs.openssl.org/chngview?cn=15978 > > The 0.9.8d and 0.9.8g code should be correct. > > 0.9.8g on windows (provided by Shining Light) is still incorrect. > Shou

Re[2]: blowfish in ecb mode false ciphertext

2007-10-23 Thread Erno Kovacs
> The 0.9.8e version did not use the key length correctly. > http://cvs.openssl.org/chngview?cn=15978 > The 0.9.8d and 0.9.8g code should be correct. 0.9.8g on windows (provided by Shining Light) is still incorrect. Should i report this bug directly to them? Erno ___

Re: blowfish in ecb mode false ciphertext

2007-10-23 Thread Victor Duchovni
On Tue, Oct 23, 2007 at 04:50:08PM +0200, Erno Kovacs wrote: > One of my applications broke just after i upgraded Openssl from 0.9.8d. > After several hours of debugging I realized, something is fishy around > the blowfish cipher: it just doesnt produces the same ciphertext as it > did using the 0

AES_cbc_encrypt - data differs on first 16 bytes.

2007-10-23 Thread Koza
Hi, I have problem with AES_cbc_encrypt function. I use code you can see below and unfortunately my function that compares arrays gives an error. The data from in3 and tmp3 looks similar, but there is a difference on first 16 bytes. Any idea what is going on? Thank you for your help!! Best regar

blowfish in ecb mode false ciphertext

2007-10-23 Thread Erno Kovacs
One of my applications broke just after i upgraded Openssl from 0.9.8d. After several hours of debugging I realized, something is fishy around the blowfish cipher: it just doesnt produces the same ciphertext as it did using the 0.9.8d. You can find the really small and stupid source code which pro