Re: Diffie-Hellman parameters

2000-08-15 Thread Greg Stark
including the PGP source code, the Schneier book or the Menezes, Vanstone, and Van Oorschot book, the RFC mentioned above as well as http://www.ietf.org/rfc/rfc2412.txt, and others that I have forgotten. Greg Stark, [EMAIL PROTECTED] Chief Security Architect Ethentica, Inc. www.ethentica.com

Re: Life after September 20th

2000-08-17 Thread Greg Stark
available on the market (as long as no other patents are infringed by the product). You can even use OpenSSL for free! As the poster noted, we are talking about the RSA modular exponentiation algorithm, not any other algorithm that is the property of RSA Security, Inc. Greg Stark, [EMAIL PROTECTED

Re: question about DES patents

2000-08-22 Thread Greg Stark
In the U.S., DES and DSA are royalty-free; it is also possible to implement Elliptic Curve cryptography without stepping on patents, but some care is needed. Greg Stark, [EMAIL PROTECTED] Chief Security Architect Ethentica, Inc. www.ethentica.com 410-715-0039 Ext. 13 - Original Message

Re: possible bug in DH_generate_key()

2000-11-01 Thread Greg Stark
to form your blowfish key, the brute force attack is made easier by a factor of two. Perhaps if you were using a symmetric algorithm which naturally uses mod p keys, you could use the output of DH_generate_key() directly, but neither blowfish nor any of the ciphers in openssl have this property. Greg

Re: keys generated by xenroll.dll...

2000-12-08 Thread Greg Stark
rs appear to be kept in the registry, at least on my Win98 machine. Check out the "HKLM/Software/Microsoft/System Certificate" and "HKCU/Software/Microsoft/System Certificate" keys. I would not recommend trying to directly delete the registry keys, however. Greg Stark, [EMAIL PROTECTED]

Re: Kurt Seifred's article on securityportal

2000-12-19 Thread Greg Stark
to in his Sep. 99 article, although you've managed to communicate both points much more clearly in seven lines. Greg Stark, [EMAIL PROTECTED] Chief Security Architect Ethentica, Inc. www.ethentica.com __ OpenSSL Project

Re: SSL - Can some enlighten me?

2001-01-10 Thread Greg Stark
PreMasterSecret pre_master_secret; } EncryptedPreMasterSecret; - Greg Stark, [EMAIL PROTECTED] Ethentica, Inc. www.ethentica.com - Original Message - From: "Mohammed SADIQ" [EMAIL PROTECTED] To: [EMAIL PROTECTED]; [EMAIL PROTECTED] Sent: Wednesday, January 10, 20

Re: SSL - Can some enlighten me?

2001-01-10 Thread Greg Stark
The 12 bytes are the verify_data from section 7.4.9 of rfc2246, which also described how they are computed. Note that these bytes are also encrypted. Greg Stark, [EMAIL PROTECTED] Ethentica, Inc. www.ethentica.com - Original Message - From: "Mohammed SADIQ" [EMAIL PROTECTED]

Re: encrypt/decrypt large files

2001-01-11 Thread Greg Stark
. To decrypt, read in n bytes at a time. Decrypt the n bytes block and extract the n-k bytes of plaintext. Most folks use a hybrid technique that's faster. Greg Stark, [EMAIL PROTECTED] Chief Security Architect Ethentica, Inc. www.ethentica.com - Original Message - From: [EMAIL PROTECTED

Re: Maddening problem with IE on NT or 98

2001-01-12 Thread Greg Stark
to the server with in the case of client auth), and redoes the SSL handshaking. Greg Stark, [EMAIL PROTECTED] Ethentica, Inc. www.ethentica.com - Original Message - From: "Louis LeBlanc" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Friday, January 12, 2001 3:06 PM S

Using embedded certificates

2001-01-13 Thread Greg Stark
of code in verify.c, but perhaps someone has already solved this problem. Greg Stark, [EMAIL PROTECTED] Ethentica, Inc. www.ethentica.com __ OpenSSL Project http://www.openssl.org User Support

Re: client certificate

2001-01-16 Thread Greg Stark
Try SSL_CTX_set_verify() with the mode parameter set to SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT The documentation is at http://www.openssl.org/docs/ssl/SSL_CTX_set_verify.html# Greg Stark, [EMAIL PROTECTED] Ethentica, Inc. www.ethentica.com - Original Message - From: Zhong

Re: Getting certificates out of the SSL_CTX?

2001-01-16 Thread Greg Stark
e function ReadPublicKey() of openssl-0.9.6/demos/maurice/loadkeys.c You also might find that the x509 utility's -C option does just what you want. Try openssl x509 -in certifle -C -noout -- Greg Stark, [EMAIL PROTECTED] Ethentica, Inc. www.ethentica.com - Original Message - Fr

Re: Problem with client certificate with IIS 4.0

2001-01-17 Thread Greg Stark
meant when you wrote " ... I have generated my own self signed CA certificate unsing openssl and I have imported it successfully into IE in the trusted CA list on the machine running my web server. ..." I confess I am not an IIS expert so this is just a quick guess.

Re: Size of signature from EVP_SignFinal

2001-01-19 Thread Greg Stark
Dave, See http://www.openssl.org/docs/crypto/EVP_SignInit.html# You should allocate the amount of storage indicated by the EVP_PKEY_size() function. It may a little too much; the actual used is returned by EVP_SignFinal. _ Greg Stark Ethentica, Inc

Re: Question about PKCS7_encrypt()

2001-01-19 Thread Greg Stark
These are normal if you have compiled the openssl crypto libraries for Win32 with the debugging options enabled. __ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] __ - Original Message - From: "Hellan,Kim KHE" [EMAIL PROTECTED] To: [EMAIL PROTE

Re: [Gathering Entropy quickly for openSSL]

2001-01-24 Thread Greg Stark
. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ Since I am involved in using openSSL to transport a protocol designed within my company I have the luxury of changing the way the protocol behaves. I am planning to change it so that the following

Re: SSL_ERROR_SYSCALL question (follow up)

2001-01-25 Thread Greg Stark
SSL_SENT_SHUTDOWN and SSL_RECEIVED_SHUTDOWN do? _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Cory Winter" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, January 2

Re: Some question about SSL implementation...

2001-01-25 Thread Greg Stark
developer. I might just be willing to trust anybody whose certificate chain is rooted at Verisign. 2) Don't know if this potential problem is an issue for OpenSSL -- although I don't even think it supports any signing-only ciphersuites! _ Greg Stark Ethentica, Inc

Re: localhost certificate (no, really!)

2001-01-25 Thread Greg Stark
. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Andrew Cooke" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, January 25, 2001 3:07 PM Subject: Re: localhost certificate (no, really!)

Re: Is this a certificate problem?

2001-01-26 Thread Greg Stark
to bypass authentication JUST FOR TESTING PURPOSES, you can do so by calling SSL_CTX_set_verify(ctx, SSL_VERIFY_NONE). But note that any connections made are not authenticated, but they are enrcrypted. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: ssl_library_init();

2001-01-29 Thread Greg Stark
must obey trademark law (in the U.S. at any rate) if you use their trademarks. I have seen folks try to refer to the algorithm as ARCFOUR in an attempt to evade trademark issues, but I don't know if that really works. END LEGAL COMMENTS _ Greg Stark Ethentica, I

Re: server Certificate verification help!

2001-02-01 Thread Greg Stark
better. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Evan Cross" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, January 31, 2001 7:33 PM Subject: server Certificate ve

Re: How to convert the unsecure private key back to secure one

2001-02-02 Thread Greg Stark
use the public part to derive the private part. Sorry, but you'll have to generate a new public/private keypair. If you cannot be sure that your previous private key was securely destroyed, you should consider revoking your certificate if you had one issued. _____

Re: Tutorials

2001-02-02 Thread Greg Stark
There is an excellent book on SSL/TLS (see http://www.rtfm.com/sslbook/) which includes many OpenSSL examples and discussions. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "A

Re: CA and Message Digests

2001-02-02 Thread Greg Stark
ke message digest calculations. But you don't need to be aware of them, they happen automagically. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Peter Groff" [EMAIL PROTECTED]

Re: Man in the middle attacks

2001-02-04 Thread Greg Stark
complaint one *might* make is the absence in OpenSSL of an example to perform the most common identity check, that the hostname contained in the CN field of the subject name matches the hostname the client intended to connect to. I am not complaining, though. _ Greg

Re: can I obtain certificate expiry dates using openssl?

2001-02-06 Thread Greg Stark
e" else echo "plenty of time" fi _____ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Dicks, Gareth M" [EMAIL PROTECTED] To: [EMAIL PROTECTED]; "Dicks, Gareth M&

Re: Un-Interactive OpenSSL

2001-02-13 Thread Greg Stark
://www.openssl.org/docs/apps/openssl.html#. If your password is badpass, then you can use openssl genrsa -des3 -out rca.key -passout pass:badpass _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From

Re: link problems on NT with openssl 096

2001-02-14 Thread Greg Stark
Make sure you use the same C runtime library to link your application as you specified to build openssl. Which makefile did you use to build openssl, nt.mak or ntdll.mak? _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: What does the e-value do?

2001-02-16 Thread Greg Stark
65537 is nice number because it "big enough" in the Goldilocks sense, unlikely to be a factor of L, and is fast to compute with if the binary exponentiation algorithm is used. _ Greg Stark Ethentica, Inc. [EMAIL

Re: deign question

2001-02-16 Thread Greg Stark
. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Patricio Valdebenito" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Friday, February 16, 2001 2:52 PM Subject: deign question Hello, my name

Re: Setting the bit to 128

2001-02-16 Thread Greg Stark
No. Your question doesn't make any sense, so folks are just trying to guess what you *might* mean. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Auteria Wally Winzer Jr.&qu

Re: Setting the bit to 128

2001-02-16 Thread Greg Stark
Probably caused by the browser. The certificates don't really have much to say about whether you get 40-bit or 128-bit cryptography. Upgrade to a browser that supports 128-bit cryptography. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: DH_generate_parameters and primes

2001-02-19 Thread Greg Stark
. Your first call to DH_new() doesn't do anything except create a memory leak. DH_check() returns its answer in the integer *pointed* to by the second parameter. So, if dh_error is an int then you need to pass dh_error to DH_check(). _ Greg Stark Ethentica, Inc

Re: Xenroll and OpenSSL

2001-02-20 Thread Greg Stark
with a few examples. When you ask how can Xenroll work with OpenSSL, do you want use Xenroll to generate the certificate requests and use openssl to sign them? This can certainly be done. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: DH_generate_parameters and primes

2001-02-21 Thread Greg Stark
( dh_struct ); dh_secret = malloc ( DH_size( dh_struct ) ); DH_compute_key ( dh_secret, client_key, dh_struct ); free ( dh_secret ); BN_free ( client_key ); DH_free ( dh_struct ); return (0); } _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: was Re: Apologies, now is 'no-idea'

2001-02-21 Thread Greg Stark
IDEA is patented in the U.S. I believe the patent holders have made it available royalty-free for *some* uses, but you need to check with them (http://www.media-crypt.com/). _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: SSL_read

2001-02-22 Thread Greg Stark
. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Patrick Li" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, February 21, 2001 8:43 PM Subject: SSL_read Hi, I got a question about SSL_read. If

Re: DH_generate_parameters and primes

2001-02-22 Thread Greg Stark
already generated it, so perhaps that is the case. In any event, check the return value from DH_compute_key(). If it is -1, then you have an error. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From

Re: Protocol messages

2001-02-23 Thread Greg Stark
of the SSLv2 record protocol in any of the TLS or SSLv3 rfc's or draft RFC's. I do have an HTML document that I scrounged from somewhere (probably sun) describing SSLv2. I'd be glad to e-mail to anyone or post it to the list. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: QUESTION: how to retrieve the cert from an SSL_CTX

2001-02-25 Thread Greg Stark
_read_X509(). _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Philip J Grabner" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Saturday, February 24, 2001 5:39 PM Subject: QUESTION: how to retrieve the

Re: DH_compute_key

2001-02-26 Thread Greg Stark
. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Josh Howlett" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, February 15, 2001 5:12 PM Subject: help: DH_compute_key Hi all, W

Re: Private key migration

2001-02-27 Thread Greg Stark
in proprietary databases. Folks on this list seem to have lots of experience with Apache-SSL, mod-ssl, Netscape, and IIS. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Gil Schi

Re: PKCS8 and JAVA Application

2001-02-28 Thread Greg Stark
(); } } } _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "srinivasa siripurapu" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, February 28, 2001 8:25 PM Subject: PKCS8 and JAVA Application Hi, I am tryi

Re: Generating and using client/browser certificates.

2001-03-01 Thread Greg Stark
are looking for. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Scott Fagg" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, February 28, 2001 11:44 PM Subject: Re:

Re: Manuals for CA and self certificate setup

2001-03-06 Thread Greg Stark
Why not RSA? In theory, you could create and use DSA-signed certificates which contain DSA or DH parameters, but there is very little support for these in existing software. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: License Questions

2001-03-06 Thread Greg Stark
to libdes. I haven't seen more recent versions of BSAFE, so I don't know if they still contain the acknowledgement. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Alex Graveley&qu

Re: Thumbprint of Digital ID

2001-03-06 Thread Greg Stark
It is the hash of the entire DER encoded certificate. You can calculate it using the 'openssl' utility via: openssl dgst -sha1 -c cert.der _Greg StarkEthentica, Inc.[EMAIL PROTECTED]_ - Original Message -

Re: Question on client authentication and signing

2001-03-07 Thread Greg Stark
Jeffrey, The short answer is neither. The client's only use of its private key is to sign a hash of the handshake messages, one of which includes the server random value. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: Question on client authentication and signing

2001-03-07 Thread Greg Stark
Jeff, That is correct, all the payload data is MAC'ed using shared symmetric keys, so repudiation by either peer claiming tampering by the other is possible. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: Question on client authentication and signing

2001-03-07 Thread Greg Stark
. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Sandipan Gangopadhyay" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, March 07, 2001 10:38 AM Subject: Re: Question

Re: RE:Oracle wallet Manger and Being my own CA

2001-03-07 Thread Greg Stark
Christian, I assume you mean X509 v3 and X509v1 instead of SSL v3 and SSL v1, no? _Greg StarkEthentica, Inc.[EMAIL PROTECTED]_ - Original Message - From: Christian Ullman To: [EMAIL PROTECTED]

Re: Can't compile openssl-0.9.6

2001-03-09 Thread Greg Stark
ect places. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Marcel Loesberg" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Friday, March 09, 2001 9:17 AM Subject: Can't compile openssl-0.9.6 Hi,

Re: Manuals for CA and self certificate setup

2001-03-09 Thread Greg Stark
/catalog/38354-6.htm, though I have never looked at it. Good luck, _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Erick Perez - CriptoData Panama" [EMAIL PROTECTED] To: [EMAIL PRO

Re: Client certificates: Key store per workstation, not per user?

2001-03-09 Thread Greg Stark
PI mailing list archives (http://discuss.microsoft.com/archives/cryptoapi.html). You might search on CRYPT_MACHINE_KEYSET to get some posts on similar sorts of issues. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _

Re: Why no sig for openssl src?

2001-03-09 Thread Greg Stark
. It has the chicken-and-egg problem you mentioned, but that's life. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "John Pliam" [EMAIL PROTECTED] To: "Rich Salz" [EMAIL P

Re: How to build the debug version of openssl-0.9.6 on windows platform

2001-03-09 Thread Greg Stark
Aslam, Look at the 'Tweaks' section of the Install.W32 file. You'll should end up getting these lines in do_masm.bat perl util\mk1mf.pl debug VC-WIN32 ms\nt.mak perl util\mk1mf.pl dll debug VC-WIN32 ms\ntdll.mak _ Greg Stark Ethentica, Inc. [EMAIL

Re: How to reduce size of OpenSSL LIB file

2001-03-15 Thread Greg Stark
\mk1mf.pl %SKIPS% VC-WIN32 ms\nt.mak Look through the perl script and maybe a few other places to see what no-*** options are supported. Please post the results to the list. I think it is of general interest. Good luck, _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: Netscape 6.01 and SSL: crash?

2001-03-15 Thread Greg Stark
n or buggy commercial SSL implementations. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Hubert Froehlich" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, March 15, 2

Re: wildcard certificates

2001-03-15 Thread Greg Stark
Chaz, Creation should be no problem; see (http://www.mail-archive.com/openssl-users@openssl.org/msg15592.html) for a discussion of some other issues that may arise. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: Vc++ workspace for openssl

2001-03-15 Thread Greg Stark
If you look carefully in the INSTALL.W32 file (look under Tweaks:), you will see how to do it. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Eli Zvik" [EMAIL PROTECTED]

Re: How do I get the remote IP after BIO_do_accept?

2001-03-15 Thread Greg Stark
Just note that the IP address is not authenticated and thus is untrusted. Whether this matters or not depends on what you are doing with it. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message

Re: any homebanking ssl clients?

2001-03-18 Thread Greg Stark
-connect www.verisign.com:443 and after it stops spewing, type GET / and press return. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "D. David Pirzadeh" [EMAIL PROTECTED]

Re: EVP encrypting

2001-03-20 Thread Greg Stark
You don't have to do the cutting; the EVP_* functions do it for you. _Greg StarkEthentica, Inc.[EMAIL PROTECTED]_ - Original Message - From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday,

Re: How can I encrypt public key in handshake?

2001-03-20 Thread Greg Stark
. This will at least give you some hints on where to do your thing in the protocol, if not the code. I'll try to look around in the code a bit later for ideas. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: how to generate a client certificate for IIS4.0

2001-03-21 Thread Greg Stark
of the server-specified CA's. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, March 21, 2001 11:35 AM Subject: how to generate

Re: How to test for a complete SSL record?

2001-03-21 Thread Greg Stark
) _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Dailou Walker" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, March 14, 2001 10:13 AM Subject: How to test for a complete

Re: how to generate a client certificate for IIS4.0

2001-03-21 Thread Greg Stark
extensions in your certificate. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, March 21, 2001 1:10 PM Subject: Re: how to generate

Re: key size 384 gives problem on server

2001-03-22 Thread Greg Stark
. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Pradeep Kamath" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, March 22, 2001 11:40 AM Subject: key size 384 gives problem on server Hello

Re: Strange behaviour with SSL_CTX_set_verify

2001-03-22 Thread Greg Stark
. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Hegde, Ramdas" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, March 22, 2001 6:10 PM Subject: Strange behaviour with SSL_CTX_set_verify After I

Re: Key size for server

2001-03-23 Thread Greg Stark
uses up 11 bytes of the RSA payload, so the smallest modulus would be 48+11=59 bytes, or 472 bits. You should not use such small moduli, however. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message

Re: Win32 Errors on MASM

2001-04-01 Thread Greg Stark
\vcvars32.bat on your command line *before* running any nmake commands. This sets up the environment properly. For myself, to make this easy to do, I create a shortcut to command.com and fill in the batch file entry to point to the vcvars32.bat file. _ Greg Stark

Re: A Question

2001-04-02 Thread Greg Stark
A QuestionPlease check out (http://www.openssl.org/docs/ssl/SSL_get_error.html#) and collect all possible error information before posting, including the underlying socket error code if applicable. Thank, _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: Certificate checking domain name

2001-04-04 Thread Greg Stark
are. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Tat Sing Kong" [EMAIL PROTECTED] To: "openssl" [EMAIL PROTECTED] Sent: Tuesday, April 03, 2001 12:20 PM Subject: Certificate

Re: How to build openssl without certain license-encumbered algorithms ?

2001-04-06 Thread Greg Stark
RC4 is not license-encumbered but rather trademarked. However, to answer your question, add the no-* flags to the perl lines in the ms\do_masm.bat file. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original

Re: Encrypting Cookie data with server private key

2001-04-06 Thread Greg Stark
why do you want to do this? Do you know the difference between a private and public key? _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Mevlana Sari" [EMAIL PROTECTED]

Re: Server certificates

2001-04-11 Thread Greg Stark
would use the OR the flags SSL_VERIFY_PEER and SSL_VERIFY_FAIL_IF_NO_PEER_CERT _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Colin Fox" [EMAIL PROTECTED] To: [EMAIL PROTE

Re: Other sources of information.

2001-04-11 Thread Greg Stark
Jeremy, What exactly is the problem you are having? Reiner's comments seemed right on, so perhaps you can give a little more info, what error messages are you getting, what are you trying to achieve, etc. _Greg StarkEthentica, Inc.[EMAIL

Re: adding x509v3 extensions

2001-04-16 Thread Greg Stark
check out the doc/openssl.txt file. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Tim Newsham" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Monday, April 16, 2001 2:35

Re: Using external certificates in web browsers

2001-04-17 Thread Greg Stark
Carl, For Internet Explorer, you would have to write a customized Cryptographic Service Provider (CSP) to accomplish this. It is not trivial. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message

Re: ssl/ssldump question

2001-04-17 Thread Greg Stark
the session was resumed by looking at the session id's in the clear text handshake messages. Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Roberto Rodrigues - McLean" [EMAIL

Re: Newbie

2001-04-17 Thread Greg Stark
SSH is not run over SSL, it runs over its own secure transport protocol. OpenSSH just uses the crypto library from OpenSSL. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: [EMAIL

Re: Client Key Exchange

2001-04-17 Thread Greg Stark
bytes using PKCS#1 block type 1 padding (for an RSA certificate). _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "ET Tan" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Cc: [EMAIL

Re: Closing SSL connections

2001-04-18 Thread Greg Stark
for managing session resumption. See the documentation for SSL_set_shutdown() (http://www.openssl.org/docs/ssl/SSL_set_shutdown.html#) for some hints of what to do. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original

Re: Closing SSL connections

2001-04-18 Thread Greg Stark
-Length header or some other heursitic (like looking for the /HTML tag), how can your client be certain the transport closure packet (TCP FIN) wasn't spoofed? _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original

Re: Closing SSL connections

2001-04-19 Thread Greg Stark
George, Do you really need to allow SSLv2? I'm curious, as I would think that by now there are almost no systems left which CANNOT use SSLv3. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message

Re: win32 compile failed

2001-04-19 Thread Greg Stark
. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Isaac Foraker" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, April 19, 2001 5:51 PM Subject: win32 compile failed

Re: MD5 and X509

2001-04-21 Thread Greg Stark
For your puposes, you'd expect it to look like any other random function that outputs four bytes. What exactly do you need for your 'unique enough' property? _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original

Re: OpenSSL on NT

2001-04-21 Thread Greg Stark
OpenSSL on NTfollow the instructions in install.w32; other than that, you'll have to tell us what errors you are getting. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: Timothy H

Re: MD5 and X509

2001-04-21 Thread Greg Stark
be able to do better with some other techniques. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Kenneth R. Robinette" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Saturday, April

Re: Memory Leaks..

2001-04-21 Thread Greg Stark
@openssl.org/msg11445.html). _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: "Harald Koch" [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, April 19, 2001 4:48 PM Subject: Re: Me

Re: how to use SSL_CTX_use_certificate_chain_file

2001-04-23 Thread Greg Stark
It is documented @ (http://www.openssl.org/docs/ssl/SSL_CTX_use_certificate.html#). _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: George Lind [EMAIL PROTECTED] To: [EMAIL PROTECTED

Re: unexpected alert packet after shutdown

2001-04-23 Thread Greg Stark
George, The alert is encrypted under the current ciphersuite, as it should be. It is almost certainly a close_notify alert, which is expected and correct. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: Computing the PEM write size

2001-04-24 Thread Greg Stark
The memory BIO will grow itself as needed to hold data written into it. You do not need to size it in advance. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: Hausermann Laurent [EMAIL

Re: tracing SSL handshake?

2001-04-24 Thread Greg Stark
Also you might find the ssldump tool useful. Please see www.rtfm.com/ssldump. _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message - From: Lutz Jaenicke [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent

Re: client continues after server fails

2001-04-24 Thread Greg Stark
even if the client doesn't authenticate. With the second option, the client must authenticate or the handshake fails. Are you perhaps using option #1? _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED] _ - Original Message

Re: Pb using memory bio

2001-04-25 Thread Greg Stark
Laurent, You cannot use a memory BIO that way; BIO_new_mem_buf() creates a READ-ONLY BIO. See (http://www.openssl.org/docs/crypto/BIO_s_mem.html#). Instead, just do bp = BIO_new(BIO_s_mem()) and go from there _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: bio_dump_cb

2001-04-25 Thread Greg Stark
, then the output goes to stdout. If you set it to the null sink BIO, you don't get any output. Since stdout is typically buffered, you may need to flush stdout, perhaps with BIO_flush(bio_s_out); good luck _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

Re: Memory leaks

2001-04-25 Thread Greg Stark
Gustavo, Take a look at the archived articles (http://www.mail-archive.com/openssl-dev@openssl.org/msg08902.html) and (http://www.mail-archive.com/openssl-users@openssl.org/msg18264.html). _ Greg Stark Ethentica, Inc. [EMAIL PROTECTED

  1   2   >