hi,
i am sending mail for the first time.i joined recently.i was going through the openssl code and i have come a long way in understanding the high-levelcryptography structure -- where the methods are found, how to use them,etc, but i got stuck in the following: in openssl-0.9.7g/crypto/rsa/rsa.h
Hi
I was wondering if there is a list of all the hardware accelerators that
openssl supports? Or at the very least if someone can tell
me if this card from Intel would be supported by OpenSSL.
http://www.intel.com/network/connectivity/products/pro100dport_adapter.htm
Regards
/Cole
Hello,
I am new to OpenSSL programming through C.
This is my first program, so I am not sure whether
I have achieved secure session between client and server or not,
though they are able to communicate
using SSL_write/read functions.
This is how I did the things
At server I loaded certificate &
use ssldump or tcpdump to view if the connection is being established in a secure mannerOn 6/7/05, Rohan Shrivastava <
[EMAIL PROTECTED]> wrote:Hello,I am new to OpenSSL programming through C.
This is my first program, so I am not sure whetherI have achieved secure session between client and server
> I was wondering if there is a list of all the hardware
> accelerators that openssl supports? Or at the very least if
> someone can tell
> me if this card from Intel would be supported by OpenSSL.
>
> http://www.intel.com/network/connectivity/products/pro100dport_adapter.htm
As I unders
Title: Message
Hi
all.
I've been making out fairly well with my usage of LWP
and IO::Socket::SSL, to the point where I'm trying to include a list of trusted
peer server and CA certs to trust.
The only problem is I can't seem to force OpenSSL to
drop all non-trusted/verified SSL connecti
OK, here we go...
From: Chris Mckenzie
[mailto:[EMAIL PROTECTED] Sent: den 7 juni 2005
20:12To: openssl-users@openssl.orgSubject: Requesting your
encryption certificate
This is an automated message that has been sent because a person at
[EMAIL PROTECTED]
has attempted to send you a secure
rtfn0wUD3V1eN.rtf
Description: RTF file
smime.p7s
Description: S/MIME cryptographic signature
And wow does your life flash before you when you realize you've just hit
send to the mailing list...
I thought I was replying to a Chris McKenzie I happen to know.
Sorry all.
-Original Message-
From: Chris Mckenzie [mailto:[EMAIL PROTECTED]
Sent: den 7 juni 2005 21:24
To: 'openssl-user
Title: Message
Have you tried setting the verify mode? It's
ignored by default.
From man IO::Socket::SSL:
SSL_verify_mode
This option sets the verification mode for the peer
certificate.
The default (0x00) does no authentication. You may combine
0x0
Whoever added the RC resource information to the source tree for the
0.9.8 Win32 build, major kudos from my corner. That will get a number
of people off my case on the Win32 binaries.
Of course, the natural thing people are going to want next is version
information for all of the .exe files.
Title: RE: Quick question about 'client-ssl-warning' => 'Peer certificate not verified'
Thanks Brian.
Wow, I'm really pulling my hair out now.
Between LWP with IO::Socket::SSL doesn't have a lot of documented ways to manipulate the sock constructor. Infact I tried constructing my own IO::
Riaz,
Thanks for the help,
I am able to dump the packets using ssldump.
Some of my queries are still unanswered.
I am again pasting it here.
>> [#]. If they are able to communicate in a secured session,
>> then how come they completed SSL handshake without random number source
>> (I think it is r
Hello,
I'm trying to build an application/system that will always generate the
same RSA public-private key pair given the same "seed" data into the
OpenSLL-public-private-key-pair generation process?
Essentially, I want to be able to regenerate a private key simply by using
a user's login na
Does this reference address my goals?
http://www.rsasecurity.com/rsalabs/node.asp?id=2127
This faq also has this quote:
http://www.mindspring.com/~schlafly/crypto/faq.htm
"How do I convert a password into a key? You can
just use the password directly, but it is usually better to run it thru a
ha
I want to be able to decode session recorded by a sniffer. In order to
do this, I need to know the symmetric key used.
To solve this, I need to know the key being used.
Just to clarify, the application sniffing the network connection is
not a part of the application sending the data. Also, the sec
16 matches
Mail list logo