Hi,
I am new to openssl. I want to know what's a difference between
standard/message-digest/cipher commands. What purpose and when where
it is used.
Please suggest any url to learn about commands and when ,where how it
is used.
Thanks,
Senthilkumar.
Michal Trojnara wrote:
On Sunday 10 December 2006 00:42, Ben Sandee wrote:
On 12/9/06, Michal Trojnara wrote:
The library is OpenSSL 0.9.8d configured with:
./Configure threads shared zlib debug-linux-elf
Can you help me find a solution or a better workaround?
Did you set the
Hello,
Aren't these statements mutually exclusive? How can the dynamic locks be
needed and not used at the same time? Do I have to support them or
not? I'm confused...
No. Dynamic callbacks are used by some ENGINE modules (NCipher for
example).
Best regards,
--
Marek Marcola [EMAIL
Hi Guys,
I've one query regarding SSL_write call provided by OpenSSL library. The
SSL_write could return with READ_ERROR or WRITE_ERROR with partial writing
of data. While re-attempting to send the data once again SSL_Write expects
the same arguments as that of the previous one. If I give a
Hello,
The output on the s_client side is as follows;
SSL3 alert write:fatal:handshake failure
6389:error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version
number:s3_pkt.c:288:
This means that client don't want to support received from
server SSL version.
I am using the -ssl3 flag on
Hello openssl users.
I was ordered to create a public/private key using one of the following
ciphersuite:
i. CIPHERSUITE SSL_3DES_SHA
ii. CIPHERSUITE SSL_DES_SHA
iii.CIPHERSUITE SSL_RC4_SHA
iv. CIPHERSUITE SSL_RC4_MD5
Can you tell me how to create each one? Which is more
Marek Marcola [EMAIL PROTECTED] wrote:
Aren't these statements mutually exclusive? How can the dynamic locks be
needed and not used at the same time? Do I have to support them or
not? I'm confused...
No. Dynamic callbacks are used by some ENGINE modules (NCipher for
example).
You're
Olivier Mascia wrote:
Are there searchable archives of this mailing-list?
I'd like to look them up before posting questions.
See http://www.openssl.org/support/ at the bottom.
Ciao,
Richard
--
Dr. Richard W. Könning
Fujitsu Siemens Computers GmbH
Hello,
I've one query regarding SSL_write call provided by OpenSSL
library. The SSL_write could return with READ_ERROR or WRITE_ERROR
with partial writing of data. While re-attempting to send the data
once again SSL_Write expects the same arguments as that of the
previous one. If I give
Hi List,
How do I set ISO10126 padding for AES/3-DES encryption.
I found that it is possible to enable/disable padding by using
EVP_CIPHER_CTX_set_padding().
But I need to change the default padding of openssl (rather than
enabling or disabling).
My code uses typical block cipher encryption
On 12/11/06, Marek Marcola [EMAIL PROTECTED] wrote:
It almost seems like the server is accepted SSL3 msgs, but sending out
another protocol type. Any suggestions?
If you using Linux, can you send ssldump or wireshark dump
of this session.
Here is an ssldump of s_client connecting to my
Michal Trojnara wrote:
Dear OpenSSL users,
When performing stress-testing of stunnel with session cache
disabled I receive core dumps on concurrent SSL_connect() calls.
Here is an example stack backtrace:
#0 0xa7e60d41 in BN_ucmp (a=0x80a28fc, b=0x80a1f08) at bn_lib.c:662
662
On 12/11/06, chris busbey [EMAIL PROTECTED] wrote:
On 12/11/06, Marek Marcola [EMAIL PROTECTED] wrote:
It almost seems like the server is accepted SSL3 msgs, but sending out
another protocol type. Any suggestions?
If you using Linux, can you send ssldump or wireshark dump
of this session.
On Mon, Dec 11, 2006 at 10:48:34AM -0600, chris busbey wrote:
On 12/11/06, Marek Marcola [EMAIL PROTECTED] wrote:
It almost seems like the server is accepted SSL3 msgs, but sending out
another protocol type. Any suggestions?
If you using Linux, can you send ssldump or wireshark dump
of
On Mon, Dec 11, 2006 at 11:01:22AM -0600, chris busbey wrote:
On 12/11/06, chris busbey [EMAIL PROTECTED] wrote:
On 12/11/06, Marek Marcola [EMAIL PROTECTED] wrote:
It almost seems like the server is accepted SSL3 msgs, but sending out
another protocol type. Any suggestions?
If you
Marek Marcola wrote:
I've one query regarding SSL_write call provided by OpenSSL
library. The SSL_write could return with READ_ERROR or WRITE_ERROR
with partial writing of data. While re-attempting to send the data
once again SSL_Write expects the same arguments as that of the
previous one.
Another trial forcing tls1 on both sides of the connection did not
result in the above Length Mismatch error. Here is the output of
that trial's ssl dump. Any thoughts?
New TCP connection #67: localhost.localdomain(42489) -
localhost.localdomain(5758)
67 1 0.0032 (0.0032) CSV3.1(95)
Hello,
On Mon, Dec 11, 2006 at 10:48:34AM -0600, chris busbey wrote:
On 12/11/06, Marek Marcola [EMAIL PROTECTED] wrote:
It almost seems like the server is accepted SSL3 msgs, but sending out
another protocol type. Any suggestions?
If you using Linux, can you send ssldump or
Hello,
Can you send ssldump with -aAdN options ?
Best regards,
--
Marek Marcola [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
On 12/11/06, Marek Marcola [EMAIL PROTECTED] wrote:
Can you send ssldump with -aAdN options ?
Certainly. (Certificate details have been obfuscated)
New TCP connection #8: localhost.localdomain(48429) -
localhost.localdomain(5758)
8 1 0.0028 (0.0028) CS SSLv2 compatible client hello
Version
Hello,
On 12/11/06, Marek Marcola [EMAIL PROTECTED] wrote:
Can you send ssldump with -aAdN options ?
Certainly. (Certificate details have been obfuscated)
New TCP connection #8: localhost.localdomain(48429) -
localhost.localdomain(5758)
8 1 0.0028 (0.0028) CS SSLv2 compatible client
On 12/11/06, Marek Marcola [EMAIL PROTECTED] wrote:
This TLS1 looks good, but sorry I've forget xX options,
so output from ssldump -aAdNxX should give more information
(SSL packet dump) with ending error.
Hrm... ssldump fails during the handshake with a 'Length Mismatch
error with the xX
On Monday 11 December 2006 18:03, Nils Larsch wrote:
does it help is you build openssl without BN_DEBUG ? When BN_DEBUG
is defined bn_check_top() is a macro that should check if the BIGNUM::top
value is correclty set (note: this isn't really a solution as
bn_check_top() (without BN_DEBUG_RAND)
Hello,
Hrm... ssldump fails during the handshake with a 'Length Mismatch
error with the xX options. Here is the output;
New TCP connection #5: localhost.localdomain(53503) -
localhost.localdomain(5758)
5 1 0.0024 (0.0024) CS SSLv2 compatible client hello
Version 3.1
cipher suites
24 matches
Mail list logo