I am faced with a scenario where after a successful
handshake with the server on a nonblocking socket, the
server starts to send multiple records (packets) to
the client and closes the socket.
The SSL_read( ) api successfully reads the first
record by looping till SSL_Pending( ) returns
remaining
On Fri, Mar 11, 2005, Aftab Alam wrote:
> Hi All,
> I am currently able to communicate with HTTP servers using proxy
> successfully using openssl but I am unable to figure out the way to
> communicate with HTTPs servers using proxy.
>
> Pleae help me out regarding this issue.
>
>
You need to c
Pardon me if I'm beating an already dead horse here. But with the recent
news on the breaking of MD-5, SHA-1, etc., I was wondering: is there a way
for OpenSSL to use symmetric key ciphers as hashing algorithms?
As I understand it, given a symmetric key cipher c = f(k,p) where c is the
ciphert
Please post the answer to this on the board and not privately. I would
like to know as well. The samples are not useful.
M
-Original Message-
From: Aftab Alam [mailto:[EMAIL PROTECTED]
Sent: Friday, March 11, 2005 7:49 AM
To: openssl-users@openssl.org
Subject: SSL communication behind
Hi All,
I am currently able to communicate with HTTP servers using proxy
successfully using openssl but I am unable to figure out the way to
communicate with HTTPs servers using proxy.
Pleae help me out regarding this issue.
Regards,
Muhammad Aftab Alam
___
> >
> > Is there somewhere I can look at the correct code to check the DNS name
> > in a subjectAltName?
> >
>
> Not in the OpenSSL core code but it isn't hard. You just have to loop through
> the GENERAL_NAME STACK and look for a type GEN_DNS and check the dNSName field
> of those.
>
in curl,
On Fri, Mar 11, 2005, Doug Sauder wrote:
>
> Thanks for the reply.
>
> Is there somewhere I can look at the correct code to check the DNS name
> in a subjectAltName?
>
Not in the OpenSSL core code but it isn't hard. You just have to loop through
the GENERAL_NAME STACK and look for a type GEN_D
Thanks for the reply.
Is there somewhere I can look at the correct code to check the DNS name
in a subjectAltName?
--
Doug Sauder
"Dr. Stephen Henson" <[EMAIL PROTECTED]> wrote on 03/11/2005, 01:32:29
PM:
> On Fri, Mar 11, 2005, [EMAIL PROTECTED] wrote:
>
> >
> > Looking at the OpenSSL source
On Fri, Mar 11, 2005, [EMAIL PROTECTED] wrote:
>
> Looking at the OpenSSL source code, I believe that the caller must free
> the struct that X509_get_ext_d2i returns. What function should I call
> to free the returned struct?
>
> My code looks like this:
>
> X509_EXTENSION* ext = 0;
>
On Fri, Mar 11, 2005, Antonio Ruiz Martínez wrote:
> Hola!
>
>
> Thanks for your answer.
> Mozilla is using a IV of 12 bytes length. I don't know why. That is the
> reason because I asked if it was possible to use another differente
> length in the IV.
>
What makes you think Mozilla is usi
Hola!
Dr. Stephen Henson wrote:
On Tue, Mar 08, 2005, Antonio Ruiz Martínez wrote:
Hello!
I have been looking at how I can set the length of the iv parameters
in a cipher algorithm.
I saw that we can put the IV with EVP_CipherInit_ex(ctx, NULL, NULL,
key, iv, do_dec
Looking at the OpenSSL source code, I believe that the caller must free
the struct that X509_get_ext_d2i returns. What function should I call
to free the returned struct?
My code looks like this:
X509_EXTENSION* ext = 0;
X509V3_EXT_METHOD* method = 0;
void* entries = 0;
int id
12 matches
Mail list logo