Hi all,
i am very new to openssl, or you can say not a user of openssl.
I am facing a scenario where SSL encryption is required at TLS layers for
security purposes.
This belongs to VoIP systems where signalling has to be encrypted.
I have a requirement of doing all encryption in SUIT-B
hi Kshirsagar,
I am into the same scenario, can you tell me at which end you are setting
the cipher list? Do we have to make changes on client application end ?
The parameters you mentioned, SSL_DEFAULT_CIPHER_LIST, can be seen on server
end , into openssl ssl.h file. Could you describe what
Hi,
Could you help where do i need to change the method from
TLSv1_2_server_method() to SSLv23_server_method() . Which files(s) need to
be addresses?
--
View this message in context:
http://openssl.6102.n7.nabble.com/Problem-with-cipher-suite-ECDHE-ECDSA-AES256-SHA384-tp42229p45461.html
Sent
Hi ,
I have installed openssl 1.0.1e, using
rpm -ivh --nosignature
http://rpm.axivo.com/redhat/axivo-release-6-1.noarch.rpm
yum --enablerepo=axivo update openssl
Now i need to install devel package too.
when i do yum install openssl-devel. i see warnings and log such as:
Protected multilib
After wasting 9 hours, i tried
yum --enablerepo=axivo install openssl-devel
and thats all!
--
View this message in context:
http://openssl.6102.n7.nabble.com/Installing-openssl-devel-1-0-1e-tp45647p45671.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
openssl ecparam -name secp160r2 -out CA_CURVE.pem
openssl req -out cacert.pem -new -x509 -keyout cakey.pem -newkey
ec:CA_CURVE.pem -nodes -days 600 -sha1
openssl req -new -out TMPFILE.req -newkey ec:CA_CURVE.pem -keyout
TMPFILE.key -nodes -sha1
openssl x509 -req -CAkey cakey.pem -CA cacert.pem
Thankyou Dave Thompson for your detailed answer.
Being new with openssl stuff, i have very little knowledge of what these
instruction were actually doing.
I have extracted set of these instruction from a script doing rsa with SHA1,
and i wanted it to convert to ECC with SHA256 based encryption
Hi all,
Please guide me how to negotiate over SUIT-B supported cipher
(TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384) in a TLS based connection.
What sort or keys and certs are required to make it possible? Is there any
specific criteria?
and how can i achieve this with openssl?
Thanks to all
--
anyone?
--
View this message in context:
http://openssl.6102.n7.nabble.com/SUIT-B-supported-cert-keys-tp45753p46006.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project