I have setup a server as a proxy using ssl_proxy.
I use openssl to create the neccessary keys(certificate/key),
but I am unable to force the config to use ssl3. I figured I
could put something into openssl.cnf, but am having no luck.
This server is not a web server and doesn't have
Maybe they can, but you wont get much response from me by being too lazy
to start a new thread with your Compose New Mail function, as opposed
to picking a historic message at random and using the Reply To Message
function.
Have a nice day!
The Posting Police
Paul Simon wrote:
I have a
Renegotiation. Thats what this is for.
On 11/2/07, Darryl Miles [EMAIL PROTECTED] wrote:
Maybe they can, but you wont get much response from me by being too lazy
to start a new thread with your Compose New Mail function, as opposed
to picking a historic message at random and using the Reply
Hi, Folks,
I have a long lived SSL connection which I'd like
to create a new symmetric key every hour. Can someone
shed some example or tips how to do it?
Thanks ahead
*
http://RateMyBossCafe.com
Leverage the Wisdom of Crowds
Hello! I set up a verification callback with SSL_CTX_set_verify. Both my
client and server use simple self-signed certificates.
The problem is: when they connect, the verification callback is called
twice.
My guess was that it was called for the peer certificate and then for the
CA, but when i
I have setup a server as a proxy using ssl_proxy. I use openssl to create the
neccessary keys(certificate/key), but I am unable to force the config to use
ssl3. I figured I could put something into openssl.cnf, but am having no luck.
This server is not a web server and doesn't have
Hallo,
On 11/1/07, Jorge Fernandez [EMAIL PROTECTED] wrote:
Make sure you use the same iv that you used when encrypting. You should make
a copy of the iv vector, since the encrypting process overwrites the buffer
of the iv that you pass.
A friend of mine solved it, it was a problem
From: owner-openssl-users On Behalf Of Pierce Ward
Sent: Wednesday, 31 October, 2007 09:07
openssl genrsa -out private_key.pem -f4 768
openssl pkcs8 -in private_key.pem -nocrypt -topk8 -out PK.pem
cat PK.pem | openssl enc -base64 -d PK.key
You don't need a separate step there; just