Change Cipher Spec Issue

2011-03-08 Thread Banupriya K
Hi All, I have enable SSL_OP_NO_TICKET options so ssl send only change cipher spec, encrypted message handshake. But when i receive the same message the client SSL CTX doesn't return STATE_OK it stays in read finished state only, hence when i have a check ssl_in_init_finished() doesnt return

RE: Installing a .cer file in IE

2011-03-08 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Jaquez Jr, Hector L. > Sent: Monday, 07 March, 2011 20:07 > To: openssl-users@openssl.org > Subject: RE: Installing a .cer file in IE > > Yes created a CSR file using openssl. If I recall I did > create a key as well. However, when I received

RE: convert x509 cert into string and store certs in cache

2011-03-08 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of ikuzar > Sent: Tuesday, 08 March, 2011 13:02 > I am going to explain below what I HAVE TO do : > a) I have to store certificates in a map which is a shared memory. > ( I have to do this, I have no choice, because

BN_copy on 64 bits Environment

2011-03-08 Thread Lucas Martins
Hello, I'm working on a software that uses libcrypto and the OpenSSL engine interface for a HSM. We developed an OpenSSL engine that was working fine until we try it on a 64 bit operational system. For some reason, the function BN_copy isn't working in a 64 bits environment. The code is running

FIPS 1.2.2 build for Windows Vista

2011-03-08 Thread Collins, Jerry
Hello, My company recently decided to upgrade to the latest FIPS release 1.2.2. I've read the Security and User Manual. According to them, the only command we can give is ms\do_fips no-asm. While this runs, I see several problems. 1) The build now builds dlls. In the past we did not use

Re: convert x509 cert into string and store certs in cache

2011-03-08 Thread ikuzar
Ok, things are more clear now. I am going to explain below what I HAVE TO do : a) I have to store certificates in a map which is a shared memory. ( I have to do this, I have no choice, because I have to continue what guy before me had started ). So I think it's better to store x509 structure which

Re: Certificate Access Question

2011-03-08 Thread Harshvir Sidhu
I checked this function, its for installing Certificate without User Interaction. But my problem starts after Certificate Installation, that certificate installed by one user is not accessible to another user. Thanks. On Tue, Mar 8, 2011 at 10:06 AM, wrote: > I used PKCS#12 files and CryptUIWizIm

Re: Certificate Access Question

2011-03-08 Thread carlyoung
I used PKCS#12 files and CryptUIWizImport with these flags: DWORD flags = CRYPTUI_WIZ_NO_UI | CRYPTUI_WIZ_IMPORT_TO_LOCALMACHINE | CRYPTUI_WIZ_IMPORT_ALLOW_CERT | CRYPTUI_WIZ_IMPORT_NO_CHANGE_DEST_STOR

Re: convert x509 cert into string and store certs in cache

2011-03-08 Thread Patrick Patterson
Hey there: On 2011-03-08, at 10:03 AM, ikuzar wrote: > my questions : > 1) What does DER format means ? is it equivalent to a string format ? > In the following function, we have a parameter named "out" : int > i2d_X509(X509 *x, unsigned char **out); this function convert X509 internal > data i

Re: convert x509 cert into string and store certs in cache

2011-03-08 Thread Bruce Stephens
ikuzar writes: [...] > my questions : > 1) What does DER format means ? Distinguished Encoding Rules. It's an encoding for ASN.1. See X.690. > is it equivalent to a string format ? It's a binary serialisation. So it's a string in the sense that it can be sent over protocols, saved in files

convert x509 cert into string and store certs in cache

2011-03-08 Thread ikuzar
Hello, I have to work with a pre-existing code which simulated handshake, data encryption etc ... certificate struct is defined like in the source code I reuse : template struct certificate : shared { StrType uri; StrType sn; StrType data; certificate(const char *str, size_t clen=0

Issue with d2i_PKCS7_bio

2011-03-08 Thread pradeepreddy
Hi, I am trying to retrieve the PKCS7 record from bio with d2i_PKCS7_bio (void)BIO_flush(membio); PKCS7 *p7rec; p7rec = d2i_PKCS7_bio(membio, NULL); Following is the back trace: *** glibc detected *** ./scep_client: free(): invalid next size (fast): 0x08065768 *** === Backtrace: = /

Certificate Access Question

2011-03-08 Thread Harshvir Sidhu
Hi, I dont think this question is related to openssl, but just checking if someone has done something like this. I have a service that runs under UserA, and my desktop user is UserB. When I install certificates using UserB, then i am not able to access them in UserA, for the obvious reason

Re: FIPS compliance question regarding openssl distributions

2011-03-08 Thread Dr. Stephen Henson
On Mon, Mar 07, 2011, Kyle Hamilton wrote: > In order to achieve compliance, you must follow the instructions in the > Security Policy to the letter. > > This means that you must: > - download and read the security policy > - download the openssl-fips-1.2.0.tar.gz > - verify its integrity accord

Re: FIPS compliance question regarding openssl distributions

2011-03-08 Thread Steve Marquess
Kyle Hamilton wrote: ... Note that compliance cannot be truly determined programmatically. So, it's also a good idea to generate multiple hashes (sha-1, sha-256, ripemd160, etc) over the fipscanister and associated files, print them out, and commit to them (physically sign them) as a state