guess the string is encoded as UTF8String in the certificate.
If you want your output in ISO-8859-1, you have to convert it
from UTF-8.
--
Jostein Tveit [EMAIL PROTECTED]
__
OpenSSL Project http
--
Jostein Tveit [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager [EMAIL
is ciphertext.
17 (application data)
03 (major version)
00 (minor version)
00 20 (length 16bits)
... (32 bytes of encrypted data)
--
Jostein Tveit [EMAIL PROTECTED]
__
OpenSSL Project http
Jagannadha Bhattu [EMAIL PROTECTED] writes:
Can you let me know which one is more safer between TLSv1 and
SSLv3.
TLSv1 and SSLv3 are equally safe.
TLS is the IETF's version of Netscape's SSL with some minor
changes.
--
Jostein Tveit [EMAIL PROTECTED
/paper-ssl.pdf
[3] http://www.schneier.com/paper-ssl-revised.pdf
Regards,
--
Jostein Tveit [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
Paul Franz [EMAIL PROTECTED] writes:
This is defined by the port used. The default port for HTTPS is 443 and
the default for HTTP is 80.
Or you can use Upgrading to TLS Within HTTP/1.1 as defined in
RFC 2817.
--
Jostein Tveit [EMAIL PROTECTED
test
2cbba5a2632ae92aa4f10003f7970082 *test
Is this a bug in OpenSSL 0.9.7d on cygwin?
Regards,
--
Jostein Tveit [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing
Victor Duchovni [EMAIL PROTECTED] writes:
On Fri, Apr 29, 2005 at 09:45:08AM +0200, Jostein Tveit wrote:
The same file copied with cygwin scp to my windows box:
Thereby globally changing LF to CRLF...
That does not explain the difference between openssl md5 and the
md5sum command
/
From you descriptions, it is kind of hard to understand what you
really want to accomplish.
--
Jostein Tveit ([EMAIL PROTECTED])
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
and compare the results.
And if you are fiddling with low level SSL, I strongly advice you
to buy Rescorla's book.
--
Jostein Tveit ([EMAIL PROTECTED])
__
OpenSSL Project http://www.openssl.org
User Support
with
it.
error:0407006A:rsa routines:RSA_padding_check_PKCS1_type_1:block type is not
01
error:04067072:rsa routines:RSA_EAY_PUBLIC_DECRYPT:padding check failed
The encrypted data is not correctly padded.
--
Jostein Tveit ([EMAIL PROTECTED
as your browser show https in the URL (use SSL),
everything is encrypted.
--
Jostein Tveit ([EMAIL PROTECTED])
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL
(aka man-in-the-middle).
Then you have to use authentication in combination with DH. DSS
is quite common, but you can also use RSA signatures.
--
Jostein Tveit ([EMAIL PROTECTED])
__
OpenSSL Project
Sriram R [EMAIL PROTECTED] writes:
Is it possible to print the ssl handshake and keys exchanged
on the openssl side?..If so how?
I recommend using ssldump URL: http://www.rtfm.com/ssldump/ .
--
Jostein Tveit ([EMAIL PROTECTED
and adjust your output to print the correct length.
--
Jostein Tveit ([EMAIL PROTECTED])
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated
?
If you just want to dump the content of the certificate you can use Peter
Gutmann's dumpasn1 tool at URL: http://www.cs.auckland.ac.nz/~pgut001/
Search for dumpasn1.
--
Jostein Tveit ([EMAIL PROTECTED])
__
OpenSSL Project
Dr. Stephen Henson [EMAIL PROTECTED] writes:
If its the CA list in a certificate request then it is a load of Name
structures i.e. just the DNs and not the whole certificate.
Ahhh... I misunderstood. But the DNs are still DER encoded, right?
--
Jostein Tveit ([EMAIL PROTECTED
of hashing and encryption.
Signing does not have to be an application of hashing and encryption. Take
a look at DSA.
Signing and encryption are quite different. The fact that RSA can be used
to do both can be confusing.
--
Jostein Tveit ([EMAIL PROTECTED
wonder if there are any security reasons for using different client
and server session write keys in the SSL specification.
Thanks for all answers.
Regards,
--
Jostein Tveit ([EMAIL PROTECTED])
__
OpenSSL Project
19 matches
Mail list logo