On Fri, Mar 02, 2007 at 05:56:24PM -0500, Xiaoyu Ruan wrote:
> Thanks. Refer to the sample test given in PKV.txt in
> http://csrc.nist.gov/cryptval/dss/ecdsatestvectors.zip.
> I tried EC_KEY_check_key() against six NIST recommended EC curves P-192
> P-224 K-163 K-233 B-163 B-233. For curves P-192
Sergey S. Levin wrote:
1. If i use FileZilla and SSL connection - it works on 100% of speed.
I dont know what FileZilla is, but which SSL implementations is used and
what key exchange protocol and what symmetric cipher did it choose ?
2. The processor load is just 5% so, this should not b
> cout << "Set BIO block size (ex: 4096): ";
> cin >> nBioBlockSize;
What value are you using for nBioBlockSize?
> else
> {
> BIO_ctrl(out, BIO_CTRL_FLUSH, 0, NULL);
> }
Why is this here?
DS
_
Thanks. Refer to the sample test given in PKV.txt in
http://csrc.nist.gov/cryptval/dss/ecdsatestvectors.zip.
I tried EC_KEY_check_key() against six NIST recommended EC curves P-192
P-224 K-163 K-233 B-163 B-233. For curves P-192 P-224 B-163 B-233 the
function gives correct results. However, for B-1
Xiaoyu Ruan wrote:
Hi dear fellows,
I would like to know if there is any function(s) in OpenSSL that handles
public key validation for ECDSA.
Given a point (public key) and a curve, I would like to test if this
point is a valid public key for this curve.
have a look at EC_KEY_check_key(
Sergey S. Levin wrote:
But which cpu types/frequencies are involved on both sides of the
connection and which cipher suite do you use?
Server - Celeron 2GHz, Cient - Intel PIV 2GHz.
As to the second question - I'm not changing the defaul values in the
sources code. I had taken the saccept.c a
On Fri, Mar 02, 2007 at 07:47:29PM +0200, Sergey S. Levin wrote:
> Hello Richard,
>
> >But which cpu types/frequencies are involved on both sides of the
> >connection and which cipher suite do you use?
>
> Server - Celeron 2GHz, Cient - Intel PIV 2GHz.
> As to the second question - I'm not chang
Hello Richard,
But which cpu types/frequencies are involved on both sides of the
connection and which cipher suite do you use?
Server - Celeron 2GHz, Cient - Intel PIV 2GHz.
As to the second question - I'm not changing the defaul values in the
sources code. I had taken the saccept.c and sconne
Sergey S. Levin wrote:
I dont see any timing code in the middle to separate the timings for
the SSL cryptographic setup phase from the application data transfer
phase. I think you are doing a piggybacked connection setup so your
first application data write is performing the SSL connection set
Hello Rick,
SW crypto aint cheap. It can consume lots of CPU cycles. If the system
was nearly CPU saturated with a "plain" transfer, then the overhead of
the crypto can very definitely take the throughput down considerably.
1. If i use FileZilla and SSL connection - it works on 100% of spe
SW crypto aint cheap. It can consume lots of CPU cycles. If the system
was nearly CPU saturated with a "plain" transfer, then the overhead of
the crypto can very definitely take the throughput down considerably.
rick jones
one of these days I need to make an SSL version of netperf :)
Hello Darryl,
Thank you for a reply.
From glancing at your code it looks like your bulk data transfer is
something like 300 lots of nBioBlockSize, and I presume nBioBlockSize is
<= 10k, so thats only 3Mb of data.
The nBioBlockSize is 4096 Bytes. The transfer is 300 * buf_size where the
buf_s
Hello,
> > I have a cipher suit :
> > TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> >
> > What is It meant "TLS_DHE_RSA" Combine between RSA with
> > Diffie-Hellman ?? RSA is key transport. DH is key agreement. How do they
> > use together ?? Please help.
> >
> When we use Ephemeral DH, we need to u
Dinh, Thao V CIV NSWCDD, K72 a écrit :
I have a cipher suit :
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
What is It meant "TLS_DHE_RSA" Combine between RSA with
Diffie-Hellman ?? RSA is key transport. DH is key agreement. How do they
use together ?? Please help.
When we use Ephemeral DH, we ne
On Fri, Mar 02, 2007 at 09:24:27AM -0600, Dinh, Thao V CIV NSWCDD, K72 wrote:
>
> I have a cipher suit :
> TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
>
> What is It meant "TLS_DHE_RSA" Combine between RSA with
$ openssl ciphers -v kEDH+aRSA+3DES+SHA
EDH-RSA-DES-CBC3-SHASSLv3 Kx=DH
I have a cipher suit :
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
What is It meant "TLS_DHE_RSA" Combine between RSA with
Diffie-Hellman ?? RSA is key transport. DH is key agreement. How do they
use together ?? Please help.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTE
This belongs on openssl-users, not openssl-dev.
I. I don't have the precise information, but I think it likely will
be if it was a project committer who stated it will be.
II. Your guess is as good as mine.
III. If it applies, compiles, and functions then there shouldn't be
a problem. It i
Hi All,
Can any one tell me when "SessionTicket TLS Extension" support will be
included in openssl library?
Thanks in advance.
Regards,
Jaya.
__
OpenSSL Project http://www.openssl.org
User Support
Hi All,
I was looking for EAP-FAST support in openssl library. In the mail list
I found a patch. Patch was distributed for openssl-0.9.8.
And I also found some mails stating EAP-FAST support will be added in
openssl-0.9.9.I have few queries now.
I. Will EAP-FAST support will be added in openssl-0
Thanks for tracking this down in the source.
The default configfile probably contains "ca_default" there, have you
replaced this with "My_CA"?
Yes I did indeed.
From what I read in
http://www.openssl.org/docs/apps/ca.html the value should remain
"ca_default" in your configfile unless you
I'm trying to build apache 1.3.37 with ssl support on a Ubuntu 6.1
running on a AMD Turion 64.
I've downloaded the following packages:
Apache 1.3.37 sources (apache_1.3.37.tar.gz from httpd.apache.org)
Mod SSL 2.8.28 (mod_ssl-2.8.28-1.3.37.tar.gz from www.modssl.org)
Open SSL 0.9.8e (openssl-0.9
21 matches
Mail list logo