Dr. Stephen Henson wrote:
On Tue, Sep 04, 2007, Jim Marshall wrote:
Jim Fox wrote:
Doesn't need a faq. The man page says the purpose of the
BIO_set_nbio_accept macro is to set blocking or non-blocking mode.
Seems like that's what it will do.
Jim
On Sep 3, 2007, at 11:31 AM, Jim Marshall
Hi,
I am having problems in parsing a PKCS12 file. I was able to parse other
PKCS12 files (with single CA certificates).
But this particular one has two level CA certificates and I get the
error that pbe algorithm is unknown. I am including
openSSL_add_all_algorithms but still see the problem. I
Hello all:
I set up a CA and used it to sign a server certificate for an apache
webserver.
The server is called gorsky.
When I access the site with IE7, the certificate isn't trusted; so I went to
import the CA's certificate. However, when I view the certificate in IE7
and go to the
On Fri, Sep 07, 2007, Mulpur Sudha-MGI2496 wrote:
Hi,
I am having problems in parsing a PKCS12 file. I was able to parse other
PKCS12 files (with single CA certificates).
But this particular one has two level CA certificates and I get the
error that pbe algorithm is unknown. I am
Jim Fox wrote:
Use BIO_set_nbio_accept and this will work as you want it to.
Jim
Arg, thanks Jim - somewhere along the line I mixed that up! Changing to
that causes the BIO_do_accept call to not block. Although BIO_do_accept
returns -1 and errno is set to EAGAIN, the SSL_get_error()
Hi,
I am very new at using OpenSSL, so bear with me please.
We are using OpenSSL, and all is great. I have been saked to recompile
our application to have OpenSSL use GMP to increase the performance.
Seems simple enough.
I have compiled GMP, I also have recompiled OpenSLL to use GMP with
On Fri, Sep 07, 2007, Jim Marshall wrote:
Jim Fox wrote:
Use BIO_set_nbio_accept and this will work as you want it to.
Jim
Arg, thanks Jim - somewhere along the line I mixed that up! Changing to
that causes the BIO_do_accept call to not block. Although BIO_do_accept
returns -1 and
The same thing is happening with pkcs12 from openssl. What you said is
right, I don't think I have
RC2. Can you help me on how to include this.
thanks a lot,
Sudha
OpenSSL pkcs12 -passin pass:scott -in /flash/security/Moto-Sparky.p12
-clcerts -nokeys -out MotOLTCert.cert.pem
MAC verified OK
Dr. Stephen Henson wrote:
On Fri, Sep 07, 2007, Jim Marshall wrote:
Jim Fox wrote:
Use BIO_set_nbio_accept and this will work as you want it to.
Jim
Arg, thanks Jim - somewhere along the line I mixed that up! Changing to
that causes the BIO_do_accept call to not block. Although
So beyond the BIO_do_accept, I used the openssl client program to connect to
my server. I was expecting the above to make all the sockets non-blocking,
but when I called SSL_read in my code it seems to block for data. I tried
using the BIO_set_nbio an BIO_set_nbio_accept calls but no joy.
On Fri, Sep 07, 2007, Jim Marshall wrote:
Thanks for the feedback, unfortunately I don't fully follow you.
In my code I have a 'opensocket' function in which I do this:
ret = BIO_new_accept(hostString);
if (ret != NULL)
{
BIO_set_nbio_accept(ret, 1);
On Fri, Sep 07, 2007, Mulpur Sudha-MGI2496 wrote:
The same thing is happening with pkcs12 from openssl. What you said is
right, I don't think I have
RC2. Can you help me on how to include this.
You need to recompile the OpenSSL library. The default is to include RC2 but
wherever you got
Thank you very much for your input. Yes it is vendor specific code. I
will try to include a separate version.
thanks,
Sudha
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dr. Stephen Henson
Sent: Friday, September 07, 2007 4:19 PM
To:
Hi,
I have trouble setting variable key size for blowfish
cipher. The code, pasted below, used to work on
version 0.9.8a, the behaviour changed after upgrading
to 0.9.8e. Under 0.9.8e it seems that calling
EVP_CIPHER_CTX_set_key_length has no effect. Using
EVP_CIPHER_CTX_key_length to check the
On Fri, Sep 07, 2007, [EMAIL PROTECTED] wrote:
Hi,
I have trouble setting variable key size for blowfish
cipher. The code, pasted below, used to work on
version 0.9.8a, the behaviour changed after upgrading
to 0.9.8e. Under 0.9.8e it seems that calling
EVP_CIPHER_CTX_set_key_length has
Folks - My apologies if this topic has already been addressed -
SunOS 5.10 Generic_125100-10 sun4u sparc SUNW,Sun-Fire-V440
(SUN distributed pkgs) Server: Apache/2.0.55, Interface: mod_ssl/2.0.55,
Library: OpenSSL/0.9.7d
Following an error-free startup of Apache, I try to establish an https
16 matches
Mail list logo