Prashant Kumar wrote:
Hello Group,
Hi Prashant,
Do we support curves K-163 (Group 7) and B-283 (Group 8) in the Elliptic
curve implementation
in 9.7a ? .
No, OpenSSL 0.9.7 supports only the basic arihtmetic for curves over
GF(p). For support of binary curves you must wait for 0.9.8
(try the
Hi, we are using SSL_read in a loop to read all the bytes being sent from a
server.
We use SSL_peek to know when there's no more data.
Problem is SSL_read always sleeps for about one minute when reading the last
set of bytes.
We are asking it to read the exact number of bytes already returned
Title: RE: Elliptic curve in 9.7a
Hello Nils Larsch,
Thank you so much for your help. When will OpenSsl 9.8 be released ?
Thanks,
Prashant Kumar.
-Original Message-
From: Nils Larsch [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, March 26, 2003 4:00 AM
To: [EMAIL PROTECTED]
In message [EMAIL PROTECTED] on Wed, 26 Mar 2003 08:35:43 -0500, Prashant Kumar
[EMAIL PROTECTED] said:
prkumar Thank you so much for your help. When will OpenSsl 9.8 be released ?
0.9.8 doesn't have a schedule yet.
--
Richard Levitte \ Spannvägen 38, II \ [EMAIL PROTECTED]
[EMAIL
Hi,
I am experimenting with the minumum RSA key lenght allowed
by TLS 1.0. What I gather from reading the specification is
that it is left to applications to enforce minimum/maximum
lenghts - please correct me if this is not the case.
Assuming that TLS 1.0 spec does not place any restriction
hi,
I have tested the SSL handshake but failing when
verifying server certificate
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY. I
generated the self signed CA and used the same CAcert
to verify using openssl verify and also using openssl
s_client -verify 1 -CAfile and it seems to be working
On Wed, Mar 26, 2003, Asad Ali wrote:
Hi,
I am experimenting with the minumum RSA key lenght allowed
by TLS 1.0. What I gather from reading the specification is
that it is left to applications to enforce minimum/maximum
lenghts - please correct me if this is not the case.
There are
On Wed, Mar 26, 2003, rajagopalan ramanujam wrote:
hi,
I have tested the SSL handshake but failing when
verifying server certificate
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY. I
generated the self signed CA and used the same CAcert
to verify using openssl verify and also using openssl
Hi,
I noticed that SSL_CTX_free() takes all the sessions in the given CTX's
internal session cache, and also removes them from the external session cache
(i.e., calls the delete-session callback).
Why was this done? I can't think of a security or a logical explanation to
this, because these
On Wed, Mar 26, 2003 at 08:25:10PM +0200, Nadav Har'El wrote:
I noticed that SSL_CTX_free() takes all the sessions in the given CTX's
internal session cache, and also removes them from the external session cache
(i.e., calls the delete-session callback).
[Analysis deleted.]
Obviously this
On Wed, Mar 26, 2003, Lutz Jaenicke wrote about Re: SSL_CTX_free messes with external
session cache:
Hmm. I extensively use external session caching. But I never call
SSL_CTX_free(), as my application will terminate in this moment anyway,
so this oddity went by unnoted...
This is the bane of
Hi,
* Nadav Har'El ([EMAIL PROTECTED]) wrote:
Hi,
I noticed that SSL_CTX_free() takes all the sessions in the given CTX's
internal session cache, and also removes them from the external session cache
(i.e., calls the delete-session callback).
Why was this done? I can't think of a
On Wed, Mar 26, 2003, Geoff Thorpe wrote about Re: SSL_CTX_free messes with external
session cache:
IMHO, you're probably better off in the mean time disabling the internal
caching altogether and implement a coherent model entirely from the
external callbacks - this way the SSL_CTX_free()
Hi,
I have a client and a server using SSL to communicate. the crypto is
3DES-CBC-SHA
When the client send message with length 1989 bytes, the SSL_read on
server spend about 10 ms.
When the client send message with length 1989 bytes, the SSL_read on
server spend about 200 ms.
This is a big
Does TLS support any non-static RSA ciphersuites. For example is
it possible to use a 128 bit key to encrypt the pre-master secret
in chunks of 16 bytes (including the padding), or use a 256 bit
key to encrypt it in 32 byte chunks.
regards,
--- asad
-Original Message-
From: [EMAIL
hi,
i have a single file in PKCS#7 format
can i decrypt this file with openssl?
i try this
[EMAIL PROTECTED] cp]# openssl smime -decrypt -inform der -in pkcs7.enc -recip
test.pem -inkey key.pem
Enter PEM pass phrase:
Error decrypting PKCS#7 structure
3428:error:21070073:PKCS7
* Nadav Har'El ([EMAIL PROTECTED]) wrote:
The ideal thing for openssl would be to wait until we have a good
opportunity to well and truly ignore backwards compatibility and then
just uproot the entire caching interface and replace it with something
I understand that backward compatibility
On Wed, Mar 26, 2003, marek cervenka wrote:
hi,
i have a single file in PKCS#7 format
can i decrypt this file with openssl?
i try this
[EMAIL PROTECTED] cp]# openssl smime -decrypt -inform der -in pkcs7.enc -recip
test.pem -inkey key.pem
Enter PEM pass phrase:
Error decrypting PKCS#7
On Wed, Mar 26, 2003, Asad Ali wrote:
Does TLS support any non-static RSA ciphersuites. For example is
it possible to use a 128 bit key to encrypt the pre-master secret
in chunks of 16 bytes (including the padding), or use a 256 bit
key to encrypt it in 32 byte chunks.
No, the standards
i have a single file in PKCS#7 format
can i decrypt this file with openssl?
i try this
[EMAIL PROTECTED] cp]# openssl smime -decrypt -inform der -in pkcs7.enc -recip
test.pem -inkey key.pem
Enter PEM pass phrase:
Error decrypting PKCS#7 structure
3428:error:21070073:PKCS7
On Wed, Mar 26, 2003, marek cervenka wrote:
i have a single file in PKCS#7 format
can i decrypt this file with openssl?
i try this
[EMAIL PROTECTED] cp]# openssl smime -decrypt -inform der -in pkcs7.enc -recip
test.pem -inkey key.pem
Enter PEM pass phrase:
Error
i have a single file in PKCS#7 format
can i decrypt this file with openssl?
i try this
[EMAIL PROTECTED] cp]# openssl smime -decrypt -inform der -in pkcs7.enc -recip
test.pem -inkey key.pem
Enter PEM pass phrase:
Error decrypting PKCS#7 structure
On Thu, Mar 27, 2003, marek cervenka wrote:
i have a single file in PKCS#7 format
can i decrypt this file with openssl?
i try this
[EMAIL PROTECTED] cp]# openssl smime -decrypt -inform der -in pkcs7.enc
-recip test.pem -inkey key.pem
Enter PEM pass phrase:
23 matches
Mail list logo