Hi
I have one worrying question... I have generated my keys and ca and all
with easy-rsa package and he has generated 1024 bit rsa keys... but as far
as I have seen openvpn is using blowfish... blowfish in a symetric
encription cypher and rsa is an asymetrical one... shouldn't match keys
and
Ramashish Baranwal wrote:
Hi,
I have a server which accepts ssl connections. I have a client which
does parallel ssl
connections to this. After closing all connections the server has
unfreed memory. This gets reused for subsequent ssl connections, so no
issue there.
My problem is with the
Is there a way to use Win32 OpenSSL in silent mode?
-Original Message-
From: Thomas J. Hruska [mailto:[EMAIL PROTECTED]
Sent: Monday 29 October 2007 14:22
To: openssl-users@openssl.org
Subject: Re: OpenSSL How to redistribute as part of our application
Bernhard Froehlich wrote:
Dave
On 10/30/07, Lutz Jaenicke [EMAIL PROTECTED] wrote:
Ramashish Baranwal wrote:
Hi,
I have a server which accepts ssl connections. I have a client which
does parallel ssl
connections to this. After closing all connections the server has
unfreed memory. This gets reused for subsequent
* Ramashish Baranwal wrote on Tue, Oct 30, 2007 at 15:06 +0530:
The heap size will never be reduced again regardless of the
amount of free() calls, the memory can however be reused.
Therefore, if your application at one point in time needs a
lot of heap space the memory consumption shown
I have one worrying question... I have generated my keys and ca and all
with easy-rsa package and he has generated 1024 bit rsa keys... but as far
as I have seen openvpn is using blowfish... blowfish in a symetric
encription cypher and rsa is an asymetrical one... shouldn't match keys
and
Is openssl using some kind of memory
caching for its ssl handshake which is not getting released when the
handshake is over?
Each established SSL/TLS connection allocates at least 58983 bytes.
All those 3 buffers (18437 B, 18698 B, 21848 B) are allocated when the
new connection is accepted
Steffen DETTMER wrote:
* Ramashish Baranwal wrote on Tue, Oct 30, 2007 at 15:06 +0530:
The heap size will never be reduced again regardless of the
amount of free() calls, the memory can however be reused.
Therefore, if your application at one point in time needs a
lot of heap space the
Dave Bound wrote:
Is there a way to use Win32 OpenSSL in silent mode?
The installer is Innosetup-based. Read the docs for Innosetup on
several command-line switches that Innosetup has for silent installs.
You should make sure you display a compatible license agreement to your
users when
On Tue, 2007-10-30 at 02:59 -0700, David Schwartz wrote:
I have one worrying question... I have generated my keys and ca and all
with easy-rsa package and he has generated 1024 bit rsa keys... but as far
as I have seen openvpn is using blowfish... blowfish in a symetric
encription cypher
Asymmetric ciphers like RSA are used on very small pieces of
information,
not on bulk data. In the case of encryption, the asymmetric algorithm is
used to securely exchange a random small number that is then
used as the key
in a symmetric algorithm like blowfish or AES.
This number
Not everyone can use the default build of OpenSSL.
Can you point me at some docs which will allow me to ascertain whether I
fall into the 'not everyone' category?
-Original Message-
From: Thomas J. Hruska [mailto:[EMAIL PROTECTED]
Sent: Tuesday 30 October 2007 10:56
To:
Hallo,
I am using the symmetric cypher functions to encrypt and then
decrypt a string. The cipher is aes-256-cbc. When I try to decrypt
the string, I get this error:
error 06065064: digital envelope routines: EVP_DecryptFinal_ex: bad decrypt
I am using the same key and same iv. The
Dave Bound wrote:
Not everyone can use the default build of OpenSSL.
Can you point me at some docs which will allow me to ascertain whether I
fall into the 'not everyone' category?
-Original Message-
From: Thomas J. Hruska [mailto:[EMAIL PROTECTED]
Sent: Tuesday 30 October 2007 10:56
On 10/30/07, Dave Bound wrote:
Not everyone can use the default build of OpenSSL.
Can you point me at some docs which will allow me to ascertain whether I
fall into the 'not everyone' category?
One thing to consider is if you want to include the patented ciphers
in your build, such as RC5,
Hey all,
I'm very new to security and generating key files. I'm following the
instructions I've found here: http://www.securityfocus.com/infocus/1677 and I'm
having trouble generating the private / public key pair and certificate.
In step 2 it asks: Enter pass phrase for
On Tue, 30 Oct 2007, [EMAIL PROTECTED] wrote:
Hi
I have one worrying question... I have generated my keys and ca and all
with easy-rsa package and he has generated 1024 bit rsa keys... but as far
as I have seen openvpn is using blowfish... blowfish in a symetric
encription cypher and rsa is an
Lutz Jaenicke [EMAIL PROTECTED] writes:
[...]
Yes, only 100MB might be actually used but the 2GB would still be
reserved in memory.
To get an idea about this behavior you can write a simple program like
And just to elaborate a little, if other processes need this memory,
the OS will swap out
[...]
On 10/30/07, Scott Gifford [EMAIL PROTECTED] wrote:
If this presents a real problem, the general solution is to use a
specialized malloc, which uses a memory allocation method that allows
returning memory to the OS, such as mmap. I'm not sure how to use a
custom malloc with OpenSSL, but
Hello,
Please pardon the newbie question. I was curious if anyone had any links or
references that they could point me to for more details on how to use
blowfish.h with C? I've gone through the man pages but was hoping for
something more intuitive, step-by-step, or outlining when to use
20 matches
Mail list logo