MDC2 block size

2000-06-30 Thread Burger, Kobus K
Title: MDC2 block size Hi folks, (I am not subscribed to the list, so please reply directly) I am trying to use openssl on Solaris to checksum files coming from an IBM mainframe. The only function that exists on both platforms is the MDC2 checksum. I have noticed a couple of

Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-30 Thread Richard Levitte - VMS Whacker
From: Louis LeBlanc [EMAIL PROTECTED] leblanc The project involved an https load generator - primarily used leblanc for correctness testing of another project. I had the worst leblanc time getting the initial handshake to work. The dreaded leblanc 'PRNG not seeded' message kept plaguing me.

Re: memory leaks in openssl - urgent.......

2000-06-30 Thread John Hartnup
On Thu, Jun 29, 2000 at 11:13:43PM +0200, Richard Levitte - VMS Whacker wrote: Hey! Repeating your message x times doesn't solve anything. On the contrary, it may piss people off, and then I'll just say "happy isolation!" to you. I got this message twice... but I'm going to assume it was

viewing added oid

2000-06-30 Thread Arnaud De Timmerman
hi, How can I be sure that oid I'm trying to add to my certificate, are actually added ? What's the openssl command to use ? Will my added oids appear somewhere in these lines : ** subject=/C=FR/ST=Nord/O=Org/CN=mycn/Email=myemail issuer=

RE: memory leaks in openssl - urgent.......

2000-06-30 Thread raggi
Hi all I have also been receiving numerous copies of each message posted for the 24 hours... I just wanted to add my BoundsChecker printout to the pool, I am also trying to eliminate memory leaks from my app. If I find something out I will let you know. BTW Arora : i am calling the same

RE: memory leaks in openssl - urgent.......

2000-06-30 Thread DeJuan Jackson
ditto[on experiencing memory leaks, and using those free functions] Bounds Checker output not included - although my mem-leaks aren't nearly as bad as Raggi's, but hey I'm using Bio's. -Original Message-From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]Sent: Friday, June 30,

Re: Does anyone know how to fix Multithreading??

2000-06-30 Thread Bodo Moeller
On Tue, Jun 27, 2000 at 02:54:04PM -0400, Bill Rebey wrote: The product is a poor man's software VPN. A Server (the thing I'm writing) accepts local, clear connections, consults a routing table that is part of that Server's configuration, sets up an SSL connection with another Server as

Re: ATT: Robert Sandilands! (was Re: client authentication)

2000-06-30 Thread Albert Serra
Does it work? Because what exact commands do you have to add if you want client authentication on serv.cpp and cli.cpp? I have tried it following the code I have found on sslcli.cpp and sslsrv.cpp and it doen't work. If somenone wants to help me, (I work on a Sun WS) , what is the mean of

Re: ATT: Robert Sandilands! (was Re: client authentication)

2000-06-30 Thread Robert Sandilands
I tested it under RedHat Linux 6.2 and Windows 9x. It worked for me :-} The RAND_??? functions is to make sure that there is a sufficients source of random numbers for generating the random session keys for SSL. The functions with "verify" in them is there to tell the server or client where the

Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-30 Thread Ulf Moeller
On Fri, Jun 30, 2000, Louis LeBlanc wrote: RAND_bytes(entropy, 4000); RAND_seed(entropy, 3000); /* just giving myself some room until the code is working */ And everything works. No, nothing works, as you would have noticed, had you checked the RAND_bytes() return value. You still

Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-30 Thread Brian Hatch
Anyway, this is what I did: unsigned char entropy[4096]; /* Then I call the SSL_load_error_strings() and OpenSSL_add_all_algorithms() * routines, and create my context. Then, . . . */ RAND_bytes(entropy, 4000); RAND_seed(entropy, 3000); you've just seeded with bytes generated

Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-30 Thread Richard Levitte - VMS Whacker
From: Louis LeBlanc [EMAIL PROTECTED] leblanc Anyway, this is what I did: leblanc unsigned char entropy[4096]; [...] leblanc RAND_bytes(entropy, 4000); leblanc RAND_seed(entropy, 3000); And what do you think this gives you? Have you actually thought of checking the returned status code? This

PRNG facilities function?

2000-06-30 Thread Nick Sayer
I am fixing my pine+ssl hack to seed the PRNG. My development platform is FreeBSD, so I never noticed a problem, since it has a /dev/random. I plan on doing something like a 'ls /' and sending that into the PRNG along with the time, pid, ppid, uid and any other metrics I can get my hands on, but

Re: MDC2 block size

2000-06-30 Thread Pete Chown
Burger, Kobus K wrote: I have noticed a couple of discrepancies between mainframe support for MDC2 and OpenSSL's support: * Mainframe supports MDC2 with various keys (The documentation notes that the default key is the same as the one used by OpenSSL) - Openssl has a single key

access of passphrases

2000-06-30 Thread Cico, Michael
Hi folks, I'm a rookie on OpenSSL and security stuff in general, and I think I can now officially classify myself as knowing just enough to be dangerous. Here's my situation. We're trying to do one-way authentication between a Servlet on one machine and a C++ CGI on the other. I have

Re: Error in handshake: Get client hello B

2000-06-30 Thread Arun Venkataraman
We have a similar application where we reuse a pool of SSL connections. The only difference between our approach and yours is the following piece of code which we execute before reusing an already used SSL structure. SSL_set_session(ssl, NULL); Can you try this and see if the problem recurs? We

Re: certificate verify fails

2000-06-30 Thread Arun Venkataraman
In the future, please do not post such user problems to the developer mailing list. (Should this be a faq :) I am hazarding a guess here. It seems you me that you are trying to use the sample cert supplied with the demo. Note that this is just a dummy certificate and not signed by a "real" CA.

Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-30 Thread Louis LeBlanc
Obviously I have misunderstood the manpage for RAND_bytes. What is says is: int RAND_bytes(unsigned char *buf, int num); int RAND_pseudo_bytes(unsigned char *buf, int num); DESCRIPTION RAND_bytes() puts num cryptographically strong pseudo-random bytes into buf. An error