Re: A question about the “localhost.key” and “localhost.crt” files.

2020-09-04 Thread Thomas Dwyer III
The filenames themselves are insignificant. You can name them anything you want. The apache configuration file(s) contain key/value pairs where SSLCertificateFile specifies the path to the file containing your certificate and SSLCertificateKeyFile specifies the path to the file containing your priv

A question about the “localhost.key” and “localhost.crt” files.

2020-09-04 Thread Jason Long via openssl-users
Hello, I think “localhost.crt” and “localhost.key” files using by Apache and they are mandatory for get a HTTPS certificate. Some tools like "Certbot" need them. If these files deleted then how can I regenerate them? Is below command OK? # openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyo

Re: [openssl-users] Posting a question

2018-04-30 Thread Simon Edwards
That's odd. I've been waiting for a post that I sent on Friday to appear. Nothing so far. The list seems to be far more active now than on Friday. On Sun, Apr 29, 2018 at 5:44 PM, Salz, Rich via openssl-users < openssl-users@openssl.org> wrote: > >- I have posted my question into the forum.

Re: [openssl-users] Posting a question

2018-04-29 Thread Salz, Rich via openssl-users
* I have posted my question into the forum. Please kindly approve it as soon as possible. Which forum? The fact that you were able to post to the openssl-users mailing list means you should just post your question, well, to the openssl-users mailing list. ☺ -- openssl-users mailing list To

[openssl-users] Posting a question

2018-04-29 Thread Anil kumar Reddy
Hello, I have posted my question into the forum. Please kindly approve it as soon as possible. Thanking you, BR, Anil Kumar Reddy Morthala -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] A question DH parameter generation and usage

2017-12-07 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf > Of Jakob Bohm > Sent: Thursday, December 07, 2017 01:44 > > > Actually in some of my code, I have found that the callback can > still be useful by examining the SSL session argument to > heuristically identify likely clien

Re: [openssl-users] A question DH parameter generation and usage

2017-12-06 Thread Jakob Bohm
On 06/12/2017 20:25, Michael Wojcik wrote: From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of Viktor Dukhovni Sent: Wednesday, December 06, 2017 13:21 On Dec 6, 2017, at 8:51 AM, Michael Wojcik wrote: Note: If you use OpenSSL 1.0.x and you use the DH parameter callb

Re: [openssl-users] A question DH parameter generation and usage

2017-12-06 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf > Of Viktor Dukhovni > Sent: Wednesday, December 06, 2017 13:21 > > > On Dec 6, 2017, at 8:51 AM, Michael Wojcik > wrote: > > > > > > Note: If you use OpenSSL 1.0.x and you use the DH parameter callback, be > > aware that

Re: [openssl-users] A question DH parameter generation and usage

2017-12-06 Thread Viktor Dukhovni
> On Dec 6, 2017, at 8:51 AM, Michael Wojcik > wrote: > > > Note: If you use OpenSSL 1.0.x and you use the DH parameter callback, be > aware that the callback isn't invoked in a useful manner by OpenSSL. (It > always asks for a 1024-bit group, unless an export cipher suite was selected, >

Re: [openssl-users] [openssl-dev] A question DH parameter generation and usage

2017-12-06 Thread Jayalakshmi bhat
Hi Rich, Thanks for the reply. We are planning to use DHE_RSA based ciphers. Regards Jaya On Wed, Dec 6, 2017 at 7:20 PM, Salz, Rich via openssl-users < openssl-users@openssl.org> wrote: > You can re-use the keys, but then you get no forward secrecy, and sessions > generated with one connectio

Re: [openssl-users] [openssl-dev] A question DH parameter generation and usage

2017-12-06 Thread Jayalakshmi bhat
Hi Michael, Thanks for very detailed answers. This will surely help me to investigate further. Regards Jaya On Wed, Dec 6, 2017 at 7:37 PM, Michael Wojcik < michael.woj...@microfocus.com> wrote: > > From: openssl-users [mailto:openssl-users-boun...@openssl.org] On > Behalf Of Salz, Rich via ope

Re: [openssl-users] [openssl-dev] A question DH parameter generation and usage

2017-12-06 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of > Salz, Rich via openssl-users > Sent: Wednesday, December 06, 2017 08:50 > You can re-use the keys, but then you get no forward secrecy, and sessions > generated with one connection are > vulnerable to another. If yo

Re: [openssl-users] A question DH parameter generation and usage

2017-12-06 Thread Michael Wojcik
For TLSv1.3, servers are no longer allowed to specify arbitrary DH groups (for finite-field or EC DH). They must use one of the named groups. So for 1.3, there's no point in generating your own groups; conforming implementations can't use them. For finite-field DH, those are the groups specifie

Re: [openssl-users] [openssl-dev] A question DH parameter generation and usage

2017-12-06 Thread Salz, Rich via openssl-users
You can re-use the keys, but then you get no forward secrecy, and sessions generated with one connection are vulnerable to another. Why are you using DH? Unless you have compelling reasons (interop with legacy), you really should use ECDHE. -- openssl-users mailing list To unsubscribe: https:

Re: [openssl-users] A question DH parameter generation and usage

2017-12-06 Thread Jayalakshmi bhat
Hi Jakob and Paul, Thank you so much for the reply. We have the RSA certificates. I wanted to understand how generally DH parameters are generated. Thanks for the detailed answers. Regards Jayalakshmi On Wed, Dec 6, 2017 at 12:48 AM, Jakob Bohm wrote: > On 06/12/2017 07:02, Jayalakshmi bhat wr

Re: [openssl-users] A question DH parameter generation and usage

2017-12-05 Thread Jakob Bohm
On 06/12/2017 07:02, Jayalakshmi bhat wrote: Hi, We are planning to use DHE_RSA TLS ciphers into our product. I have few questions on using DH parameter. We would like to use DH-2048. our product includes both TLS client and server applications. Thus any time there will be considerable numbe

Re: [openssl-users] [openssl-dev] A question DH parameter generation and usage

2017-12-05 Thread Paul Yang
For DHE_RSA, you first need a pair of RSA certificate/key for signing. And you if want to use specific DH parameters, you can use the SSL_CTX_set_tmp_dh API, there is documentation describing how to use this function. DH parameter could be generated by OpenSSL in many ways, one of the common way

[openssl-users] A question DH parameter generation and usage

2017-12-05 Thread Jayalakshmi bhat
Hi, We are planning to use DHE_RSA TLS ciphers into our product. I have few questions on using DH parameter. We would like to use DH-2048. our product includes both TLS client and server applications. Thus any time there will be considerable number of active connectioons. I believe we can use sa

[openssl-users] a question on SSL_MAX_BUF_FREELIST_LEN_DEFAULT

2015-05-10 Thread Jayalakshmi bhat
Hi All, We are using OpenSSL on a multihome device. Device has 4 interfaces. Each network interface creates one SSL context (SSL_CTX) and supports 16 connections. As per OpenSSL implementation Each SSL context can maintain a free buffer list of 32. And this retained till SSL context (SSL_CTX) is

[openssl-users] A question to the VMS folks out there (SSL_TASK)

2015-04-04 Thread Richard Levitte
Hi, this is a question to the VMS folks out there. A few days ago, I took SSL_TASK out of the OpenSSL master branch (that is, the files crypto/bio/bss_rtcp.c and ssl/ssl_task.c). It never really belonged in OpenSSL but stayed there for reasons only historians can tell at this point. I&#

Re: A question on EVP_PKEY_copy_parameters

2013-06-14 Thread Viktor Dukhovni
On Wed, Jun 12, 2013 at 12:02:52PM -0700, anu.engineer wrote: > Just before signing the certificate the code executes this fragment > > pktmp=X509_get_pubkey(ret); > if (EVP_PKEY_missing_parameters(pktmp) && > !EVP_PKEY_missing_parameters(pkey)) > EVP_PKEY_copy_parameters(pktmp,pkey); > E

Re: A question on EVP_PKEY_copy_parameters

2013-06-14 Thread anu engineer
Hi Dave, This is a very detailed and excellent answer, Thank you very much Anu On Wed, Jun 12, 2013 at 6:59 PM, Dave Thompson wrote: > >From: owner-openssl-us...@openssl.org On Behalf Of anu.engineer > >Sent: Wednesday, 12 June, 2013 15:03 > > > I am reading thru the ca.c in the apps director

RE: A question on EVP_PKEY_copy_parameters

2013-06-12 Thread Dave Thompson
>From: owner-openssl-us...@openssl.org On Behalf Of anu.engineer >Sent: Wednesday, 12 June, 2013 15:03 > I am reading thru the ca.c in the apps directory to understand how >to issue a certificate using OpenSSL and I came across this fragment >of code which I am struggling to understand. >Just b

A question on EVP_PKEY_copy_parameters

2013-06-12 Thread anu.engineer
Hi All, I am reading thru the ca.c in the apps directory to understand how to issue a certificate using OpenSSL and I came across this fragment of code which I am struggling to understand. Just before signing the certificate the code executes this fragment pktmp=X509_get_pubkey(ret); if (EVP_PK

Re: connection encrypted (a question)

2013-05-13 Thread Chris L
On May 12, 2013, at 6:38 PM, Salz, Rich wrote: > Many people find the four-letter word at the start of your domain name > offensive. > > I'm assuming you know English well enough to know that, and chose it > deliberately. > > That's reading beyond the cover. It broadcasts a general lack of r

RE: connection encrypted (a question)

2013-05-12 Thread Salz, Rich
Many people find the four-letter word at the start of your domain name offensive. I'm assuming you know English well enough to know that, and chose it deliberately. That's reading beyond the cover. /r$ -- Principal Security Engineer Akamai Technology Cambridge, MA _

Re: connection encrypted (a question)

2013-05-12 Thread Jakob Bohm
Hello sir, You may not know this, but the name you chose for your domain literally means making babies with lots of random people, violating the trust of both your wife/husband, other peoples wives and husbands and one of the 10 commandments, while simultaneously risking the spread of related dis

Re: connection encrypted (a question)

2013-05-12 Thread Pol Hallen
> I would not answer someone's email from "fuckaround.org" and I find it > utterly inconsiderate and tasteless > to send an email with that return address in the first place. fuckaround.org is my domain to test my server. It's a name like another. What's the problem? Do you evalute a book from it

Re: connection encrypted (a question)

2013-05-12 Thread Stephan V Bechtolsheim
not respond to such email (in terms of the technical question asked). StvB > > From: "openss...@fuckaround.org" >To: openssl-users@openssl.org >Sent: Sunday, May 12, 2013 2:59 AM >Subject: connection encrypted (a question) > &

Re: connection encrypted (a question)

2013-05-12 Thread Jakob Bohm
On 12-05-2013 09:59, openss...@expletitive-deleted.org wrote: Hi folks! I'm a newbie and I'd like understand know a thing: I create a certificate and put it to my apache web server openssl req -x509 -days 365 -newkey rsa:4096 -keyout apache.key -out apache.crt everything works perfectly. The

connection encrypted (a question)

2013-05-12 Thread opensslml
Hi folks! I'm a newbie and I'd like understand know a thing: I create a certificate and put it to my apache web server openssl req -x509 -days 365 -newkey rsa:4096 -keyout apache.key -out apache.crt everything works perfectly. The question: using firefox I see: Techinical Details Connection en

RE: A Question on Cipher Format.

2012-05-11 Thread Erik Tkal
ehalf Of Matt Caswell (fr...@baggins.org) Sent: Friday, May 11, 2012 5:01 AM To: openssl-users@openssl.org Subject: Re: A Question on Cipher Format. TLS = Transport Layer Security DHE = Diffie Hellman Ephemeral RSA = Public Key Cryptography algorithm named after inventors, Rivest, Shamir &

Re: A Question on Cipher Format.

2012-05-11 Thread Matt Caswell (fr...@baggins.org)
gt; Best Regards, > Siba Shankar Rout > -- > View this message in context: > http://old.nabble.com/A-Question-on-Cipher-Format.-tp33772869p33772869.html > Sent from the OpenSSL - User mailing list archive at Nabble.com. > > __

A Question on Cipher Format.

2012-05-11 Thread Mr.Rout
Dear All, What is the significance of each phrase in the below cipher suite ? Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA May be this is a dump question. But i am interested to know each phrase. Best Regards, Siba Shankar Rout -- View this message in context: http://old.nabble.com/A

RE: a question about openssl sessions

2012-04-24 Thread Dave Thompson
:14 To: openssl-users@openssl.org Subject: Re: a question about openssl sessions On Thu, Apr 19, 2012 at 19:45, Dave Thompson wrote: > From: owner-openssl-us...@openssl.org On Behalf Of Stéphane Charette > Sent: Sunday, 15 April, 2012 20:31 > I'm using Openss

Re: a question about openssl sessions

2012-04-21 Thread Stéphane Charette
On Thu, Apr 19, 2012 at 19:45, Dave Thompson wrote: > > From: owner-openssl-us...@openssl.org On Behalf Of Stéphane > Charette > > Sent: Sunday, 15 April, 2012 20:31 > > > I'm using Openssl to talk to a server that expects to re-use ssl > > sessions when a client needs to open m

RE: a question about openssl sessions

2012-04-19 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Stéphane Charette > Sent: Sunday, 15 April, 2012 20:31 > I'm using Openssl to talk to a server that expects to re-use ssl > sessions when a client needs to open many SSL connections. I have > the same code working on Linux a

a question about openssl sessions

2012-04-15 Thread Stéphane Charette
I've sent 3 e-mails to the list over the past 10 days, but not a single reply. I'm a bit worried, as I don't know how else to get help on OpenSSL. I'm using Openssl to talk to a server that expects to re-use ssl sessions when a client needs to open many SSL connections. I have the same code work

Re: a question about Diffie-Hellman key exchange mode

2009-07-06 Thread William Cai
nssl-us...@openssl.org] *On Behalf Of *William Cai > *Sent:* Monday, July 06, 2009 3:25 AM > *To:* openssl-users@openssl.org > *Subject:* Re: a question about Diffie-Hellman key exchange mode > > Thanks Michael! Could you please share me some information about

RE: a question about Diffie-Hellman key exchange mode

2009-07-06 Thread PMHager
[mailto:owner-openssl-us...@openssl.org] On Behalf Of William Cai Sent: Monday, July 06, 2009 3:25 AM To: openssl-users@openssl.org Subject: Re: a question about Diffie-Hellman key exchange mode Thanks Michael! Could you please share me some information about when/how to agree upon p & g? Th

Re: a question about Diffie-Hellman key exchange mode

2009-07-05 Thread William Cai
Thanks Michael! Could you please share me some information about when/how to agree upon p & g? Thanks, William From: Michael Sierchio To: openssl-users@openssl.org Sent: Sunday, July 5, 2009 11:58:42 PM Subject: Re: a question about Diffie-Hellman

Re: a question about Diffie-Hellman key exchange mode

2009-07-05 Thread Michael Sierchio
William Cai wrote: > According to my understanding, Diffie-Hellman algorithm is based on > something like this, > 1. public prime number, p > 2. public base, g > 3. Side A's private key, a > 4. Side A's public key, A = g ^ a mod p > 5. Side B's private key, b > 6. Side B's public key, B = g ^ b mo

a question about Diffie-Hellman key exchange mode

2009-07-05 Thread William Cai
Hi list, I get a question regarding Diffie-Hellman key exchange of SSL. Not sure if this is the right place for such question. But this could be an easy one for those who are familiar with SSL protocol. :-) Below is cited from William Stallings' paper. - cited

RE: A question about X509 certificates

2009-06-18 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Satish Chandra Kilaru > Sent: Wednesday, 17 June, 2009 13:50 > In the following sample certificate, there is a tun of > information before --BEGIN CERTIFICATE--. > Who is this for? Is it for a human reader to make sense of > who/what this cert

Re: A question about X509 certificates

2009-06-17 Thread Kyle Hamilton
It's probably because 'openssl req -x509' was used to create it, without using the -set-serial option. -Kyle H On Wed, Jun 17, 2009 at 12:00 PM, Satish Chandra Kilaru wrote: > Hi Kyle > > Thank you. This was generated using openssl command. Could illegal > serial number be because of a wrong entr

Re: A question about X509 certificates

2009-06-17 Thread Satish Chandra Kilaru
Hi Kyle Thank you. This was generated using openssl command. Could illegal serial number be because of a wrong entry in conf file? --Satish On Wed, Jun 17, 2009 at 2:34 PM, Kyle Hamilton wrote: > It is basically a human-readable expression of the data that's in the > certificate.  Theoretically,

Re: A question about X509 certificates

2009-06-17 Thread Kyle Hamilton
It is basically a human-readable expression of the data that's in the certificate. Theoretically, the certificate could be regenerated from the data in this expression, but I've never seen an implementation that makes it possible. This certificate is in violation of PKIX because its serial number

A question about X509 certificates

2009-06-17 Thread Satish Chandra Kilaru
Hi In the following sample certificate, there is a tun of information before --BEGIN CERTIFICATE--. Who is this for? Is it for a human reader to make sense of who/what this certificate is certifying? If it is for a s/w program that uses certificates, how is this information supposed to be used? T

RE: A question regarding Maximum Fragment Length

2009-05-15 Thread David Schwartz
> ok. That sounds good. But, what I'm seeing is that the SSL client > hangs when the message size is more than 16KB. What do you mean by "the message size"? SSL doesn't have messages that are visible outside of the SSL implementation itself. > Do I need to break this large message up in smaller

Re: A question regarding Maximum Fragment Length

2009-05-15 Thread Victor Duchovni
On Fri, May 15, 2009 at 05:22:16PM -0400, Animesh Chowdhury wrote: > ok. That sounds good. But, what I'm seeing is that the SSL client hangs when > the message size is more than 16KB. > Do I need to break this large message up in smaller chunks or can I use > SSL_write to send the whole message in

Re: A question regarding Maximum Fragment Length

2009-05-15 Thread Animesh Chowdhury
ok. That sounds good. But, what I'm seeing is that the SSL client hangs when the message size is more than 16KB. Do I need to break this large message up in smaller chunks or can I use SSL_write to send the whole message in one shot? Thanks. Animesh On Fri, May 15, 2009 at 3:50 PM, Kyle Hamilton

Re: A question regarding Maximum Fragment Length

2009-05-15 Thread Kyle Hamilton
No matter what you do, the "maximum fragment length" -- the MTU -- is going to break all of your communications down into smaller packets. TLS, in its basic form, is designed to be as close as possible to a replacement for read() and write() -- you read from the connection, you write to the connec

Re: A question regarding Maximum Fragment Length

2009-05-15 Thread Michael S. Zick
On Thu May 14 2009, Animesh Chowdhury wrote: > Hi, > I've run into an problem where the data that I need to send to the client is > more than 16KB. How do I set up the session so that I can do the maximum > fragment length negotiation ? > Any example code related to this will be extremely helpful.

A question regarding Maximum Fragment Length

2009-05-15 Thread Animesh Chowdhury
Hi, I've run into an problem where the data that I need to send to the client is more than 16KB. How do I set up the session so that I can do the maximum fragment length negotiation ? Any example code related to this will be extremely helpful. I'm using openssl0.9.8j . Also if someone can tell me s

RE: A question about mal-formed private keys

2009-04-22 Thread Bob Barnes
ay, April 22, 2009 12:42 PM To: openssl-users@openssl.org Subject: Re: A question about mal-formed private keys On Wed, Apr 22, 2009, Bob Barnes wrote: > I've been working with OpenSSL to try and convert an existing > private key generated by an old SSL software package and during the &

Re: A question about mal-formed private keys

2009-04-22 Thread Dr. Stephen Henson
On Wed, Apr 22, 2009, Bob Barnes wrote: > Steve, > > Just so I'm clear, what I hear you saying is that when I re-encrypt the > RSA private key with the new password, that the error is not propagated to > the new private key file and that corresponds to what I see when I > subsequently decrypt

Re: A question about mal-formed private keys

2009-04-22 Thread Dr. Stephen Henson
On Wed, Apr 22, 2009, Bob Barnes wrote: > I've been working with OpenSSL to try and convert an existing private key > generated by an old SSL software package and during the process of using > PKCS8 to decrypt from the "Encrypted Private Key" to the "RSA Private Key" I > get an error "No Octet S

A question about mal-formed private keys

2009-04-22 Thread Bob Barnes
I've been working with OpenSSL to try and convert an existing private key generated by an old SSL software package and during the process of using PKCS8 to decrypt from the "Encrypted Private Key" to the "RSA Private Key" I get an error "No Octet String in PrivateKey". My understanding is that th

RE: a question about "SSL_CTX_free"

2007-01-09 Thread David Schwartz
> Guys: > I have a listening socket, waiting for connections from clients. When a > client connects to my server, I put SSL on socket and spin up a thread > to handle it. One client is one thread. All of these connections are > shared by same SSL_CTX ctx. This is the way I handle at the end of thi

RE: a question about "SSL_CTX_free"

2007-01-09 Thread David Schwartz
> > or i should close all ssl connections based on a ctx before i > call SSL_CTX_free? > Yes, you should. Huh? Why? What would be the point of having a reference count if you had to get rid of all other references before you could release your own? A chunk of code should call SSL_CTX_free as so

RE: a question about "SSL_CTX_free"

2007-01-09 Thread Dinh, Thao V CIV NSWCDD, K72
PROTECTED] On Behalf Of David Schwartz Sent: Monday, January 08, 2007 21:38 To: openssl-users@openssl.org Subject: RE: a question about "SSL_CTX_free" > guys: > > the man page for "SSL_CTX_free" says: > SSL_CTX_free() decrements the reference count of ctx, and removes

Re: a question about "SSL_CTX_free"

2007-01-08 Thread Marek Marcola
Hello, > 1. what make the reference count of ctx increase/decrease? SSL_new()/SSL_free() for example. > 2. if i call SSL_CTX_free, does that mean all ssl connections based on this > ctx will be closed automatically? No. > or i should close all ssl connections based on a ctx before i call > SSL_

RE: a question about "SSL_CTX_free"

2007-01-08 Thread David Schwartz
> guys: > > the man page for "SSL_CTX_free" says: > SSL_CTX_free() decrements the reference count of ctx, and removes > the SSL_CTX object pointed to by ctx and frees up the allocated > memory if the the reference count has reached 0. > i have a couple of questions regarding this: > > 1. what make

a question about "SSL_CTX_free"

2007-01-08 Thread Chong Peng
guys: the man page for "SSL_CTX_free" says: SSL_CTX_free() decrements the reference count of ctx, and removes the SSL_CTX object pointed to by ctx and frees up the allocated memory if the the reference count has reached 0. i have a couple of questions regarding this: 1. what make the reference

Re: i have a question ragarding self-signed certificate

2006-10-13 Thread Max Pritikin
Recall that even the 'ca' certificate is ultimately self-signed. So your question is really about why some self-signed certificates are more trusted than others. In some fashion you could ask this question about any typical 'brand name' store. Why is Store-X trusted more than Store-Y? Sim

i have a question ragarding self-signed certificate

2006-10-13 Thread Chong Peng
guys: we all know that a ca-signed certificate can provide authentication because the ca is trustable, by using ca-signed certificate, one is saying "i am somebady because the ca says so". but it seems that a self-signed certificate _cannot_ provide any authentication at all, because by using s

Re: A question about SSL connection reopen

2006-06-27 Thread Darryl Miles
Zhang, Long (Roger) wrote: > I have created a TLS connection with SSL_connect(ssl) successfully. ...SNIP.. Ah you're asking on the correct list now, you might get a useful answer. I think you may need to call SSL_clear() after SSL_shutdown() and before SSL_connect(). But if you are re-using th

A question about SSL connection reopen

2006-06-27 Thread Zhang, Long \(Roger\)
Hi, I have created a TLS connection with SSL_connect(ssl) successfully. Then I call SSL_shutdown(ssl) to close the TLS connectio sussessfully. Thenn I want to do the reopen with SSL_connect(ssl) . But I found it failed. The return value from ::SSL_get_error (ssl, status) is SSL_ERROR_SYSCALL, a

A question about SSL connection reopen

2006-06-27 Thread Zhang, Long \(Roger\)
Hi, I have created a TLS connection with SSL_connect(ssl) successfully. Then I call SSL_shutdown(ssl) to close the TLS connectio sussessfully. Thenn I want to do the reopen with SSL_connect(ssl) . But I found it failed. The return value from ::SSL_get_error (ssl, status) is SSL_ERROR_SYSCALL, a

Re: a question about loading private key and certificate to the ssl ctx

2006-01-26 Thread majorsoul (sent by Nabble.com)
is this supposed to be an answer? View this message in context: Re: a question about loading private key and certificate to the ssl ctx Sent from the OpenSSL - User forum at Nabble.com.

a question about loading private key and certificate to the ssl ctx

2006-01-26 Thread Chong Peng
guys:   usually, we use the following two apis to load key/certificate:   int SSL_CTX _use_certificate_file(SSL_CTX  *ctx, const char *file, int type);int SSL_CTX_use_PrivateKey_file(SSL_CTX *ctx, const char *file, int type); this, if i understand right, requires a private key and certifica

RE: a question about building openssl

2006-01-03 Thread Airey, John
> -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of George R Goffe > Sent: 30 December 2005 22:09 > To: openssl-users@openssl.org > Subject: a question about building openssl > > Howdy, > > I have looked a little on t

a question about building openssl

2005-12-30 Thread George R Goffe
Howdy, I have looked a little on the web sites for the answer to this question but don't see one redily available. I am building openssl on a redhat 9 system. My question is, "why is /usr/local/bin hardcoded througout the distribution?" RedHat installs perl it in /usr/bin and I have to fool around

i have a question

2005-09-23 Thread imana sakki
hello I read this email http://www.mail-archive.com/openssl-users@openssl.org/msg10920.html I have the same question, but i don't understand its answers please reply me if you know it now.    very very thank you Yahoo! for Good Click here to donate to the Hurricane Katrina relief effort.

RE: A question about openssl used library

2003-09-17 Thread David Schwartz
> Dear all: > I have a question about used libraries by openssl toolkits. > OpenSSL toolkits includes three modules: libssl.a ,libcrypto.a > ,and openssl. > Can I only use the command line tool "openssl" > independently without use any library like "libcr

A question about openssl used library

2003-09-17 Thread eric_sy_huang
Dear all: I have a question about used libraries by openssl toolkits. OpenSSL toolkits includes three modules: libssl.a ,libcrypto.a ,and openssl. Can I only use the command line tool "openssl" independently without use any library like "libcrypto.so.0.9.8" ?

Re: A question about ENGINE

2003-07-23 Thread Dr. Stephen Henson
On Wed, Jul 23, 2003, Michiels Olivier wrote: > Hi, > I've developped my own ENGINE with OpenSSL. I use that ENGINE to use the > private keys of my root certificates. Those certificates are used to > sign X509 certificates, CRLs and OCSP responses. > On the other part, one of my component that use

A question about ENGINE

2003-07-23 Thread Michiels Olivier
Hi, I've developped my own ENGINE with OpenSSL. I use that ENGINE to use the private keys of my root certificates. Those certificates are used to sign X509 certificates, CRLs and OCSP responses. On the other part, one of my component that use the ENGINE must open a ssl connection, the private k

Re: A question!

2002-03-27 Thread Robert Joop
On 02-03-26 14:29:47 CET, chenhaiyong wrote: > Dear webmaster: who? > When I use the openssl command: > > openssl req -config filename -new -x509 -days > 365 -key ca.key -out ca.crt > > to create a self signed certificate(ca.key is the > file where the CA's private key is pu

Re: I've a question about OCSP

2002-02-22 Thread Dr S N Henson
Francesco Dal Bello wrote: > > Hi. > > I have to build an OCSP client. I've download "openssl-0.9.6c.tar.gz", but I don't >find right headers referring to this argument. > Where do I find those headers? How is OpenSSL implementing this protocol? > OCSP support was added in 0.9.7, it isn't in

I've a question about OCSP

2002-02-22 Thread Francesco Dal Bello
Hi. I have to build an OCSP client. I've download "openssl-0.9.6c.tar.gz", but I don't find right headers referring to this argument. Where do I find those headers? How is OpenSSL implementing this protocol? Thanks Francesco Dal Bello ___

I've a question about OCSP

2002-02-22 Thread Francesco Dal Bello
Hi. I would build a client OCSP requestor. I've download "openssl-0.9.6c.tar.gz", but I don't find right headers referred to this argument. How do I find those headers? How is OpenSSL implementing this protocol? Best regards FDB

RE: a question about encrypt and decrypt using EVP interface

2001-07-20 Thread Dale Peakall
> memcpy(iv, "12345678", 8); > EVP_BytesToKey(EVP_idea_cbc(), EVP_md5(), "salt", pw, > strlen(pw), 1, key, > iv); The salt value should be at least 8 bytes long - you're getting 3 random bytes here. You don't need to specify an iv value as this function creates it. - Dale.

a question about encrypt and decrypt using EVP interface

2001-07-19 Thread White Jack
hi, I used EVP interface to encrypt and decrypt,but after I encrypted ,I couldn't decrypt it . Why? Any help is appreciated! void do_cipher(char *pw, int operation,char * InBuf,int InLen,char * OutBuf,int *OutBuflen) { //operation:0:DECRYPT // 1:

RE: a question about install

2001-04-09 Thread John . Airey
, Bakewell Road, Peterborough PE2 6XU, Tel.: +44 (0) 1733 375299 Fax: +44 (0) 1733 370848 [EMAIL PROTECTED] > -Original Message- > From: Jonas Jakobsson [mailto:[EMAIL PROTECTED]] > Sent: 06 April 2001 01:03 > To: [EMAIL PROTECTED] > Subject: Re: a question about install > > &

Re: a question about install

2001-04-07 Thread Jonas Jakobsson
> before i comple the openssl,i use the vcvars32.bat in the directory D:\Program Files\Microsoft Visual Studio\VC98\Bin > but it tell me that out of the environment space,what shoud i do ! I had the same problem. The soultion was in my case was to cut down the size of my path variable in confi

a question about install

2001-04-04 Thread luckpeople
Hi,all before i comple the openssl,i use the vcvars32.bat in the directory D:\Program Files\Microsoft Visual Studio\VC98\Bin but it tell me that out of the environment space,what shoud i do !And another question ,i want to know how I.E support ssl.Do i need make any changes about I.E? thank yo

Re: A Question

2001-04-02 Thread Greg Stark
] _ - Original Message - From: NG, Wei Yang To: '[EMAIL PROTECTED]' Cc: CHOONG, Woon Leng [Cheryn] Sent: Monday, April 02, 2001 3:09 AM Subject: A Question Hi, Hope that someone can help on this. I have modified a sample SSL server code obtained fr

A Question

2001-04-01 Thread NG, Wei Yang
Title: A Question Hi, Hope that someone can help on this. I have modified a sample SSL server code obtained from OpenSSL to implement a simple SSL server. Previously the server was working fine until recently, the problem happens at SSL_accept. The SSL_accept return -1 value and when I

RE: A question about threads

2000-11-24 Thread Dale Peakall
> I'm still fighting against casual fall-downs with my server and OpenSSL. I > found an interesting point from OpenSSL man pages that mentioned two > important call back functions that have to be set. "locking_funktion" and > "id_function". If I understood correctly the id one is not > needed with

Re: A question about threads

2000-11-24 Thread Shridhar Bhat
"Wirta, Ville" wrote: > > Hi all! > > I'm still fighting against casual fall-downs with my server and OpenSSL. I > found an interesting point from OpenSSL man pages that mentioned two > important call back functions that have to be set. "locking_funktion" and > "id_function". If I understood cor

A question about threads

2000-11-24 Thread Wirta, Ville
Hi all! I'm still fighting against casual fall-downs with my server and OpenSSL. I found an interesting point from OpenSSL man pages that mentioned two important call back functions that have to be set. "locking_funktion" and "id_function". If I understood correctly the id one is not needed with

Re: A question about distribute storage keys

2000-04-21 Thread Andrew W. Gray
Well I'm not Richard - but he is a really nice guy and I'm a nice guy too and have done some work on this before so I'll help you out. What you are speaking of is commonly known as a "secret sharing scheme". Most people start with shamir's secret sharing scheme. check out wei dai's crypt++ fo

A question about distribute storage keys

2000-04-20 Thread congling
Hi Mr Richard,     For some reason, I was about to programme for a "distributed storage" for a private key.     But I have no idea about how can do this.     This is my problem:     There are 6 people can hold the private key. When four of them meet together, they can     resto

A question

1999-10-14 Thread sandra
Dear Sir/Madam: I am using openssl to build a CA. When I use "ca -revoke" to revoke a cert, it changes my index.txt, but did not enter it to the crl_revoke list of the crl.pem. What can I do with this problem? Qin,Xiangping Tsinghua, China

A question on crls

1999-03-27 Thread Mario Fabiano
I have created a crl using the openssl command: ca -gencrl -config somepath/mypolicy.cnf -out anotherpath/mycrl.crl I have also tried to convert mycrl.crl to some other formats (DER, TXT); Whatever the format I use, Netscape Communicator refuses to load the crl and says: "The certificate revoca