On 07/30/2009 08:05 AM, Alexander Lamaison wrote:
I'm calling PEM_read_bio_RSAPrivateKey and PEM_read_bio_DSAPrivateKey
with private keys loaded from files on disk. I read the file into a
string, put that into a BIO and then call the function.
At the moment, I'm reading the entire key file into
I apologize if that has been asked/answered before. After lots of
googling I could find no satisfactory answer.
I have a question about the way AES-CBC EVP has been implemented.
Specifically how EVP handles the IV.
I have an application using the AES EVP functions in CBC mode. Most
examples you
> From: owner-openssl-us...@openssl.org On Behalf Of Jeremy R.
> Sent: Monday, 27 July, 2009 23:19
(Sorry I was out.)
>> Another idea: you're not using the benefit of PKC encryption
>> (unknown to one). Why not just symm-encrypt the data?
> Well, env
I'm trying to illustrate how to take an OASIS WSSE SOAP Message and
operate on it with the commands in OpenSSL.
The SOAP Message encrypts the contents of an element in the Body with
AES-256-CBC with a key that was encrypted with RSA-1_5 using a public
key. We have an RSA encryption of a key for bul
Hi,
I'm kinda new to OpenSSL so please be gentle.
I am currently in the process of setting up a certificate chain for an intranet
I want something like Thawte has
Fonville IT Root CA
Fonville IT CA
www.sergefonville.nl
I have searched far and wide, but could not find a d
Hi,
RFC 3647 defines certificte renewal as follows:
Certificate renewal means the issuance of a new certificate to the subscriber
without changing the
subscriber or other participant's public key or any other information in
the certificate.
http://www.faqs.org/rfcs/rfc3647.html (section 4.4.6
I'm calling PEM_read_bio_RSAPrivateKey and PEM_read_bio_DSAPrivateKey
with private keys loaded from files on disk. I read the file into a
string, put that into a BIO and then call the function.
At the moment, I'm reading the entire key file into memory but, of
course, this isn't very safe. The u
Hi,
My apologies for a slightly off-topic question. When certificates are renewed
in most scenarios, is it usual to generate a new RSA key pair or would a client
re-use the existing keys and just ask for a new certificate with those keys?
Thanks for any guidance or pointers...
Regards,
Carl
Hi:
2009/7/27, Dr. Stephen Henson :
> On Mon, Jul 27, 2009, loody wrote:
>
>> Dear all:
>> When executing my sample code, I got the message below:
>> error:0406B07A:lib(4):func(107):reason(122)
>>
>> My question are:
>> 1. after checking crypto/err/err.h
>>#define ERR_LIB_RSA 4
>>th
Hi Ivan,
the functionality similar to your request is contained in the Wireshark.
See http://wiki.wireshark.org/SSL
It can decrypt SSL/TLS conversation using server's private RSA key.
The code is not based on OpenSSL but on GnuTLS+libgcrypt.
Best regards,
Tomas
> -Original Message
Dear Friends
Does any one has an small sample on using openssl in C to connect to gmail
pop3 and smtp server.
with my code , i can connect with out problems on the server, but when i
send PASS command for pop, i get the -Err unsuported command , same response
i get for sending AUTH LOGIN to
see http://www.rtfm.com/ssldump/
Ivan Ristic wrote:
I am investigating whether it is possible to use OpenSSL to passively
decrypt an SSL conversation (with access to a server's private RSA
key, of course).
Does OpenSSL provide any support for this mode of operation?
If there isn't explicit sup
I am investigating whether it is possible to use OpenSSL to passively
decrypt an SSL conversation (with access to a server's private RSA
key, of course).
Does OpenSSL provide any support for this mode of operation?
If there isn't explicit support, I am guessing some of the
functionality could be
13 matches
Mail list logo