Re: A question about the “localhost.key” and “localhost.crt” files.

2020-09-04 Thread Thomas Dwyer III
The filenames themselves are insignificant. You can name them anything you want. The apache configuration file(s) contain key/value pairs where SSLCertificateFile specifies the path to the file containing your certificate and SSLCertificateKeyFile specifies the path to the file containing your priv

Re: A question on EVP_PKEY_copy_parameters

2013-06-14 Thread Viktor Dukhovni
On Wed, Jun 12, 2013 at 12:02:52PM -0700, anu.engineer wrote: > Just before signing the certificate the code executes this fragment > > pktmp=X509_get_pubkey(ret); > if (EVP_PKEY_missing_parameters(pktmp) && > !EVP_PKEY_missing_parameters(pkey)) > EVP_PKEY_copy_parameters(pktmp,pkey); > E

Re: A question on EVP_PKEY_copy_parameters

2013-06-14 Thread anu engineer
Hi Dave, This is a very detailed and excellent answer, Thank you very much Anu On Wed, Jun 12, 2013 at 6:59 PM, Dave Thompson wrote: > >From: owner-openssl-us...@openssl.org On Behalf Of anu.engineer > >Sent: Wednesday, 12 June, 2013 15:03 > > > I am reading thru the ca.c in the apps director

RE: A question on EVP_PKEY_copy_parameters

2013-06-12 Thread Dave Thompson
>From: owner-openssl-us...@openssl.org On Behalf Of anu.engineer >Sent: Wednesday, 12 June, 2013 15:03 > I am reading thru the ca.c in the apps directory to understand how >to issue a certificate using OpenSSL and I came across this fragment >of code which I am struggling to understand. >Just b

RE: A Question on Cipher Format.

2012-05-11 Thread Erik Tkal
ehalf Of Matt Caswell (fr...@baggins.org) Sent: Friday, May 11, 2012 5:01 AM To: openssl-users@openssl.org Subject: Re: A Question on Cipher Format. TLS = Transport Layer Security DHE = Diffie Hellman Ephemeral RSA = Public Key Cryptography algorithm named after inventors, Rivest, Shamir &

Re: A Question on Cipher Format.

2012-05-11 Thread Matt Caswell (fr...@baggins.org)
TLS = Transport Layer Security DHE = Diffie Hellman Ephemeral RSA = Public Key Cryptography algorithm named after inventors, Rivest, Shamir & Adleman AES_128 = Advanced Encryption Standard using 128bit key CBC = Cipher Block Chaining (a block cipher mode of operation) SHA = Secure Hash Algorithm M

RE: a question about openssl sessions

2012-04-24 Thread Dave Thompson
:14 To: openssl-users@openssl.org Subject: Re: a question about openssl sessions On Thu, Apr 19, 2012 at 19:45, Dave Thompson wrote: > From: owner-openssl-us...@openssl.org On Behalf Of Stéphane Charette > Sent: Sunday, 15 April, 2012 20:31 > I'm using Openss

Re: a question about openssl sessions

2012-04-21 Thread Stéphane Charette
On Thu, Apr 19, 2012 at 19:45, Dave Thompson wrote: > > From: owner-openssl-us...@openssl.org On Behalf Of Stéphane > Charette > > Sent: Sunday, 15 April, 2012 20:31 > > > I'm using Openssl to talk to a server that expects to re-use ssl > > sessions when a client needs to open m

RE: a question about openssl sessions

2012-04-19 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Stéphane Charette > Sent: Sunday, 15 April, 2012 20:31 > I'm using Openssl to talk to a server that expects to re-use ssl > sessions when a client needs to open many SSL connections. I have > the same code working on Linux a

Re: a question about Diffie-Hellman key exchange mode

2009-07-06 Thread William Cai
nssl-us...@openssl.org] *On Behalf Of *William Cai > *Sent:* Monday, July 06, 2009 3:25 AM > *To:* openssl-users@openssl.org > *Subject:* Re: a question about Diffie-Hellman key exchange mode > > Thanks Michael! Could you please share me some information about

RE: a question about Diffie-Hellman key exchange mode

2009-07-06 Thread PMHager
[mailto:owner-openssl-us...@openssl.org] On Behalf Of William Cai Sent: Monday, July 06, 2009 3:25 AM To: openssl-users@openssl.org Subject: Re: a question about Diffie-Hellman key exchange mode Thanks Michael! Could you please share me some information about when/how to agree upon p & g? Th

Re: a question about Diffie-Hellman key exchange mode

2009-07-05 Thread William Cai
Thanks Michael! Could you please share me some information about when/how to agree upon p & g? Thanks, William From: Michael Sierchio To: openssl-users@openssl.org Sent: Sunday, July 5, 2009 11:58:42 PM Subject: Re: a question about Diffie-Hellman

Re: a question about Diffie-Hellman key exchange mode

2009-07-05 Thread Michael Sierchio
William Cai wrote: > According to my understanding, Diffie-Hellman algorithm is based on > something like this, > 1. public prime number, p > 2. public base, g > 3. Side A's private key, a > 4. Side A's public key, A = g ^ a mod p > 5. Side B's private key, b > 6. Side B's public key, B = g ^ b mo

RE: A question about X509 certificates

2009-06-18 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Satish Chandra Kilaru > Sent: Wednesday, 17 June, 2009 13:50 > In the following sample certificate, there is a tun of > information before --BEGIN CERTIFICATE--. > Who is this for? Is it for a human reader to make sense of > who/what this cert

Re: A question about X509 certificates

2009-06-17 Thread Kyle Hamilton
It's probably because 'openssl req -x509' was used to create it, without using the -set-serial option. -Kyle H On Wed, Jun 17, 2009 at 12:00 PM, Satish Chandra Kilaru wrote: > Hi Kyle > > Thank you. This was generated using openssl command. Could illegal > serial number be because of a wrong entr

Re: A question about X509 certificates

2009-06-17 Thread Satish Chandra Kilaru
Hi Kyle Thank you. This was generated using openssl command. Could illegal serial number be because of a wrong entry in conf file? --Satish On Wed, Jun 17, 2009 at 2:34 PM, Kyle Hamilton wrote: > It is basically a human-readable expression of the data that's in the > certificate.  Theoretically,

Re: A question about X509 certificates

2009-06-17 Thread Kyle Hamilton
It is basically a human-readable expression of the data that's in the certificate. Theoretically, the certificate could be regenerated from the data in this expression, but I've never seen an implementation that makes it possible. This certificate is in violation of PKIX because its serial number

RE: A question regarding Maximum Fragment Length

2009-05-15 Thread David Schwartz
> ok. That sounds good. But, what I'm seeing is that the SSL client > hangs when the message size is more than 16KB. What do you mean by "the message size"? SSL doesn't have messages that are visible outside of the SSL implementation itself. > Do I need to break this large message up in smaller

Re: A question regarding Maximum Fragment Length

2009-05-15 Thread Victor Duchovni
On Fri, May 15, 2009 at 05:22:16PM -0400, Animesh Chowdhury wrote: > ok. That sounds good. But, what I'm seeing is that the SSL client hangs when > the message size is more than 16KB. > Do I need to break this large message up in smaller chunks or can I use > SSL_write to send the whole message in

Re: A question regarding Maximum Fragment Length

2009-05-15 Thread Animesh Chowdhury
ok. That sounds good. But, what I'm seeing is that the SSL client hangs when the message size is more than 16KB. Do I need to break this large message up in smaller chunks or can I use SSL_write to send the whole message in one shot? Thanks. Animesh On Fri, May 15, 2009 at 3:50 PM, Kyle Hamilton

Re: A question regarding Maximum Fragment Length

2009-05-15 Thread Kyle Hamilton
No matter what you do, the "maximum fragment length" -- the MTU -- is going to break all of your communications down into smaller packets. TLS, in its basic form, is designed to be as close as possible to a replacement for read() and write() -- you read from the connection, you write to the connec

Re: A question regarding Maximum Fragment Length

2009-05-15 Thread Michael S. Zick
On Thu May 14 2009, Animesh Chowdhury wrote: > Hi, > I've run into an problem where the data that I need to send to the client is > more than 16KB. How do I set up the session so that I can do the maximum > fragment length negotiation ? > Any example code related to this will be extremely helpful.

RE: A question about mal-formed private keys

2009-04-22 Thread Bob Barnes
ay, April 22, 2009 12:42 PM To: openssl-users@openssl.org Subject: Re: A question about mal-formed private keys On Wed, Apr 22, 2009, Bob Barnes wrote: > I've been working with OpenSSL to try and convert an existing > private key generated by an old SSL software package and during the &

Re: A question about mal-formed private keys

2009-04-22 Thread Dr. Stephen Henson
On Wed, Apr 22, 2009, Bob Barnes wrote: > Steve, > > Just so I'm clear, what I hear you saying is that when I re-encrypt the > RSA private key with the new password, that the error is not propagated to > the new private key file and that corresponds to what I see when I > subsequently decrypt

Re: A question about mal-formed private keys

2009-04-22 Thread Dr. Stephen Henson
On Wed, Apr 22, 2009, Bob Barnes wrote: > I've been working with OpenSSL to try and convert an existing private key > generated by an old SSL software package and during the process of using > PKCS8 to decrypt from the "Encrypted Private Key" to the "RSA Private Key" I > get an error "No Octet S

RE: a question about "SSL_CTX_free"

2007-01-09 Thread David Schwartz
> Guys: > I have a listening socket, waiting for connections from clients. When a > client connects to my server, I put SSL on socket and spin up a thread > to handle it. One client is one thread. All of these connections are > shared by same SSL_CTX ctx. This is the way I handle at the end of thi

RE: a question about "SSL_CTX_free"

2007-01-09 Thread David Schwartz
> > or i should close all ssl connections based on a ctx before i > call SSL_CTX_free? > Yes, you should. Huh? Why? What would be the point of having a reference count if you had to get rid of all other references before you could release your own? A chunk of code should call SSL_CTX_free as so

RE: a question about "SSL_CTX_free"

2007-01-09 Thread Dinh, Thao V CIV NSWCDD, K72
PROTECTED] On Behalf Of David Schwartz Sent: Monday, January 08, 2007 21:38 To: openssl-users@openssl.org Subject: RE: a question about "SSL_CTX_free" > guys: > > the man page for "SSL_CTX_free" says: > SSL_CTX_free() decrements the reference count of ctx, and removes

Re: a question about "SSL_CTX_free"

2007-01-08 Thread Marek Marcola
Hello, > 1. what make the reference count of ctx increase/decrease? SSL_new()/SSL_free() for example. > 2. if i call SSL_CTX_free, does that mean all ssl connections based on this > ctx will be closed automatically? No. > or i should close all ssl connections based on a ctx before i call > SSL_

RE: a question about "SSL_CTX_free"

2007-01-08 Thread David Schwartz
> guys: > > the man page for "SSL_CTX_free" says: > SSL_CTX_free() decrements the reference count of ctx, and removes > the SSL_CTX object pointed to by ctx and frees up the allocated > memory if the the reference count has reached 0. > i have a couple of questions regarding this: > > 1. what make

Re: A question about SSL connection reopen

2006-06-27 Thread Darryl Miles
Zhang, Long (Roger) wrote: > I have created a TLS connection with SSL_connect(ssl) successfully. ...SNIP.. Ah you're asking on the correct list now, you might get a useful answer. I think you may need to call SSL_clear() after SSL_shutdown() and before SSL_connect(). But if you are re-using th

Re: a question about loading private key and certificate to the ssl ctx

2006-01-26 Thread majorsoul (sent by Nabble.com)
is this supposed to be an answer? View this message in context: Re: a question about loading private key and certificate to the ssl ctx Sent from the OpenSSL - User forum at Nabble.com.

RE: a question about building openssl

2006-01-03 Thread Airey, John
> -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of George R Goffe > Sent: 30 December 2005 22:09 > To: openssl-users@openssl.org > Subject: a question about building openssl > > Howdy, > > I have looked a little on the web sites for the answer to this

RE: A question about openssl used library

2003-09-17 Thread David Schwartz
> Dear all: > I have a question about used libraries by openssl toolkits. > OpenSSL toolkits includes three modules: libssl.a ,libcrypto.a > ,and openssl. > Can I only use the command line tool "openssl" > independently without use any library like "libcrypto.so.0.9.8" ?? It all depe

Re: A question about ENGINE

2003-07-23 Thread Dr. Stephen Henson
On Wed, Jul 23, 2003, Michiels Olivier wrote: > Hi, > I've developped my own ENGINE with OpenSSL. I use that ENGINE to use the > private keys of my root certificates. Those certificates are used to > sign X509 certificates, CRLs and OCSP responses. > On the other part, one of my component that use

Re: A question!

2002-03-27 Thread Robert Joop
On 02-03-26 14:29:47 CET, chenhaiyong wrote: > Dear webmaster: who? > When I use the openssl command: > > openssl req -config filename -new -x509 -days > 365 -key ca.key -out ca.crt > > to create a self signed certificate(ca.key is the > file where the CA's private key is pu

RE: a question about encrypt and decrypt using EVP interface

2001-07-20 Thread Dale Peakall
> memcpy(iv, "12345678", 8); > EVP_BytesToKey(EVP_idea_cbc(), EVP_md5(), "salt", pw, > strlen(pw), 1, key, > iv); The salt value should be at least 8 bytes long - you're getting 3 random bytes here. You don't need to specify an iv value as this function creates it. - Dale.

RE: a question about install

2001-04-09 Thread John . Airey
, Bakewell Road, Peterborough PE2 6XU, Tel.: +44 (0) 1733 375299 Fax: +44 (0) 1733 370848 [EMAIL PROTECTED] > -Original Message- > From: Jonas Jakobsson [mailto:[EMAIL PROTECTED]] > Sent: 06 April 2001 01:03 > To: [EMAIL PROTECTED] > Subject: Re: a question about install > > &

Re: a question about install

2001-04-07 Thread Jonas Jakobsson
> before i comple the openssl,i use the vcvars32.bat in the directory D:\Program Files\Microsoft Visual Studio\VC98\Bin > but it tell me that out of the environment space,what shoud i do ! I had the same problem. The soultion was in my case was to cut down the size of my path variable in confi

Re: A Question

2001-04-02 Thread Greg Stark
A QuestionPlease check out (http://www.openssl.org/docs/ssl/SSL_get_error.html#) and collect all possible error information before posting, including the underlying socket error code if applicable. Thank, _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED]

RE: A question about threads

2000-11-24 Thread Dale Peakall
> I'm still fighting against casual fall-downs with my server and OpenSSL. I > found an interesting point from OpenSSL man pages that mentioned two > important call back functions that have to be set. "locking_funktion" and > "id_function". If I understood correctly the id one is not > needed with

Re: A question about threads

2000-11-24 Thread Shridhar Bhat
"Wirta, Ville" wrote: > > Hi all! > > I'm still fighting against casual fall-downs with my server and OpenSSL. I > found an interesting point from OpenSSL man pages that mentioned two > important call back functions that have to be set. "locking_funktion" and > "id_function". If I understood cor

Re: A question about distribute storage keys

2000-04-21 Thread Andrew W. Gray
Well I'm not Richard - but he is a really nice guy and I'm a nice guy too and have done some work on this before so I'll help you out. What you are speaking of is commonly known as a "secret sharing scheme". Most people start with shamir's secret sharing scheme. check out wei dai's crypt++ fo