Hi
I am trying to use openssl to generate RSA keys and use it in PeopleSoft. But
PeopleSoft requires keys in hex notation with specific keysize of 168 which I
am
not able to generate with openSSL. Please let me know if anyone has experience
working with OpenSSL for PeopleSoft.Any help is appre
I'm a *nix programmer too [?].
I just think there may be some error with the example on wind32.
On Thu, Sep 2, 2010 at 11:36 PM, Sam Jantz wrote:
> Lu,
>
> I'm not sure specifically about windows, but it seems that you have
> not created the id function. Once you create the id function t
Hi,
I'd like to use gprof to profile the OpenSSL application s_server on a Linux
box. I had a 'CFLAG= -g -static -pg' in the 'openssl-0.9.8o/apps/Makefile',
then configured the OpenSSL, made it and installed it.
However, I didn't get the gprof output (gmon.out) after running the 'openssl
s_
hi fols
hi all the people
hi openssl users
hi apache httpd users
t explain my problem
i use CentOS 5.5
use httpd.i386 2.2.3-43.el5.centos.3 rpm's centos
use mod_ssl.i386 1:2.2.3-43.el5.centos.3 rpms's centos
I sometimes against this kind of problem
with certificates of type class 3, it was the
hi folks
hi all the people
hi openssl users
hi apache httpd users
t explain my problem
i use CentOS 5.5
use httpd.i386 2.2.3-43.el5.centos.3 rpm's centos
use mod_ssl.i386 1:2.2.3-43.el5.centos.3 rpms's centos
I sometimes against this kind of problem
with certificates of type class 3, it was the
On Thu, Sep 02, 2010 at 11:02:21PM +0200, Dr. Stephen Henson wrote:
> On Thu, Sep 02, 2010, Victor Duchovni wrote:
>
> >
> > It is my impression that enabling tls extensions breaks binary
> > compatibility, so I cannot replace a "no-tlsext" shared library with
> > one that support extensions wit
On Thu, Sep 02, 2010, Victor Duchovni wrote:
>
> It is my impression that enabling tls extensions breaks binary
> compatibility, so I cannot replace a "no-tlsext" shared library with
> one that support extensions without re-compiling all the clients. So,
> some legacy systems still get "no-tlsext
The 0.9.8[no] SSLv3 client code sends the SCSV cipher even when built
with "no-tlsext" and is then unable to process the server response if
the server returns tls extensions.
It is my impression that enabling tls extensions breaks binary
compatibility, so I cannot replace a "no-tlsext" shared lib
Hi,
Thanks for your input..it worked for me...i am writing encryption and
decryption using RSA...
#include
#include
#include
#include
#include
#include
RSA * readPubKey(char *filename)
{
RSA *key;
BIO *bp;
ERR_load_crypto_strings();
bp=BIO_new(BIO_s_file());
if (BIO_read_fil
Use the '-issuer_checks' parameter to show exactly what it's looking for and
where it's looking for it.
At 'depth 1' (i.e., one step above the end-entity certificate), it's looking
for the issuer (which means it's looking for the USERTRUST root certificate).
-Kyle H
On Thu, Sep 2, 2010 at 9:3
Bonjour,
Hodie post. Kal. Sep. MMX, John Doe scripsit:
> I have some issues with chained certificates.
> I am trying to verify my certificate with the intermediate certificate of my
> registrar...
>
> my.crt:
> Issuer: C=FR, O=GANDI SAS, CN=Gandi Standard SSL CA
> Subject: OU=Domain Control Vali
Hi John,
Your CAfile must contain the chain that issued your cert (i.e. the
intermediate(s) and the root). The error is indicating that it is unable to
locate the issuer of the intermediate.
Erik Tkal
-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us
Hello,
Where is the symmetric key stored during an SSL transaction? There is
a place for it (deep) inside of the ssl structure at
ssl->s3->tmp.key_block
with length of
ssl->s3->tmp.key_block_length
However these are never populated on any connection that I make. It seems
Hi,
I have some issues with chained certificates.
I am trying to verify my certificate with the intermediate certificate of my
registrar...
my.crt:
Issuer: C=FR, O=GANDI SAS, CN=Gandi Standard SSL CA
Subject: OU=Domain Control Validated, OU=Gandi Standard SSL, CN=my.site.com
gandi.crt:
Issuer:
Sorry accidentally sent that:
return pthread_self()
}
Then you register it, and your library should be thread safe.
Again sorry about sending that too soon. Best of luck!
-Sam
On Thu, Sep 2, 2010 at 10:36 AM, Sam Jantz wrote:
> Lu,
>
> I'm not sure specifically about windows
Lu,
I'm not sure specifically about windows, but it seems that you have not
created the id function. Once you create the id function then you need to
register it in the thread_setup with the function
CRYPTO_set_id_callback(); The thread_id function
is a very small function that just returns
Hi Sagar,
No, I do not see any engine support. That code appears to use AES_encrypt
directly, and evp.h has hints but nothing enabled:
#if 0
const EVP_CIPHER *EVP_aes_128_ctr(void);
#endif
Also, if the hardware you have (you didn't say what it was) is not supported by
OpenSSL then the hardwar
Since webmail, imap, smtp(s) all operate on different ports, and
you have different listeners, the correct way to me seems to
use three certificates with the desired hostnames etc.
Having the same IP address doesn't matter in this particular case.
___
the documentation (http://www.openssl.org/docs/crypto/threads.html) says
to use openssl library in multi threds environments, the user should set
thses tow callback functions
locking_function and threadid_func
the example:
*crypto/threads/mttest.c*
on win32 platform:
it does not set threadid_fun
Hi Gaiseric,
-Original Message-
> From: Gaiseric Vandal
>
>I am using various version of openssl-0.9.x (including
>openssl-0.9.8k-1.fc11.i686 on
> my linux machine altho the cusotmized openssl.cnf file is probably inherited
> from a
> slightly earlier version.)
> When I create a certifi
20 matches
Mail list logo