Thanks Dave for the reply. I realized lately that i have confused the
discussion... here is the exact problem statement...
Once i get the salt_value, i need to pass it to PKCS5_PBKDF2_HMAC_SHA1() as
salt value. When i did a strlen on salt_value, i got 64 bytes which i think
is correct as it count
> From: owner-openssl-us...@openssl.org On Behalf Of pkumarn
> Sent: Thursday, 15 March, 2012 14:18
> To: openssl-users@openssl.org
> Subject: Need help on using RAND_bytes()
Aside: your message is not very clear but it appears
your problem is really C programming in general,
not RAND_bytes or e
On Mar 15, 2012, at 7:39 PM, Erwin Himawan wrote:
> Hi Folks,
>
> Can anybody shed some light where to adjust DTLS flight timer?
I think they are hardcoded. An initial value of 1 second and doubling
on timeout as specified in
http://tools.ietf.org/html/rfc6347#section-4.2.4.1
Best regards
Michae
On 15.03.2012 14:52, Rob Stradling wrote:
> On 15/03/12 13:11, Florian Pritz wrote:
>> Hi,
>>
>> When using lynx to access https://portfolio.iguw.tuwien.ac.at I got an
>> ssl cert validation error. Since it worked fine in firefox/chromium I
>> tried to use openssl directly and got the following, bu
Hi,
I am using RAND_bytes() to generate 32 byte random number (code snippet
below). From here what i see if when access alt_value[0] it gives me "b2".
So basically these array has got 64 bytes.
unsigned char salt_value[33];
RAND_bytes(salt_value, 32);
sample o/p: b2ee922055a3adc17fdd5980db39a
On Thu, Mar 15, 2012, Davis, Mark H wrote:
> I see that lots of work supporting the new TLS 1.2 GCM based ciphers are in
> openSSL 1.0.1 releases, but no indications in the open 1.0.0 releases. Are
> there any plans to support these ciphers in the openssl 1.0.0 releases or is
> the plan to make
BODY { font-family:Arial, Helvetica, sans-serif;font-size:12px; }
I can see it:
03/14/2012 01:34PM 4,453,920 openssl-1.0.1.tar.gz [1]
On Thu 15/03/12 12:50 AM , Iain Morgan iain.mor...@nasa.gov sent:
On Wed, Mar 14, 2012 at 10:09:22 -0500, OpenSSL wrote:
> -BEGIN
I see that lots of work supporting the new TLS 1.2 GCM based ciphers are in
openSSL 1.0.1 releases, but no indications in the open 1.0.0 releases.
Are there any plans to support these ciphers in the openssl 1.0.0 releases or
is the plan to make openssl 1.0.1 the only release branch with this
fu
On 15/03/12 13:11, Florian Pritz wrote:
Hi,
When using lynx to access https://portfolio.iguw.tuwien.ac.at I got an
ssl cert validation error. Since it worked fine in firefox/chromium I
tried to use openssl directly and got the following, but I fail to
understand what it means although I see that
Hi,
When using lynx to access https://portfolio.iguw.tuwien.ac.at I got an
ssl cert validation error. Since it worked fine in firefox/chromium I
tried to use openssl directly and got the following, but I fail to
understand what it means although I see that the chain looks strange
(0->1 i:TERENA is
We can generate signature of PKCS#7 using pkcs7_lib.c and PKCS7 object.
But what if we want to generate a RAW Signature. what is the header file and
method calls need to generate RAW Signature using openssl.
Thanks.
--
View this message in context:
http://old.nabble.com/generate-raw-signature
On Wed, Mar 14, 2012 at 10:09:22 -0500, OpenSSL wrote:
> -BEGIN PGP SIGNED MESSAGE-
>
>We consider OpenSSL 1.0.1 to be the best version of OpenSSL
>available and we strongly recommend that users of older versions
>upgrade as soon as possible. OpenSSL 1.0.1 is available for
>
You did not specify a CA to verify against. (using -CAfile or -CApath
and -verify)
That server is not sending its intermediate certificate.
Verifying against chain of root and intemediate succeeded for me
(openssl 1.0.0d on windows xp sp3)
- Original Message -
From: "Florian Pritz"
To
Hi,
When using lynx to access https://portfolio.iguw.tuwien.ac.at I got an
ssl cert validation error. Since it worked fine in firefox/chromium I
tried to use openssl directly and got the following, but I fail to
understand what it means although I see that the chain looks strange
(0->1 i:TERENA is
Thanks Dave for clarifying this... was pulled into something else so couldn't
reply back ...
Dave Thompson-5 wrote:
>
>> From: owner-openssl-us...@openssl.org On Behalf Of pkumarn
>> Sent: Monday, 05 March, 2012 23:35
>> To: openssl-users@openssl.org
>> Subject: Need help on using AES_wrap_key(
15 matches
Mail list logo