RE: certificate embedded into the executable

2005-08-16 Thread David Schwartz
> David Schwartz wrote: > >>Dr. Stephen Henson wrote: > > > >>A determined and knowledgable attacker can subvert anything that's > >>not in hardware. > > > > I think this is a very strange thing to say. If he has access to the > > hardware, he can subvert it too. If he doesn't have access to

Re: certificate embedded into the executable

2005-08-16 Thread Bear Giles
David Schwartz wrote: >>Dr. Stephen Henson wrote: > >>A determined and knowledgable attacker can subvert anything that's >>not in hardware. > > I think this is a very strange thing to say. If he has access to the > hardware, he can subvert it too. If he doesn't have access to the hardware, >

Re: certificate embedded into the executable

2005-08-16 Thread Bear Giles
David Schwartz wrote: > %.h: %.pem > xxd -i $< > $@ That's compile time so it's not quite as flexible as the link time command. Why does this matter? You might have a situation where the source code is managed by one group without access to the PKI objects, and the PKI objects are managed

Re: certificate embedded into the executable

2005-08-16 Thread Dr. Stephen Henson
On Tue, Aug 16, 2005, David Schwartz wrote: > > > Dr. Stephen Henson wrote: > > > A determined and knowledgable attacker can subvert anything that's > > not in hardware. > > I think this is a very strange thing to say. If he has access to the > hardware, he can subvert it too. If he doesn

RE: certificate embedded into the executable

2005-08-16 Thread David Schwartz
> Dr. Stephen Henson wrote: > A determined and knowledgable attacker can subvert anything that's > not in hardware. I think this is a very strange thing to say. If he has access to the hardware, he can subvert it too. If he doesn't have access to the hardware, how can he subvert the soft

RE: certificate embedded into the executable

2005-08-16 Thread David Schwartz
> cert.o: cert.pem > ld -o $@ (flags) $< Or even: %.h: %.pem xxd -i $< > $@ DS __ OpenSSL Project http://www.openssl.org User Support Mailing List

Re: certificate embedded into the executable

2005-08-16 Thread Bear Giles
Dr. Stephen Henson wrote: > Depends on whether you want it embedded in the executable after it has been > linked or at compile time, i.e. embedded in a C source file. I think this is slightly off, but at link time (using the gnu tool chain) you can use: ld -b binary -r -o root.o root.pem then

Re: certificate embedded into the executable

2005-08-16 Thread Dr. Stephen Henson
On Tue, Aug 16, 2005, James Whitwell wrote: > Hi, > > Can anyone tell me if it's possible to embed a client certificate inside > my executable, and what calls I should use to tell OpenSSL to use it? I > think I'll also need to do it for the CA, since we use self-signed > certificates, and I w

Re: certificate embedded into the executable

2005-08-15 Thread Bear Giles
C L wrote: > Theoretically it's possible to embed certificates into a Windows and > Linux executables - not sure about other architectures though. I don't recall the exact invocation off the top of my head but you can create a make rule that's something like: cert.o: cert.pem ld -o $@ (fla

Re: certificate embedded into the executable

2005-08-15 Thread Tan Eng Ten
Try if below works for you: unsigned char buf[] = "- BEGIN CERTIFICATE - ... - END CERTIFICATE -"; /* copy the entire certificate file (PEM formatted) and stick it in here */ BIO *bio = NULL; X509 *x509 = NULL; bio = BIO_new_mem_buf(buf, -1); x509 = PEM_read_bio_X509(bio, NUL

RE: certificate embedded into the executable

2005-08-15 Thread C L
Theoretically it's possible to embed certificates into a Windows and Linux executables - not sure about other architectures though. In my spare time I've been researching this topic as well. You can use the ImageAddCertificate() Win32 API from Imagehlp.dll to programmatically store a certific