Hi,
When I try to read the EC Private Key file I get an error from the openssl.
Is there another way to use the Elliptic curved Private key. Please note that I
generate the Public and Private keys via the command lines and use the
public-private key in my program
Thanks
Darshan
On Fri, 23 May 2014 16:32:15 +
Viktor Dukhovni openssl-us...@dukhovni.org wrote:
On Fri, May 23, 2014 at 06:11:05PM +0200, nicolas@free.fr wrote:
use at the very least TLSv1 (and preferably TLSv1_2) protocol if
you want to use SSLv23_server_method(), don't forget to disable
SSLv2
On 25/05/14 13:11, Mody, Darshan (Darshan) wrote:
Hi,
When I try to read the EC Private Key file I get an error from the
openssl.
Is there another way to use the Elliptic curved Private key. Please note
that I generate the Public and Private keys via the command lines and
I use below command
openssl ecparam -out key.pem -name prime256v1 -genkey. I am using another 3rd
Party tool SIPp. Below is the method that sets the SSL CTX
ssl_init_status FI_init_ssl_context (void)
{
sip_trp_ssl_ctx = SSL_CTX_new( TLSv1_method() );
if ( sip_trp_ssl_ctx == NULL ) {
Trying to understand how the crl2p7.c application allocates PKCS7 pointers. I
see the PKCS7_new() function and it makes sense.
However, I cannot find the definition of PKCS7_free(). The only place it shows
up is in libeay.num as PKCS7_free 444
sip_trp_ssl_ctx = SSL_CTX_new( TLSv1_method() );
if ( sip_trp_ssl_ctx == NULL ) {
ERROR(FI_init_ssl_context: SSL_CTX_new with TLSv1_method failed);
return SSL_INIT_ERROR;
}
Well, EC support was added to SSL/TLS at TLS 1.2.
You did not include the error you are
On Sun, May 25, 2014 at 11:28:04AM -0400, Jeffrey Walton wrote:
sip_trp_ssl_ctx = SSL_CTX_new( TLSv1_method() );
if ( sip_trp_ssl_ctx == NULL ) {
ERROR(FI_init_ssl_context: SSL_CTX_new with TLSv1_method failed);
return SSL_INIT_ERROR;
}
Well, EC support
On 25/05/14 14:40, Mody, Darshan (Darshan) wrote:
I use below command
openssl ecparam -out key.pem -name prime256v1 -genkey. I am using another 3rd
Party tool SIPp. Below is the method that sets the SSL CTX
Whilst I don't think its the cause of your problem, I would suggest
adding
On Sun, May 25, 2014 at 02:22:34PM +0200, Hanno B?ck wrote:
Typically, leaving SSLv3 enabled is just fine if both ends support
something stronger they'll negotiate that.
That's not always true.
In a browser fallback (only relevant here if the OP is implementing
an HTTP server) nothing
On Sun, May 25, 2014 at 11:39 AM, Viktor Dukhovni
openssl-us...@dukhovni.org wrote:
On Sun, May 25, 2014 at 11:28:04AM -0400, Jeffrey Walton wrote:
sip_trp_ssl_ctx = SSL_CTX_new( TLSv1_method() );
if ( sip_trp_ssl_ctx == NULL ) {
ERROR(FI_init_ssl_context: SSL_CTX_new with
Seems to be issue with the ceritificate and the oprivate key
SSL error 0 : error:0B080074:x509 certificate
routines:X509_check_private_key:key values mismatch.
My bad
Thanks a million
Regards
Darshan
-Original Message-
From: owner-openssl-us...@openssl.org
I've created a PEM CA/Key using Win32 OpenSSL. Looks great. Went to convert the
PEM formatted cert to DER and it seems to have changed the format of the
Subject Alternative Name. I'd like to know if this is expected behavior.
Display of Subject Alternative Name in PEM File:
X509v3 Subject
It just looks like the windows cert viewer displays field names differently.
No big deal. Or am I missing something?
/r$
--
Principal Security Engineer
Akamai Technologies, Cambridge, MA
IM: rs...@jabber.memailto:rs...@jabber.me; Twitter: RichSalz
On Mon, May 26, 2014 at 01:34:29AM +, Jean Gelinas wrote:
I've created a PEM CA/Key using Win32 OpenSSL. Looks great. Went
to convert the PEM formatted cert to DER and it seems to have
changed the format of the Subject Alternative Name. I'd like to
know if this is expected behavior.
Thanks all! I believe I'm seeing a display format difference and, as Viktor
mentioned, not a data format difference.
Jean Gelinas, Jr.
2 Paige Drive
Merrimack, NH 03054
(603) 370-7397
jgelina...@comcast.net
- Original Message -
From: Viktor Dukhovni openssl-us...@dukhovni.org
15 matches
Mail list logo