And he has got a name to match it too. ;)
P.S.: I do know the difference between a hacker and a cracker, but could'nt
resist it. :)
On Sun, Jul 6, 2008 at 6:02 PM, Vishal Rao <[EMAIL PROTECTED]> wrote:
> On Sun, Jul 6, 2008 at 4:48 PM, Hacker SF <[EMAIL PROTECTED]> wrote:
> > You can download t
You can use EVP_add_cipher() to add the ciphers that you would wish to allow
instead of OpenSSL_add_all_ciphers().
For Eg. if you want to use only DES in ecb mode, you can do
EVP_add_cipher(EVP_des_cfb());
Conversely, you can also edit the function OpenSSL_add_all_ciphers() and
remove all the cip
http://www.tc.umn.edu/~brams006/selfsign.html
On Mon, Jun 30, 2008 at 10:23 AM, rajatg <[EMAIL PROTECTED]> wrote:
> Hi,
>
> I am facing problem in generating SSL version 3 certificated.Could you
> please help in certificate generation
>
> Regards,
> Rajat Gupta
>
> ___
I not too sure about using the same context for both decryption and
encryption. It says in the man pages that *
EVP**_**CIPHER**_**CTX**_**cleanup()* clears all information from a cipher
context and free up any allocated memory associated with it.
So, I think you should probably use different con
w TLS
> record to a short TCP packet. The only way to be sure that it's not
> an attack is to process each record independently.
>
> -Kyle H
>
> On Wed, Jun 25, 2008 at 12:13 AM, Vijay Kotari <[EMAIL PROTECTED]>
> wrote:
> > Hi,
> >
> > I resolved
What exactly do you mean? What other possible kinds of authentication do you
have available? If you just want a TLS-based client and server, then OpenSSL
can serve your purpose.
Vijay K.
On Wed, Jun 25, 2008 at 9:01 PM, Patel Dippen-CDP054 <
[EMAIL PROTECTED]> wrote:
> Is it possible to use TL
Like Kyle said, the process is probabilistic in nature, but this page
actually contains a table that suggests the average time taken.
http://www.maxim-ic.com/appnotes.cfm/an_pk/4004
Results might vary largely depending on your computer specs, but the ratio
of the times taken should be about the sa
ll puzzled as to why I got the error as
before? Because I am using CBC, if my decryption fails at any one stage, I
should not be able to decrypt any further packets right?
Thanks and Regards,
Vijay K.
*
*On Wed, Jun 25, 2008 at 12:07 PM, Vijay Kotari <[EMAIL PROTECTED]>
wrote:
> I am u
at 11:35 AM, Julian <[EMAIL PROTECTED]> wrote:
> It's hard to approach this without knowing the mode of operation you are
> running CBC, OFB, CTR? Also are you using UDP with varying packet sizes?
>
> Julian
>
>
> On Jun 24, 2008, at 10:25 PM, Vijay Kota
e merged
together and hence treated as a single packet of size 0x40 or should
packet be processed separately. Since, we are using a block cipher of
size 256 bits(32 bytes), will it even make a difference?
Thanks and Regards,
Vijay Kotari
Hi,
I do know for a fact that part of the Finish message is encrypted. My
question was actually if the Message type field is also part of the
encrypted part? In which case, as I had pointed out earlier, there is a
chance that the first byte of the encrypted {message_type + message} can be
equal to
; Actually, AES is by default implemented in CBC (Cipher Block Chaining
> )mode in TLSv1. Refer RFC 3268.
> Since the encryption is done in CBC mode, you will not get the same
> encrypted text for identical plain text.
>
> --lakshmi prasanna
>
> On Tue, Jun 17, 2008 at 10:58 AM, ji
@DS
Nicely put.
So, if I was to try to decrypt/encrypt one of these messages, I would need
the key and the iv and something else? Because if just the key and iv are
sufficient to encrypt/decrypt the data, then how are the different encrypted
messages generated for the same cleartext?
On Tue, Jun
Hi,
While observing some packet dump, I noticed that while sending the same
application data over twice, different packet dumps were obtained in both
cases. This was done in the same SSL session, so the connection keys being
used are all the same. Is this expected behavior or am I reading the pack
Hi,
Based on what you have shared, I believe you didn't link the library files
required. You should use the -lssl option for this.
i.e.
root #: gcc sample_file.c -lssl
This is of course assuming that Openssl installed without any incident as
you have said. Also, if this is the first time that yo
Hi,
I am trying to extract the keying material (HMAC's, private key and
public key) of an already established SSL session. Is there any single
function that will allow me do this? If not, is there any data structure
that actually stores all the keys?
Thanks and regards,
Vijay K.
16 matches
Mail list logo