Hi,
I want to write a .NET client that sends an encrypted message to a server
written in C, and decrypt the message there.
I use RSA with PKCS1 padding..
But the server cannot decrypt the sequence from the .NET client.
error:2006E079:BIO routines:BIO_puts:unsupported method
I see 3 possible so
Hi everybody,
i would like to know if it's normal to be able to sign a certificate with
one which have "anti-signing" rules : i mean basicConstraints = CA:false.
Could you enlight me ?
Thank you,
Jokester
--
View this message in context:
http://www.nabble.com/Signing-with-an-%22anti-signing%
Please mind the single line where Darryl mentioned
renegotiation/rekeying of your SSL session. It means you may have to
replicate the relevant bits of code in both read and write thread.
(It's the SSL_WANT_READ and SSL_WANT_WRITE codes coming out of
SSL_write() and SSL_read() respectively that are
Hello,
I want to make my network connection encrypted/secure using ssh.
At the moment I open a socket in my embedded device, so that an client (PC) is
able to connect to it:
//initialization of the socket
handle = socket(AF_INET, SOCK_STREAM, 0);
serv_addr.sin_family = AF_INET;
serv_addr.sin
Folks,
Im trying to find solution for this issue. When running the command below
openssl genrsa -des3 -out mydomain.com.key 1024
to create the key pair certificate, it gives me the error:
=
warning, not much extra random data, consider using the -rand option
Generating RSA
Tan, Liao wrote:
> Folks,
> Im trying to find solution for this issue. When running the command below
>
> openssl genrsa -des3 -out mydomain.com.key 1024
>
> to create the key pair certificate, it gives me the error:
>
> =
> warning, not much extra random data, consider us
On Wed September 3 2008 08:21, Patrick Patterson wrote:
>
> http://docs.hp.com/en/5990-7263/ch01s01.html
>
> that sounds like it may help you.
>
Interesting.
A component of a commercial Unix that boasts compatability with Linux.
The times, they are a-changing.
Mike
> Have fun.
>
> Patrick.
>
Hi all,
I am using openssl-0.9.8. I am getting this error :asn1 encoding
routines:ASN1_get_object:header too long:asn1_lib.c while requesting for the
certificate. Please help.
Thanks in advance.
Regards
--
View this message in context:
http://www.nabble.com/asn1-encoding-routines%3AASN1_get_obj
Hello everybody,
I need to copy the Subject Key ID (SKID) from the CA certificate to the
Authority Key ID (AKID) of a new certificate.
I have extracted the SKID with
AUTHORITY_KEYID *akid = X509_get_ext_d2i(ca_cert,
NID_subject_key_identifier, NULL, NULL);
How can I "put" akid in an X509_EXTENSI
Manuel Sahm escribió:
Hello,
I want to make my network connection encrypted/secure using ssh.
At the moment I open a socket in my embedded device, so that an client
(PC) is able to connect to it:
//initialization of the socket
handle = socket(AF_INET, SOCK_STREAM, 0);
serv_addr.sin_family
Hello,
thanks for reply,...
Maybe you could help me.
Is it possible to use a password instead of a Certification file and a
Certification Key File to make the tcp connection secure via openssl ?
Thank you
>>> Sergio <[EMAIL PROTECTED]> 03.09.2008 16:44 >>>
Manuel Sahm escribió:
> Hello,
>
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
thejokester wrote:
| Hi everybody,
Hello Jokester,
| i would like to know if it's normal to be able to sign a certificate with
| one which have "anti-signing" rules : i mean basicConstraints = CA:false.
| Could you enlight me ?
Signing doesn't matte
Hi all,
According to the man page for EVP_BytesToKey, "Newer applications should
use more standard algorithms such as PKCS#5 v2.0 for key derivation".
Unfortunately the man page stops there, and doesn't give a clue as to
which openssl function should be used to derive a key in a compliant way
On Wed, Sep 3, 2008 at 5:03 PM, Manuel Sahm <[EMAIL PROTECTED]> wrote:
>I want to make my network connection encrypted/secure using ssh.
Please note that SSH is not SSL: SSH is a protocol on top of SSL.
Since you're talking about sockets there, I take it you mean SSL.
> Is it possible to use a pa
On Wednesday 03 September 2008 11:46:29 Ger Hobbelt wrote:
> On Wed, Sep 3, 2008 at 5:03 PM, Manuel Sahm <[EMAIL PROTECTED]> wrote:
> >I want to make my network connection encrypted/secure using ssh.
>
> Please note that SSH is not SSL: SSH is a protocol on top of SSL.
> Since you're talking about
Hi,
my name is Jiří Hnídek and I try to do some experiments with this dtls
example:
http://freshmeat.net/projects/dtls_example/
I receive this error SOMETIMES on server side:
SSL_get_error() returns: SSL_ERROR_SSL and this is printed at
stdout/stderr:
6682:error:14101119:SSL routines:DTLS1_PROCE
Hello,
[EMAIL PROTECTED] wrote on 09/03/2008 04:16:57 PM:
> Hi all,
>
> According to the man page for EVP_BytesToKey, "Newer applications should
> use more standard algorithms such as PKCS#5 v2.0 for key derivation".
>
> Unfortunately the man page stops there, and doesn't give a clue as to
>
Manuel Sahm escribió:
Hello,
thanks for reply,...
Maybe you could help me.
Is it possible to use a password instead of a Certification file and a
Certification Key File to make the tcp connection secure via openssl ?
Thank you
>>> Sergio <[EMAIL PROTECTED]> 03.09.2008 16:44 >>>
Manuel
I may be overlooking the documentation but I can't seem to find a definitive
answer.
Is the latest version of Openssl support TLS v1.2?
Thanks.
On Wed, Sep 03, 2008, Capstone wrote:
> I may be overlooking the documentation but I can't seem to find a definitive
> answer.
>
>
>
> Is the latest version of Openssl support TLS v1.2?
>
>
>
Not at present, no.
Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
Ope
> Hi everybody,
>
> i would like to know if it's normal to be able to sign a certificate with
> one which have "anti-signing" rules : i mean basicConstraints = CA:false.
> Could you enlight me ?
>
> Thank you,
>
> Jokester
Absolutely. Nobody can stop you from trying to use your certificate in a w
Sergio wrote:
> I think you have a conflict with your ideas. A and B want to secure its
> communication. They need to be agree about which key to use. I suppose
> you can encrypt the information at the origin using a symmetric key
> (aes, des, idea etc) and decrypt ir at destination with the s
On Wed, Sep 03, 2008 at 04:16:57PM +0200, Graham Leggett wrote:
> Does openssl support RFC2898
Not in 0.9.8.x.
You have to write it yourself.
--
Eric Murray Sr. Security Architect
SafeNet www.ingrian.com www.safenet-inc.com
_
On Wed, Sep 3, 2008 at 8:36 PM, Geoff Thorpe <[EMAIL PROTECTED]> wrote:
> Um, SSH is not a protocol on top of SSL. I haven't read anything else in this
> thread, but that one sort of stuck out ...
My mistake. Screwed up that one indeed. The point is: SSL != SSH.
--
Met vriendelijke groeten / Be
24 matches
Mail list logo