Re: OpenSSL Random Number Generator

2005-12-05 Thread Richard Koenning
Hagai Yaffe wrote: I am looking for some documentation regarding OpenSSL Random Number Generator, I have looked on the net and could not find what I need. I mainly need some compression between OpenSSL Random Number Generator and other Random Generation algorithms (Blum-Blum-Shub, FIPS 186,

openSSL 0.9.7g and Domino Cerfiticate Authority

2005-12-05 Thread stephane . purnelle
Hi, I must make some certificate which must be signed by a Domino Certificate Authority server. I have a procedure for make keys and certificates, but when I submit the cert file to the server. I don't receive the signed certificate because there are some error. These errors are : Error

Re: RE: Ignorant of SSL: I have a dumb question

2005-12-05 Thread lwoods (sent by Nabble.com)
Which? Why Verisign, or why Paypal? Thanks lwoods Sent from the OpenSSL - User forum at Nabble.com: Re: RE: Ignorant of SSL: I have a dumb question

Re: BIO_write fails after upd 0.9.7i = 0.9.8a

2005-12-05 Thread Arno Garrels
- Original Message - From: Arno Garrels [EMAIL PROTECTED] To: Eduardo Pérez Ureta [EMAIL PROTECTED] Sent: Monday, December 05, 2005 12:55 PM Subject: Re: BIO_write fails after upd 0.9.7i = 0.9.8a Eduardo Pérez Ureta wrote: On 2005-12-04 13:12:29 +0100, Arno Garrels wrote: I'm using

Re: Self-verifying names

2005-12-05 Thread Sean Rhea
On Dec 2, 2005, at 2:17 AM, Victor Duchovni wrote: So I would change this to: int verify_callback(int preverify_ok, X509_STORE_CTX *ctx) { return 1; } You can test this. Give the client or server a the wrong private key and the right certificate and watch the SSL handshake

AES Ciphers in OpenSSL 0.9.8a

2005-12-05 Thread Vijay K. Gurbani
Hi: I am trying to enable the following AES cipher suites in TLS: TLS_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_3DES_EDE_CBC_SHA I can get the last one, but cannot seem to get the first two. Here is the SSL context being set up by the client (note the cipher

Re: Certificate Revokation List.

2005-12-05 Thread Perry L. Jones
Certificate Revocation List is a list of certificate that have been revoked by a CA for some reason (Private Key was stolen). The list is digitally signed by the CA creating the CRL. These lists are usually public accessible in some LDAP or other command location. Certificates have a Before

Re: unable to free PROXY_CERT_INFO_EXTENSION

2005-12-05 Thread Matthew Rodriguez DSD staff
Richard Levitte - VMS Whacker wrote: In message [EMAIL PROTECTED] on Fri, 02 Dec 2005 12:09:14 -0800, Matthew Rodriguez DSD staff [EMAIL PROTECTED] said: MKRodriguez I can't seem to get rid of a memory leak when I create a MKRodriguez proxyCertInfo extension. I've tried calling MKRodriguez

Re: unable to free PROXY_CERT_INFO_EXTENSION

2005-12-05 Thread Dr. Stephen Henson
On Mon, Dec 05, 2005, Matthew Rodriguez DSD staff wrote: I'll have to step through these 2 cases more carefully. I see that X509_EXTENSION_free and PROXY_CERT_INFO_EXTENSION_free both go through the ASN1_item free, and ASN1_item_combine_free but somewhere after that they go through

Re: unable to free PROXY_CERT_INFO_EXTENSION

2005-12-05 Thread Matthew Rodriguez DSD staff
Dr. Stephen Henson wrote: On Mon, Dec 05, 2005, Matthew Rodriguez DSD staff wrote: I'll have to step through these 2 cases more carefully. I see that X509_EXTENSION_free and PROXY_CERT_INFO_EXTENSION_free both go through the ASN1_item free, and ASN1_item_combine_free but somewhere after

CA certificate question

2005-12-05 Thread Darren Nay
Hey All, I am relatively SSL Stupid .. self admittedly. :) I am trying to use a certificate that was assigned to me by a company whom we are working with and I am having some problems and wondering if I can get some assistance. I generated a standard 1024 bit RSA private key and CSR and

Re: problem creatin pkcs12 file

2005-12-05 Thread Bubu (sent by Nabble.com)
Robert Kwiencien wrote: I try to create the pkcs12 file with: [EMAIL PROTECTED] CA]$ openssl pkcs12 -export -in newcert.pem -inkey private/cakey.pem -certfile cacert.pem -name Laser -out testcert.pem Enter pass phrase for private/cakey.pem: My pass phrase is corrent, but then I get: No

Re: unable to free PROXY_CERT_INFO_EXTENSION

2005-12-05 Thread Dr. Stephen Henson
On Mon, Dec 05, 2005, Matthew Rodriguez DSD staff wrote: Dr. Stephen Henson wrote: have you tried lh_free()? In fact you don't need an LHASH for this type of extension in the way you use it so you should be able to pass it as NULL. In fact you can avoid X509V3_CTX as well and pass that

RE: CA certificate question

2005-12-05 Thread Han Jun Li
Darren, After you created the CSR, you are asking the company(X) you're working with to sign the CSR so anyone trusting X would also trust your certificate. Since X signed your CSR, it is acting in the Certificate Authority(CA) capacity. In order for your SSL communication to

Re: unable to free PROXY_CERT_INFO_EXTENSION

2005-12-05 Thread Richard Levitte - VMS Whacker
In message [EMAIL PROTECTED] on Mon, 05 Dec 2005 11:43:40 -0800, Matthew Rodriguez DSD staff [EMAIL PROTECTED] said: MKRodriguez #include openssl/x509v3.h MKRodriguez #include openssl/err.h MKRodriguez #include openssl/ssl.h MKRodriguez static char * pci_value = critical, language:Inherit all;