Hello

2012-06-04 Thread zhu qun-ying

wow this is pretty awesome you should give it a look 
http://www.finance15dynews.net/biz/?read=9799495

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


FWD:

2012-06-04 Thread zhu qun-ying

wow this is crazy check it out http://www.finance15elnews.net/biz/?page=7115048

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Hey

2012-06-04 Thread zhu qun-ying

wow this is awesome give it a look 
http://www.finance15cinews.net/biz/?employment=0410777

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


fwd:

2012-06-02 Thread zhu qun-ying

wow this is pretty crazy you should check it out 
http://www.thanews.net/biz/?employment=8003005

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: RE: OpenSSL 1.0.1a

2012-04-25 Thread zhu qun-ying
This error has caught a lots of people, I think it deserved a new version 
release to fixed this bug.  Or at least saying 1.0.1a is not suitable for not 
x86 platform on the web page and offering the daily snap as a work around.

 As from the website, 1.0.1a is the latest released, and it contains such an 
fatal error, seems it will damage the image of the project.

 
--
qun-ying


- Original Message -
> From: Peter Heimann 
> To: openssl-users@openssl.org
> Cc: "Spence, Thomas CIV USAF AFDW 844 CS/SCOX" 
> Sent: Wednesday, April 25, 2012 12:08:45 AM
> Subject: Re: RE: OpenSSL 1.0.1a
> 
> On 01/-10/-28163 08:59 PM, Spence, Thomas CIV USAF AFDW 844 CS/SCOX wrote:
>>  I am using AIX 5.3 with gcc 4.3.5.
> 
>>  ld: 0711-317 ERROR: Undefined symbol: OPENSSL_ia32cap_P
> 
> I had the same problem with the file crypto/evp/e_rc4_hmac_md5.c.
> Linking on non-x86 hardware failed.
> Try to replace this file with a newer version from
> openssl-1.0.1-stable-SNAP-20120420.tar.gz (or a later snapshot).
> 
> -- 
> Peter Heimann
> __
> OpenSSL Project                                http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                          majord...@openssl.org
>
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


would like to get some clearification on CVE-2011-4619

2012-04-02 Thread zhu qun-ying
Hi,

Regarding this  SGC-Restart DoS Attack (CVE-2011-4619), does it require the 
server to use the SGC certificate or it doesn't matter what kind of certificate 
is used by the server?

 
--
Qunying

Re: Why CVS?

2012-02-22 Thread Zhu Qun-Ying

Hi,

It seems there is an effort to provide a git repository:
http://repo.or.cz/w/mirror-openssl.git


Qunying
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Should DTLS causing program abort when getting an incorrectly formatted fragment?

2011-10-12 Thread zhu qun-ying
Hi,

While working on DTLS, in d1_both.c:dtls1_get_message_fragment():787~866

There are calls to  OPENSSL_assert (line 787):
/* read handshake message header */
i=s->method->ssl_read_bytes(s,SSL3_RT_HANDSHAKE,wire,
DTLS1_HM_HEADER_LENGTH, 0);
if (i <= 0) /* nbio, or an error */ 
{
s->rwstate=SSL_READING;
*ok = 0;
return i;
}
OPENSSL_assert(i == DTLS1_HM_HEADER_LENGTH);
...
and line 866:
/* XDTLS:  an incorrectly formatted fragment should cause the 
 * handshake to fail */
OPENSSL_assert(i == (int)frag_len);

The two calls causing program to abort when incorrectly formatted fragment is 
received.  Does it really so serious that a program restart is needed?

At the end of the function, there is an error label (line 904)
f_err:
ssl3_send_alert(s,SSL3_AL_FATAL,al);
s->init_num = 0;

*ok=0;
return(-1);
}
The above two test could goto f_err in stead of aborting the whole program.


>From a user point of view, the abort is not good, it is not so an fatal error 
>from my understanding.  Please enlighten me if I miss something.

--
qun-ying
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


About client certification verification

2011-06-01 Thread zhu qun-ying
Hi,

I would like to clarify if SSL server request client to send certification, and 
does not do the verification in OpenSSL (verification error is ignored, and 
certificate is verified somewhere else), will the client certificate still 
participate in the negotiation of keys?

Thanks

--
qun-ying
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: where is the memory being held

2010-10-01 Thread zhu qun-ying
I found a solution without hacking into the library itself. Since my system is 
running glibc, I forced all mem request to use mmap with 
mallopt(M_MMAP_THRESHOLD, 0), which release the memory back to the system when 
free is called, testing shows so far so good.

 --
qun-ying



- Original Message 
> From: David Schwartz 
> To: openssl-users@openssl.org
> Cc: Scott Neugroschl 
> Sent: Tue, September 28, 2010 3:08:48 PM
> Subject: Re: where is the memory being held
> 
> On 9/27/2010 4:13 PM, Scott Neugroschl wrote:
> > As David said,  yes.
> > On the other hand, you could re-implement malloc() and free() for  your
> > platform.
> 
> There's really no way to make that help very much.  It might help a little, 
> but 
>the fundamental problem is this:
> 
> If you want  to implement each 'malloc' so that a later 'free' can return the 
>memory to the  operating system, you can. But that requires rounding up even 
>small allocations  to at least a page, which increases your memory footprint.
> 
> If you don't  implement each 'malloc' that way, you still wind up with the 
>problem that one  small allocation that has not been freed in the middle of a 
>bunch of larger  allocations that have been freed prevents you from returning 
>any of the memory  used by the larger allocations to the operating system.
> 
> Generally, what  you need are algorithms designed for low memory footprint 
> and 
>a way to 'group'  allocations that will tend to be freed as a unit (such as 
>those related to a  single SSL session) such that when they are all freed, the 
>memory can be  returned to the OS. OpenSSL simply is not designed this way.
> 
> You could  probably hack OpenSSL to pass a pointer to a session object to 
> calls 
>to  malloc/free (perhaps using TSD) and use that TSD pointer as an allocation  
>context. That might increase the chances that the whole allocation context is  
>freed. It may even be sufficient (or at least helpful) just to hook all 
>OpenSSL  
>calls to malloc/free and process them from their own  arena.
> 
> DS
> 
> __
> OpenSSL  Project http://www.openssl.org
> User Support Mailing List openssl-users@openssl.org
> Automated  List Manager   majord...@openssl.org
> 


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: where is the memory being held

2010-09-26 Thread zhu qun-ying
Does it mean that it is hard to change the behavior?
--
qun-ying


--- On Fri, 9/24/10, David Schwartz  wrote:
> 
> Sounds like OpenSSL wasn't what you wanted. OpenSSL is
> intended for use on general-purpose computers with virtual
> memory. It is not designed to return virtual memory to the
> system, which in your case means it won't return physical
> memory to the system. Ouch.
> 
> DS
> 



__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: where is the memory being held

2010-09-24 Thread zhu qun-ying
Hi,

I think I should clarify something here.  The app is running in a small device 
that does not have virtual memory (no swap space) and the memory is limited 
(256/512 M).  In peek connections, it may use up to 90% of the system memory, 
and when connection goes down, memory usage is not coming down.  This leave 
very little memory for other part of the system, as this app is only a small 
part of a bigger system. The memory usage is a big concern as it is always 
running with the box.

So far periodically restart the app is not a good solution.

--
qun-ying

> This all seems normal. Virtual memory is not normally
> considered a 
> scarce resource and unless the consumption is really
> absurd, it's not 
> worth worrying about.
> 
> Unless your virtual memory use grows linearly with constant
> load, it's 
> generally not worth worrying about. If it grows in an
> exponentially 
> decreasing way with constant load or grows linearly with
> increasing peak 
> load, I wouldn't worry about it at all.
> 
> DS
> 
> __
> OpenSSL Project           
>                
>      http://www.openssl.org
> User Support Mailing List         
>           openssl-users@openssl.org
> Automated List Manager         
>              
>    majord...@openssl.org
> 


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


where is the memory being held

2010-09-23 Thread zhu qun-ying
Hi,

I have an SSL apllication, that it suppose to run for a long time. After some 
time of running, I found the usage of the memory is growing.  I stop all SSL 
connections and checked all SSL * has been freed  but it could not release the 
memory back to the system.

After some investigation, I found there is no memory leak, but seems lot of 
memory are unable to release back to system.  mtrace found out there are quite 
a lot of fragmented memory being held by the SSL library.  I would like to know 
what could I do to reduce the memory held by SSL library after all connections 
have been dropped?

I am handling the SSL session through share memory myself and that part of the 
memory is allocated from the start.

mallinfo() reports after some test and no connection for a while:

system bytes = 28271952
in use bytes =  1809184
non-inuse bytes  = 26462768
non-inuse chunks =   81
mmap regions =4
mmap bytes   =  1773568
Total (incl. mmap):
system bytes = 30045520
in use bytes =  3582752
releasable bytes =   462496

--
qun-ying


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: TLSv1.2 in openssl

2009-07-14 Thread zhu qun-ying

If you just want to study it, gnutls has support TLS1.2, I suppose now most 
Linux distributions include it by default also.


--
qun-ying


--- On Tue, 7/14/09, Akos Vandra  wrote:

> From: Akos Vandra 
> Subject: Re: TLSv1.2 in openssl
> To: openssl-users@openssl.org
> Received: Tuesday, July 14, 2009, 1:52 AM
> I understand. I know this was intended
> as a hint, unfortunately I am but a student, so I cannot
> fund the project.
> 
> So I suppose the latest version is TLSv1.0? Or is there
> support for TLSv1.1 also?
> 
> Regards,
> 
>   Vandra Ákos
> 
> 
> 
> 2009/7/13 Dr. Stephen Henson 
> 
> On Mon, Jul
> 13, 2009, Akos Vandra wrote:
> 
> 
> 
> > Hello!
> 
> >
> 
> > How can I invoke openssl s_server and s_client so that
> they communicate in
> 
> > TLSv1.2 mode? I can see options only for -tls1, but I
> am currently
> 
> > studying&analizing&implementing tls1.2, so I
> would need them to communicate
> 
> > with that protocol.
> 
> >
> 
> 
> 
> Not currently supported by OpenSSL. Due to the
> need to pay the bills funded
> 
> tasks take priority and nobody so far had offered to fund
> TLS v1.2 support.
> 
> 
> 
> Steve.
> 
> --
> 
> Dr Stephen N. Henson. OpenSSL project core developer.
> 
> Commercial tech support now available see: http://www.openssl.org
> 
> __
> 
> OpenSSL Project                            
>     http://www.openssl.org
> 
> User Support Mailing List                    openssl-us...@openssl.org
> 
> Automated List Manager                        
>   majord...@openssl.org
> 
> 
> 
> 


  __
Be smarter than spam. See how smart SpamGuard is at giving junk email the boot 
with the All-new Yahoo! Mail.  Click on Options in Mail and switch to New Mail 
today or register for free at http://mail.yahoo.ca
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


verifying CRL with critical extensions

2009-04-20 Thread zhu qun-ying

Hi,

May I know is the current version of OpenSSL supports verification for CRL with 
critical extensions?  I am currently runing 0.9.7m.

Thanks

--
qun-ying


  __
The new Internet Explorer® 8 - Faster, safer, easier.  Optimized for Yahoo!  
Get it Now for Free! at http://downloads.yahoo.com/ca/internetexplorer/
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: IE could not connect to a chaine-cert's ssl server

2009-02-04 Thread zhu qun-ying
Ah, I miss that one. Thanks.

--
qun-ying


--- On Wed, 2/4/09, Giang Nguyen  wrote:

> From: Giang Nguyen 
> Subject: RE: IE could not connect to a chaine-cert's ssl server
> To: openssl-users@openssl.org
> Received: Wednesday, February 4, 2009, 2:02 PM
> i think it's because your "my-cacert.pem" is
> not considered a CA: it has "CA:FALSE"
> 
> arch [temp]$ openssl x509 -in my-cacert.pem
> -BEGIN CERTIFICATE-
> MIIC9jCCAl+gAwIBAgIBADANBgkqhkiG9w0BAQUFADB4MQswCQYDVQQGEwJDQTET
> MBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQ
> dHkgTHRkMRAwDgYDVQQDEwdteS1yb290MR8wHQYJKoZIhvcNAQkBFhByb290QHdp
> ZGdpdHMuY29tMB4XDTA5MDIwNDAxNTA1MloXDTEyMDIwNDAxNTA1MloweDELMAkG
> A1UEBhMCQ0ExEzARBgNVBAgTClNvbWUtU3RhdGUxITAfBgNVBAoTGEludGVybmV0
> IFdpZGdpdHMgUHR5IEx0ZDEQMA4GA1UEAxMHbXktcm9vdDEfMB0GCSqGSIb3DQEJ
> ARYQcm9vdEB3aWRnaXRzLmNvbTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA
> sFZr5Htj5VUc69iYiFaRGGCQvsgrCw6kJFo9DZVRkMvmDYwpZ8vVg6H/l1xL+mWA
> Ur2T/z32JvLKPEH7DyXzQehdVFjVxS2zmfdIOI8P7CMH3pOuhiko8vPc+xhS5a4q
> 6Khvryx0n88RB1xj58WKtW9Op9FsG0ASE33Kh4oRhtMCAwEAAaOBjzCBjDAJBgNV
> HRMEAjAAMBEGCWCGSAGG+EIBAQQEAwIEsDAsBglghkgBhvhCAQ0EHxYdT3BlblNT
> TCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFDKh9W+fw4bPij+S9LXC
> m/RIl2xEMB8GA1UdIwQYMBaAFDKh9W+fw4bPij+S9LXCm/RIl2xEMA0GCSqGSIb3
> DQEBBQUAA4GBAKt7JnTmCzTQTw+bKtgkpR50Dw2wpQwL2pjYtVfRXX4eBcvgvLtY
> BAktaD03TN1ZKurZX6dWY0n9GP2nwUIQfkkQdXVlkOE//EiObPj6A0knzn2Rc/Cl
> nVgkYYWsQ122359RC8/1N+piN0XZrxM9JIfl9wcij71HZAeueddl3olF
> -END CERTIFICATE-
> arch [temp]$
> arch [temp]$ openssl x509 -in my-cacert.pem -text | grep
> -A1 Constra
> X509v3 Basic Constraints:
> CA:FALSE
> arch [temp]$
> 
> the openssl verify command succeeds, but i think it's
> because it's more lenient
> (http://openssl.org/docs/apps/verify.html#)
> _
> Windows Live™: E-mail. Chat. Share. Get more ways to
> connect. 
> http://windowslive.com/howitworks?ocid=TXT_TAGLM_WL_t2_allup_howitworks_022009__
> OpenSSL Project
> http://www.openssl.org
> User Support Mailing List   
> openssl-users@openssl.org
> Automated List Manager  
> majord...@openssl.org


  __
Be smarter than spam. See how smart SpamGuard is at giving junk email the boot 
with the All-new Yahoo! Mail.  Click on Options in Mail and switch to New Mail 
today or register for free at http://mail.yahoo.ca
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


IE could not connect to a chaine-cert's ssl server

2009-02-04 Thread zhu qun-ying
Hi,

I try to test out some chained certificates with web server. My setup is as 
follow:

my-cacert.pem <== my ca certificate
level1.cert <= my level1 certificate signed by my ca
level1.key <= my level1's key file
level2.pem <= my level2 certificate use as a server side certificate

ca.pem <= include my-cacert.pem and level1.cert as a chained CA source for the 
sslserver.

I have installed my-cacert.pem into IE/firefox as trusted CA.

When using IE7 to connect, I always get "Internet Explorer cannot display the 
webpage". and nothing happened.

When using firefox, it informs me that it is "an invalid security certificate. 
The certificate is not trusted because the issuer certificate is unknown."

I would like to know is there anything wrong with my generated certificates?

Attached also the network capture for IE7 connection. It seems IE FIN the 
connection.

Server: Linux lighttpd 1.4.19
Client: Windows XP, IE7, firefox 3.0.3

Actually, I try Aapche 2.x also, same result.

Thanks for your help!

--
qun-ying


  __
Ask a question on any topic and get answers from real people. Go to Yahoo! 
Answers and share what you know at http://ca.answers.yahoo.com

ca.pem
Description: Binary data


chained-cert.pcap
Description: Binary data


level1.cert
Description: Binary data


level1.key
Description: Binary data


level2.pem
Description: Binary data


my-cacert.pem
Description: Binary data


lighttpd.conf
Description: Binary data


Re: Time Diff?

2001-09-14 Thread zhu qun-ying



Averroes wrote:

> Hi all,
> 
> Perhaps someone noticed this:
> 
> When I create a certificate there is difference
> between system (OS) time and creation time of certificate.
> Approximately one hour.
> 
> 
> certificate info:
> Validity
> Not Before: Sep 14 09:57:24 2001 GMT
> Not After : Sep 13 09:57:24 2006 GMT

--> GMT time


> and immediately after signing:
> Fri Sep 14 10:58:32 BST 2001

   ---> local time zone


> 
> Any ideas?
> 
> Regards
> 


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: JAVA/JNI Wrapper for OpenSSL.

2001-03-28 Thread qun-ying

the Java thread dump gives a lot of information unralted(I don't know
how to interprete it either). try to insert a lot of debug print in your
C code and find out exactly where it fails and check every return code
from the OpenSSL library calll, from there it is much easier to find the
problem..
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: JAVA/JNI Wrapper for OpenSSL.

2001-03-28 Thread qun-ying

app_RAND_load_file() is not in the library. it is only a function used
in the openssl command tool. you can get the function definition in
apps/app_rand.c
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: JAVA/JNI Wrapper for OpenSSL.

2001-03-28 Thread qun-ying

what platform/compiler are you running? 
take note of the order you supply the library. move the -lcrypto to the
last of your link command may solve your problem.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Netscape 6.01 and SSL: crash?

2001-03-15 Thread zhu qun-ying

Don't use Netscape 6.01! Use Mozilla in stead (latest milestone is 0.8). It is
much more stable and with features that Netscape does not have.
-- 
(~._.~)  Öì Ⱥ Ó¢  ¦¶ ¸s ­^ (Qun-Ying) (65) 874-6643
 ( O )
()~*~()
(_)-(_)[EMAIL PROTECTED]  *  [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Installation problem with mingw32 on NT4 SP4

2000-12-13 Thread qun-ying

I used to get this kind of error. Active perl seems not working quite
well together with cygwin/mingw32. Try to get a perl version for cygwin.

QUERAN LOIC wrote:
> 
> --- Reçu de   CMB.QUERALO 0298002339 13-12-00 10.29
> 
> I try to install OpenSSL 0.9.6 with gcc 2.95.2, make 3.76.1 and Active Perl
> 5.6.0 620 as indicated in install.w32.
> 
> I obtain the followin error message :
> "gcc: .cryptocryptlib.c: No such file or directory"
> although make issues "gcc -o tmp\cryptlib.o  -Ioutinc -Itmp -O3 -fomit-
> frame-pointer -DDSO_WIN32  -c .\crypto\cryptlib.c" and crypto\cryptlib.c
> exists. Why can't it properly read the "\"s ?
> 
> Thanks in advance for any help.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



strange result from i2d_X509()

2000-11-27 Thread qun-ying

Hi,

I am trying to create a X509 certificate and store the result in a
memory location for later usage. But the result return from i2d_X509()
is wrong. I can get the correct result if I write the X509 structure
through either PEM_write_X509() or i2d_X509_bio().

I am running OpenSSL 0.9.6 under Slackware 7.1 with gcc 2.95.2.

The process:
X509 *x;
char *buffer;
int len;

. X509 contain a valid certificate
len = i2d_X509(x, NULL);
buffer = malloc(len);
len = i2d_X509(x, &buffer);
...
The result in buffer is not correct.

Is anything wrong with the process?
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Q: not understand the meaning of codes in apps/x509.c

2000-11-22 Thread qun-ying

Hi,

While going through the code in apps/x509.c, in line:979, function
x509_certify().

What does the 3 lines do? It seems useless for the upkey is free after
parameters being copied to? As
int EVP_PKEY_copy_parameters(EVP_PKEY *to,EVP_PKEY *from);
is defined as copy from the second argument to the first.

What are the normal sequences of function calls (roughly) to certify a
certificate request?

Thanks
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: signed after/before encryption?

2000-11-06 Thread zhu qun-ying

I am sorry for my unclear questions.

In a scenario that the signature is stored in PKCS#7 format which is encrypted
with the recipient's public key. While the data is encrypted with 3DES.

If the data are to be stored in its encryption form and only decrypted when its
in use, does the verification of encrypted data's signature have the same level
of security of the decrypted data's signature? The reason for this is that if
the data have been corrupted, there is no point to decrypt them.

-- 
(~._.~)  Öì Ⱥ Ó¢  (Qun-Ying)  (65) 874-6643
 ( O )   TrustCopy Pte Ltd / Kent Ridge Digital Labs
()~*~()  21 Heng Mui Keng Terrace,  Singapore 119613
(_)-(_)[EMAIL PROTECTED]  *  [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



signed after/before encryption?

2000-11-06 Thread zhu qun-ying

While normally the original data before encryption gets signed, what is the
effect of signing the encrypted data? In this form, the verification can take
place without decrypting the data. Any pros and cons of this method?

Thanks
-- 
(~._.~)  Öì Ⱥ Ó¢  (Qun-Ying)  (65) 874-6643
 ( O )   TrustCopy Pte Ltd / Kent Ridge Digital Labs
()~*~()  21 Heng Mui Keng Terrace,  Singapore 119613
(_)-(_)[EMAIL PROTECTED]  *  [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Base64 in MIME file...is really required?

2000-10-22 Thread zhu qun-ying

After you create the base 64 BIO, set the following flag,
BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
to parse the input without linefeed.

-- 
(~._.~)  Öì Ⱥ Ó¢  (Qun-Ying)  (65) 874-6743
 ( O )   TrustCopy Pte Ltd / Kent Ridge Digital Labs
()~*~()  21 Heng Mui Keng Terrace,  Singapore 119613
(_)-(_)[EMAIL PROTECTED]  *  [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Newbie question: Compiling OpenSSL under VC++ 6.0

2000-09-25 Thread zhu qun-ying

In your VC installation, you should be able to found a batch file under
C:\progra~1\micros~2\vc98\bin, it is named "vcvars32.bat", just run the batch
file under your DOS prompt, it will setup all the environment for you.

-- 
(~._.~)  Öì Ⱥ Ó¢  (Qun-Ying)  (65) 874-6743
 ( O )   TrustCopy Pte Ltd / Kent Ridge Digital Labs
()~*~()  21 Heng Mui Keng Terrace,  Singapore 119613
(_)-(_)[EMAIL PROTECTED]  *  [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Private Keys and PKCS#12

2000-09-25 Thread zhu qun-ying



Marco Donati wrote:
>  
> 
> I generate the key, then use it to sign a certificate request (PKCS#10).
> The PKCS#10 is sent to a CA.
> When the certificate is issued by the CA it is downloaded (via LDAP) and
> stored into the original P12 with its key
> 
> I need it in PKCS12 for compatibility with onother application.
> 

You may create a PKCS12 file without a cert. But I am not sure how well it works
regards with compatibility and not sure whether it will break anything. I
modified the origin p12_crt.c to remove the requiement of a cert. You can see
from the attached file that I just commented out the cert. related code.


-- 
(~._.~)  Öì Ⱥ Ó¢  (Qun-Ying)  (65) 874-6743
 ( O )   TrustCopy Pte Ltd / Kent Ridge Digital Labs
()~*~()  21 Heng Mui Keng Terrace,  Singapore 119613
(_)-(_)[EMAIL PROTECTED]  *  [EMAIL PROTECTED]
 p12_crt.c


Re: Beta1 fail on cygwin32/mingw32 on NT4

2000-09-13 Thread zhu qun-ying

As more information on the mingw32 platform:

The code needed tlhelp32.h is for win95 only not for NT.

the tlhelp32.h is suppose only work in Win95 and later, not in NT at least 4.0.
It is said to to be supported under NT 5.0.

-- 
(~._.~)  Öì Ⱥ Ó¢  (Qun-Ying)  (65) 874-6743
 ( O )
()~*~()  21 Heng Mui Keng Terrace,  Singapore 119613
(_)-(_)[EMAIL PROTECTED]  *  [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



BIO and proxy?

2000-09-13 Thread zhu qun-ying

Hi,

I have not dug into the source code yet, but I want to know how to use the proxy
support? Does it work transparently with those web proxy server, acting as a
tunnel for communication between two sites?

Thanks
-- 
(~._.~)  Öì Ⱥ Ó¢  (Qun-Ying)  (65) 874-6743
 ( O )
()~*~()
(_)-(_)[EMAIL PROTECTED]  *  [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: ??: RSA pri key storage format

2000-09-11 Thread zhu qun-ying



?? wrote:
> 
> no default format.
> if you use openssl, pem is default.It is DER encode of you private key, then 
>base64 it. with addtion  alogorithm information, it became .pem file.
> PKCS is another format to store one' s certificate of private key or crl.  Not 
>strange, often used by IE, Netscape. It can just store private key.
> 
> The reason you lost your password in converting you private key file because you 
>have not assign a aloghrithm and a psssword
> 
But the default behavior of the 'openssl rsa' only output PBE on PEM format, for
DER is only the plain DER of the key. What are the common format to store
private key? Is PKCS12 without cert a particle way? or use PKCS5?
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



how to make dynamic library for Linux

2000-09-09 Thread qun-ying

It seems OpenSSL only support dynamic library on solaris system and dll
under Windows. How do I make a dynamic library for Linux? Is there other
issue to take care other than change the relevent compile options?
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



conver PKCS7 *p7 to DER string?

2000-09-06 Thread zhu qun-ying

Hi,

If I have the signature generated, how do I convert the p7 into a DER string
without writing out to a file? How do I know the size of the buffer to prepare?

Thanks
-- 
(~._.~)  Öì Ⱥ Ó¢  (Qun-Ying)  (65) 874-6743
 ( O )
()~*~()
(_)-(_)[EMAIL PROTECTED]  *  [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: PKCS7 usage?

2000-09-06 Thread zhu qun-ying



Dr S N Henson wrote:
> Well it doesn't have to be a file. Any BIO will do.
> 
> The S/MIME API doesn't currently have an init/update/final equivalent
> though.
> 
I am facing a problem here: the decrypted data is stored in some strange format
(beyond my control), and I have to read in the data into buffer block by block
to verify the data. How do I setup such operations?

Regards
-- 
(~._.~)  Öì Ⱥ Ó¢  (Qun-Ying)  (65) 874-6743
 ( O )   TrustCopy Pte Ltd / Kent Ridge Digital Labs
()~*~()  21 Heng Mui Keng Terrace,  Singapore 119613
(_)-(_)[EMAIL PROTECTED]  *  [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



PKCS7 usage?

2000-09-06 Thread zhu qun-ying

Hi All,

I am little bit confuse on the usage of the PKCS7_* functions.

If I have a file that need to be signed and I want the signed data to be
separately from the file and store else where. I follow the sign.c example, but
get lost a little bit, should I get the digest using EVP_digest*() functions or
just use the PKCS7_* functions? Which sequence should I follow?

For a sending and receiving scenario, is the X509 * the cert. of the receiver?
and EVP_PKEY * the sender's private key? (Referring to signed.c example) Is the
sender's cert also need to include in the PKCS7?

-- 
(~._.~)  Öì Ⱥ Ó¢  (Qun-Ying)  (65) 874-6743
 ( O )
()~*~()
(_)-(_)[EMAIL PROTECTED]  *  [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]