Manuel Sahm escribió:
Hello,
thanks for reply,...
Maybe you could help me.
Is it possible to use a password instead of a Certification file and a
Certification Key File to make the tcp connection secure via openssl ?
Thank you
>>> Sergio <[EMAIL PROTECTED]> 03.09.2008 16:44 >>>
Manuel Sahm escribió:
> Hello,
>
> I want to make my network connection encrypted/secure using ssh.
>
> At the moment I open a socket in my embedded device, so that an client
> (PC) is able to connect to it:
>
> //initialization of the socket
> handle = socket(AF_INET, SOCK_STREAM, 0);
> serv_addr.sin_family = AF_INET;
> serv_addr.sin_add.s_addr = htonl(INADDR_ANY);
> serv_addr.sin_port = htons(10001);
>
> bind(handle, &serv_adr, size_of(serv_adr));
> listen(handle, 0);
>
> In my communication thread I have the functions
> - accept
> - read
> - write
> - close
>
> How is it possible to make my network secure via ssl and the sockets
> used in the sample code...
>
> Thank you very very much
>
> Manuel Sahm
> <http://www.eset.com>
Hi,
i have never used SSL api directly, only command line but, i suposse you
want to encrypt the communication under your TCP socket. You need to
establish a TLS session and, i think your question is too ambiguous
because i suspect you need to use many functions and data structures
from ssl implementation. What you want is to establish a complete ssl
environment and my only advice (a recommendation from a newbie) is to
read and to study SSL api doc to see your needs more clear.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
Automated List Manager [EMAIL PROTECTED]
I think you have a conflict with your ideas. A and B want to secure its
communication. They need to be agree about which key to use. I suppose
you can encrypt the information at the origin using a symmetric key
(aes, des, idea etc) and decrypt ir at destination with the same key. A
and B must know the key. But also i suppose you can establish a ssl
connection to perform a key exchange (key negotiation) using
certificates or public keys (asymmetric keys) without certificates. In
this situation neither A and B need to know about a previous secret.
This is the normal situation of a client-server environment.
If your socket is a TCP socket i think is better for you to establish a
ssl session, more than using a symmetric key. I think symmetric keys are
more suitable for UDP but i'm not an expert and i don't assure anything.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
Automated List Manager [EMAIL PROTECTED]