Problem using ciphes - are they supported?

2005-12-03 Thread Nadav Golombick
certificate with DH 512 and 1024 files. -- Nadav Golombick __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager

Re: Problem with certain DH_DSS ciphers

2005-11-15 Thread Nadav Golombick
Thanks On 11/15/05, Dr. Stephen Henson <[EMAIL PROTECTED]> wrote: > On Tue, Nov 15, 2005, Nadav Golombick wrote: > > > Hi, > > > > When running the openssl with DSA certificates and DH parameter files, > > I can't select the ci

Problem with certain DH_DSS ciphers

2005-11-15 Thread Nadav Golombick
Hi, When running the openssl with DSA certificates and DH parameter files, I can't select the ciphers TLS_DH_DSS_WITH_AES_128_CBC_SHA and TLS_DH_DSS_WITH_AES_256_CBC_SHA. All other options of DH and DSS work, for example the DHE_DSS ciphers and DH_anon work fine. Any ideas? -- Nadav Golo

Problem with two DH DSS ciphers

2005-11-14 Thread Nadav Golombick
Hi, When running the openssl with DSA certificates and DH parameter files, I can't select the ciphers TLS_DH_DSS_WITH_AES_128_CBC_SHA and TLS_DH_DSS_WITH_AES_256_CBC_SHA. All other options of DH and DSS work, for example the DHE_DSS ciphers and DH_anon work fine. Any ideas? -- Nadav Golo

Re: Problem with DSS ciphersuites

2005-11-14 Thread Nadav Golombick
I have added the DH parameters and I know they are okay since regualr DH sessions work. The problem is when switch RSA to DSA On 11/14/05, Victor B. Wagner <[EMAIL PROTECTED]> wrote: > On 2005.11.14 at 08:08:07 +0200, Nadav Golombick wrote: > > > I am trying to perform a h

Problem with DSS ciphersuites

2005-11-13 Thread Nadav Golombick
I am trying to perform a handshake using DSS cipher suites. Everytime I attempt it, I get a no shared cipher message. The certificate I am using contains RSA certificates and DSA public and private keys (chained certificate). What am I doing wrong? -- Nadav Golombick

Static RSA - What is it?

2005-11-02 Thread Nadav Golombick
Hi, I am trying to use SSLdump to decrypt information I created using OpenSSL. The limitation that the dump has is the it can only decrypt streams where Static RSA was used. Anyone know what that is? -- Nadav Golombick

Re: Error 336445449 (140DC009):SSL routines:SSL_CTX_use_certificate_chain_file:PEM lib

2005-10-30 Thread Nadav Golombick
y because of freeing the SSL CTX object. The CTX holds > several information about the environment, ciphers and freeing it and then > creating it may not initialize the CTX correctly. > > > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] Behalf Of

Error 336445449 (140DC009):SSL routines:SSL_CTX_use_certificate_chain_file:PEM lib

2005-10-27 Thread Nadav Golombick
one and try and call the function again, this time with a good file. That's when this error appears. If I try and call the good file for a second time, it succeeds. My question is how do I call the good file the first time round? -- Nadav Golo

Password too long

2005-10-23 Thread Nadav Golombick
What is the correct procedure if I come to a situation where the password length is too big for the given buffer. -- Nadav Golombick __ OpenSSL Project http://www.openssl.org User Support Mailing

What action should be taken when password too long?

2005-10-10 Thread Nadav Golombick
When the password to be returned in the callback function is too long for the buffer given, what action should be taken? Should zero be returned or a truncuated password? Thanks, -- Nadav Golombick __ OpenSSL Project

Fragmentation in handshake with session

2005-07-31 Thread Nadav Golombick
occur if we resume the session since the client sends the final handshake command and the first message. How will OpenSSL handle this? -- Nadav Golombick -- Nadav Golombick __ OpenSSL Project http

Fragmentation in handshake with session

2005-07-28 Thread Nadav Golombick
command and the first message. How will OpenSSL handle this? -- Nadav Golombick __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org

Verifying certificate integrity

2005-07-19 Thread Nadav Golombick
Is there any way for me to verify that the contents of the certificates that I am loading are okay? In addition, can I check to see if the chained certificate holds an RSA certificate? -- Nadav Golombick __ OpenSSL Project

Re: Setting memory buffer for BIO_s_mem operations

2005-06-28 Thread Nadav Golombick
That is memory for reading. What about memory for writing? On 6/28/05, Prashant Kumar <[EMAIL PROTECTED]> wrote:  Look under the documentation for BIO_s_mem, an example is given there.   char data[] = "Hello World"; BIO *mem; mem = BIO_new_mem_buf(data, -1);   Regards, Prashant.

Approximate memory ratio for encrypted and non encrypted data

2005-06-28 Thread Nadav Golombick
Hi,   Is there an average ratio to encrypted --> non-encrypted data?-- Nadav Golombick

Setting memory buffer for BIO_s_mem operations

2005-06-28 Thread Nadav Golombick
Hi,   I was wondering if there is a way to set my own memory buffer for the use of BIO_read and BIO_write operations when using BIO_s_mem functions? My problem is that I don't want the waste of copying from one memory to another.   Thanks,-- Nadav Golombick

Is it possible to define what the symmetric encryption key would be

2005-06-07 Thread Nadav Golombick
security issue is not a problem since I will enable this feature for debugging. Thanks, -- Nadav Golombick __ OpenSSL Project http://www.openssl.org User Support Mailing List

Openssl multithreaded use with only 2 threads and SSL_CTX per thread

2005-05-30 Thread Nadav Golombick
If I am using only 2 threads with each thread containing its own SSL_CTX object, do I still need to use locking functions? -- Nadav Golombick

Exception when using SSL_connect with BIO_s_mem

2005-05-08 Thread Nadav Golombick
ult = SSL_connect(newSSL); // HERE IS THE CRASH   result = SSL_get_error(newSSL,result);   error_code=ERR_get_error();   //nRead = BIO_ctrl_pending(bWrite);   //result = BIO_read(bWrite,buf,nRead);   return 0; } Nadav Golombick