certificate with
DH 512 and 1024 files.
--
Nadav Golombick
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager
Thanks
On 11/15/05, Dr. Stephen Henson <[EMAIL PROTECTED]> wrote:
> On Tue, Nov 15, 2005, Nadav Golombick wrote:
>
> > Hi,
> >
> > When running the openssl with DSA certificates and DH parameter files,
> > I can't select the ci
Hi,
When running the openssl with DSA certificates and DH parameter files,
I can't select the ciphers TLS_DH_DSS_WITH_AES_128_CBC_SHA and
TLS_DH_DSS_WITH_AES_256_CBC_SHA. All other options of DH and DSS work,
for example the DHE_DSS ciphers and DH_anon work fine.
Any ideas?
--
Nadav Golo
Hi,
When running the openssl with DSA certificates and DH parameter files,
I can't select the ciphers TLS_DH_DSS_WITH_AES_128_CBC_SHA and
TLS_DH_DSS_WITH_AES_256_CBC_SHA. All other options of DH and DSS work,
for example the DHE_DSS ciphers and DH_anon work fine.
Any ideas?
--
Nadav Golo
I have added the DH parameters and I know they are okay since regualr
DH sessions work. The problem is when switch RSA to DSA
On 11/14/05, Victor B. Wagner <[EMAIL PROTECTED]> wrote:
> On 2005.11.14 at 08:08:07 +0200, Nadav Golombick wrote:
>
> > I am trying to perform a h
I am trying to perform a handshake using DSS cipher suites. Everytime
I attempt it, I get a no shared cipher message.
The certificate I am using contains RSA certificates and DSA public
and private keys (chained certificate).
What am I doing wrong?
--
Nadav Golombick
Hi,
I am trying to use SSLdump to decrypt information I created using
OpenSSL. The limitation that the dump has is the it can only decrypt
streams where Static RSA was used. Anyone know what that is?
--
Nadav Golombick
y because of freeing the SSL CTX object. The CTX holds
> several information about the environment, ciphers and freeing it and then
> creating it may not initialize the CTX correctly.
>
>
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] Behalf Of
one and try and call the
function again, this time with a good file. That's when this error
appears.
If I try and call the good file for a second time, it succeeds.
My question is how do I call the good file the first time round?
--
Nadav Golo
What is the correct procedure if I come to a situation where the
password length is too big for the given buffer.
--
Nadav Golombick
__
OpenSSL Project http://www.openssl.org
User Support Mailing
When the password to be returned in the callback function is too long
for the buffer given, what action should be taken?
Should zero be returned or a truncuated password?
Thanks,
--
Nadav Golombick
__
OpenSSL Project
occur if we resume the session since the client sends the
final handshake command and the first message.
How will OpenSSL handle this?
--
Nadav Golombick
--
Nadav Golombick
__
OpenSSL Project http
command and the first message.
How will OpenSSL handle this?
--
Nadav Golombick
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Is there any way for me to verify that the contents of the
certificates that I am loading are okay? In addition, can I check to
see if the chained certificate holds an RSA certificate?
--
Nadav Golombick
__
OpenSSL Project
That is memory for reading. What about memory for writing?
On 6/28/05, Prashant Kumar <[EMAIL PROTECTED]> wrote:
Look under the documentation for BIO_s_mem, an example is given there.
char data[] = "Hello World"; BIO *mem; mem = BIO_new_mem_buf(data, -1);
Regards,
Prashant.
Hi,
Is there an average ratio to encrypted --> non-encrypted data?-- Nadav Golombick
Hi,
I was wondering if there is a way to set my own memory buffer for the use of BIO_read and BIO_write operations when using BIO_s_mem functions?
My problem is that I don't want the waste of copying from one memory to another.
Thanks,-- Nadav Golombick
security
issue is not a problem since I will enable this feature for debugging.
Thanks,
--
Nadav Golombick
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
If I am using only 2 threads with each thread containing its own SSL_CTX object, do I still need to use locking functions?
-- Nadav Golombick
ult = SSL_connect(newSSL); // HERE IS THE CRASH
result = SSL_get_error(newSSL,result);
error_code=ERR_get_error();
//nRead = BIO_ctrl_pending(bWrite);
//result = BIO_read(bWrite,buf,nRead);
return 0;
}
Nadav Golombick
20 matches
Mail list logo