Re: [openssl-users] help with timestamping

2016-05-02 Thread Alex Samad
Got a bit further === #!/bin/bash rm -f /tmp/test.data* /tmp/sym.cer cat > /tmp/test.data < /tmp/symINT.cer << EOF # Signing cert public key #Issuer: C=US, O=Symantec Corporation, OU=Symantec Trust Network, CN=Symantec SHA256 TimeStamping CA #Subject: C=US, O=Symantec Corporation,

Re: [openssl-users] Storing session in file and reusing at client side

2016-05-02 Thread Shubham Chauhan
> Is it the server sending the error? No, it is the client sending the error. > Is the server running OpenSSL? Yes, I made the ssl_client and server (a simple chat functionality) scripts. > Does it happen with the same client running the same software with the > same IP address > or does it

Re: [openssl-users] Storing session in file and reusing at client side

2016-05-02 Thread Dr. Stephen Henson
On Mon, May 02, 2016, Shubham Chauhan wrote: > Hello, > > I wanted to store the freshly negotiated ssl/tls session in a file and > reuse it (via SSL_set_session()), in the next handshake. I was not able to > do that since the handshake got terminated giving a fatal error - illegal > parameters

Re: [openssl-users] Changing IV in EVP API?

2016-05-02 Thread Dr. Stephen Henson
On Mon, May 02, 2016, Jakob Bohm wrote: > While trying to convert some 3rd party code from direct calls > to libcrypto functions to using the EVP API, I have run into > a problem. > > I cannot find the EVP call to change the IV without changing > (and reexpanding) the key. > Try calling the

[openssl-users] Changing IV in EVP API?

2016-05-02 Thread Jakob Bohm
While trying to convert some 3rd party code from direct calls to libcrypto functions to using the EVP API, I have run into a problem. I cannot find the EVP call to change the IV without changing (and reexpanding) the key. If the code should stay in the old (non-EVP) API, I similarly lack a way

Re: [openssl-users] [openssl-dev] Storing session in file and reusing at client side

2016-05-02 Thread Shubham Chauhan
Thanks Viktor. > > Client-side sessions can be serialized via i2d_SSL_SESSION and the > resulting binary data can be stored in a file for reuse by a client > via d2i_SSL_SESSION() followed by SSL_set_session() (which copies > the session, so you can free the session obtained via d2i at that >

Re: [openssl-users] [openssl-dev] Storing session in file and reusing at client side

2016-05-02 Thread Viktor Dukhovni
On Mon, May 02, 2016 at 12:23:25PM +0530, Shubham Chauhan wrote: > I wanted to store the freshly negotiated ssl/tls session in a file and > reuse it (via SSL_set_session()), in the next handshake. I was not able to > do that since the handshake got terminated giving a fatal error - illegal >

Re: [openssl-users] [openssl-dev] Are you using "TLS proxy certificates"?

2016-05-02 Thread Jan Just Keijser
Hi Rich, On 27/04/16 18:45, Salz, Rich wrote: If so, please let us know. Replies to me will be summarized for the lists. what exactly do you mean by 'TLS proxy certificates' ? if you mean RFC3820 (5280) proxy certificates, then yes, we use them extensively within grid computing.

[openssl-users] Storing session in file and reusing at client side

2016-05-02 Thread Shubham Chauhan
Hello, I wanted to store the freshly negotiated ssl/tls session in a file and reuse it (via SSL_set_session()), in the next handshake. I was not able to do that since the handshake got terminated giving a fatal error - illegal parameters (47). Although this works perfectly fine when I store the