about OPENSSL_set_locking_callback

2011-08-29 Thread william
When thread id created as joinable,: Before pthread_create, Use OPENSSL_set_locking_callback to setup mutex lock for OPENSSL library. After pthread_join Call Pthread_destroy_mutex and OPENSSL_free to release mutex releated resource. But. If I create the thread to be detaced. When

Re: OpenSSL FIPS module self signed certificate creation failed

2011-08-29 Thread rockrider33
Hello Dr. Thanks for the solution. It worked out. For others I am giving the steps: 1)create FIPS Object module. 2)download http://www.openssl.org/source/openssl-0.9.8r.tar.gz 3)untar and run following commands in order to build and install a)./config fips --with-fipslibdir=PATH to FIPS

How to make ca signaturer when I use dh or rc4 etc.

2011-08-29 Thread 櫻井英明
Hello I try to make ca signature about following case. 1. Kx=DH, ECDH 2. Au=ECDSA 3. Enc=DES(56),3DES(168),RC4(40), rc4(128) For example I would like to know following cipher zuite. EDH-RSA-DES-CBC3-SHA ECDHE-ECDSA-AES256-SHA RC4-MD5 EXP-DES-CBS-SHA But I can not find the way. For example, I

openssl smime verify reports digest_failure, but input seems OK

2011-08-29 Thread Jakob Bohm
Hi, I am trying to write a script to verify a PKCS#7 signature (it is actually an Authenticode signature) using commonly available UNIX tools such as perl and the openssl command line interface. For testing, I use the openssl 0.9.8o (plus security patches) from Debian Squeeze. This means that

RE: AES encryption using RSA keys

2011-08-29 Thread Dave Thompson
From: owner-openssl-us...@openssl.org On Behalf Of krishnamurthy santhanam Sent: Friday, 26 August, 2011 16:11 Thanks for your detailed Explanation Dave. I am going to encrypt using AES in server side using EVP , EVP_EncryptInit_ex(x, EVP_aes_256_cbc(), NULL,

RE: users auth. in XP for HTTPS

2011-08-29 Thread Dave Thompson
From: owner-openssl-us...@openssl.org On Behalf Of Jean Brico Sent: Sunday, 28 August, 2011 09:40 I'va a CA in a Debian host that works fine and use scripts in openssl I've a 2003 Server with a HTTPS site. It owns its certificate generated by this CA.